نتایج جستجو برای: overflow

تعداد نتایج: 6760  

Journal: :Frontiers in Psychology 2014

2001
David Larochelle David Evans

Buffer overflow attacks may be today’s single most important security threat. This paper presents a new approach to mitigating buffer overflow vulnerabilities by detecting likely vulnerabilities through an analysis of the program source code. Our approach exploits information provided in semantic comments and uses lightweight and efficient static analyses. This paper describes an implementation...

2003
Caroline Fayet André-Luc Beylot

We propose an efficient solution to optimize buffer dumping allowing to reduce significantly the losses caused by buffer overflow. To highlight the proposed architecture we have analyzed its performance compared with different configurations of polling scheme.

2009
Eugen Leontie Gedare Bloom Olga Gelbart Bhagirath Narahari Rahul Simha

Buffer overflow attacks are widely acknowledged by computer security professionals to be one of the greatest threats to the security of computer systems. We present an integrated softwarehardware approach to protect against buffer overflow attacks while minimizing performance degradation, software development time, and deployment costs. Our technique does not change the processor core, but inst...

Journal: :Annals OR 2010
Md. Asaduzzaman Thierry J. Chaussalet Nicola J. Robertson

The main aim of this paper is to derive a solution to the capacity problem faced by many perinatal networks in the United Kingdom. We propose a queueing model to determine the number of cots at all care units for any desired overflow and rejection probability in a neonatal unit. The model formulation is developed, being motivated by overflow models in telecommunication systems. Exact expression...

1982
Per-Åke Larson

Linear hashing with partial expansions is a file organization intended for dynamic files. In this paper an improved version of the method is presented. Instead of having a separate overflow area, the storage area for overflow records is incorporated into the main file. Hence, all the records are stored in one file which grows and shrinks according to the number of records stored. By using sever...

2015
Liaojun Pang Deyu Miao Huixian Li Qiong Wang

Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, whic...

Journal: :American journal of physiology. Heart and circulatory physiology 2004
Wendell S Akers Lisa A Cassis

Activation of the sympathetic nervous system is well documented in heart failure. Our previous studies demonstrated an increase in evoked norepinephrine (NE) release from left ventricle (LV) slices at 10 days of pressure overload. The purpose of this study was to test the hypothesis that presynaptic modulation of NE release contributes to sympathetic activation after pressure overload. We exami...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید