نتایج جستجو برای: overflow
تعداد نتایج: 6760 فیلتر نتایج به سال:
In this paper, we are interested in wireless scheduling algorithms for the downlink of a single cell that can minimize the queue-overflow probability. Assuming that a samplepath large-deviation principle holds for the backlog process, we first study structural properties of the minimum-cost-pathto-overflow for a class of scheduling algorithms collectively referred to as the “α-algorithms.” For ...
The effect of ouabain on exocytotic and nonexocytotic norepinephrine release was investigated in perfused rat and guinea pig hearts. The overflow of endogenous norepinephrine and its neuronal metabolite 3,4-dihydroxyphenylethyleneglycol (DOPEG) was determined by highpressure liquid chromatography. DOPEG served as the indicator of free axoplasmic norepinephrine concentrations. The overflow of th...
In some particular environments such as battlefield, disaster recovery and wide area surveillance, most existing routing algorithms will fail to deliver messages to their destinations. Thus, it is an important research issue of how to deliver data in disconnected wireless sensor networks. This paper presents two efficient message ferry routing algorithms, denoted as MFRA1 and MFRA2, for data co...
Item # Vulnerability ID Score Source Score Summary 1 CVE-2015-2059 CVSS 2.0 7.5 High libidn: out-of-bounds read with stringprep on invalid UTF-8. [1] 2 CVE-2011-1425 CVSS 2.0 7.5 High xmlsec1: arbitrary file creation when verifying signatures [2] 3 CVE-2015-7696 CVSS 3.0 6.8 Med unzip: Heap overflow and DoS in 6.0 [3] 4 CVE-2014-9471 CVSS 2.0 7.5 High coreutils: memory corruption flaw in parse_...
Fano Sequential Decoding is a technique for communicating at a high information rate and with a high reliability over a large class of channels. However, equipment cost and variation in the time required to decode successive transmitted digits limit its use. This work is concerned with the latter limitation. Others have shown that the average processing time per decoded digit is small if the in...
The operational cycle of a storm water quality control basin can be divided into the waiting period between events and the filling and draining period during an event. In this study, an inherent overflow risk is defined as the probability of having a large event exceed the basin storage capacity. Such a probability is prescribed by the basin storage capacity and the local distribution of rainfa...
Software testing is an integral part of modern software engineering practice. Past research has not only underlined its significance, but also revealed multi-faceted nature. The practice and adoption influenced by many factors that go beyond tools or technology. This paper sets out to investigate the context from practitioners’ point view mining analyzing sentimental posts on widely used questi...
Conditions are provided to conclude an error bound for truncations and perturbations of Markov decision problems. Both the average and finite horizon case are covered. The results are illustrated by a truncation of a Jacksonian queueing network with overflow control. An explicit error bound for this example is obtained. Key-words Markov Decision Problems * Truncation * Perturbation * Error Boun...
Buffer overflows still remain a problem for software today. Even with address space randomization and non-executable stacks software remains vulnerable to clever exploits. In this paper we introduce the buffer overflow through a pratical example and take a retrospective look on the past 25 years of the arms race on buffer overflow exploits and protections.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید