نتایج جستجو برای: overflow distribution

تعداد نتایج: 614641  

2015
PETER CARRUTHERS

Pacific © 2015 Pacific P Abstract: This article challenges Block’s ‘overflow argument’ for the conclusion that phenomenal consciousness and access-consciousness are distinct. It shows that the data can be explained just as well (or better) in terms of a distinction between contents that are made globally accessible through bottom–up sensory stimulation and those that are sustained and made avai...

2013
Ripon K. Saha Avigit K. Saha Dewayne E. Perry

Stack Overflow is a highly successful questionanswering website in the programming community, which not only provide quick solutions to programmers’ questions but also is considered as a large repository of valuable software engineering knowledge. However, despite having a very engaged and active user community, Stack Overflow currently has more than 300K unanswered questions. In this paper, we...

Journal: :Sci. Comput. Program. 2012
Aleksandar Milicevic Daniel Jackson

In a bounded analysis, arithmetic operators become partial, and a different semantics becomes necessary. One approach, mimicking programming languages, is for overflow to result in wrap-around. Although easy to implement, wrap-around produces unexpected counterexamples that do not correspond to cases that would arise in the unbounded setting. This paper describes a new approach, implemented in ...

2017
Mani Kant Kumar Haranath Kar

This paper deals with the problem of undesired memory effects in nonlinear digital filters owing to the influence of past excitations on future outputs. The nonlinearities under consideration cover the usual types of overflow arithmetic employed in practice. Based on the Hankel norm performance, a new criterion is proposed to ensure the reduction of undesired memory effects in digital filters w...

1994
David J. Lilja Shanthi Ambalavanan

Dynamically tagged directories are memory-efficient mechanisms for maintaining cache coherence in sharedmemory multiprocessors. These directories use specialpurpose caches of pointers that are subject to two types of overflow: 1) pointer overflow, which limits the maximum sharing of a memory block, and 2) set overflow, which forces the premature invalidation of cached blocks. We propose a super...

Journal: :Computer Networks 2011
Can Zhao Xiaojun Lin

In this paper, we are interested in using large-deviations theory to characterize the asymptotic decay-rate of the queue-overflow probability for distributed wireless scheduling algorithms, as the overflow threshold approaches infinity. We consider ad-hoc wireless networks where each link interferes with a given set of other links, and we focus on a distributed scheduling algorithm called Q-SCH...

Journal: :IEEE Trans. Computers 2001
Yi-Bing Lin

ÐIn a cellular phone system, mobility databases called visitor location registers (VLRs) are used to temporarily hold the subscription information of the roaming users who visit the service area of the VLR. When the users leave the VLR area, the corresponding records in the VLR are deleted. Due to user mobility, the capacity of the VLR may not be large enough to hold information for all visitor...

Journal: :Behavioral and Brain Sciences 2007

2007
John Edwards

Buffer overflow attacks are among the oldest and most common attacks used to gain privileged access to a computer system. In fact, statistics from Carnegie Mellon’s Computer Emergency Response Team reveal that buffer overflow vulnerabilities accounted for about 50% of all reported vulnerabilities in 2000 [2]. It is surprising that after almost 20 years of buffer overflow exploits, they are stil...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید