نتایج جستجو برای: buffer

تعداد نتایج: 42910  

2011
Jianlong Zhong Bingsheng He

Cloud computing has become an emerging virtualization-based computing paradigm for various applications such as scientific computing and databases. Buffer management is an important factor for the I/O performance of the virtualized platform. In this study, we propose to leverage the memory and the computation power of the graphics processors (GPUs) to improve the effectiveness of buffer managem...

2014
Yossi Azar Matthias Englert Iftah Gamzu Eytan Kidron

An instance of the generalized reordering buffer management problem consists of a service station that has k servers, each configured with a color, and a buffer of size b. The station needs to serve an online stream of colored items. Whenever an item arrives, it is stored in the buffer. At any point in time, a currently pending item can be served by switching a server to its color. The objectiv...

In this paper, a markovian queue with two types of servers and buffer space is considered. The resequencing constraint is imposed according to which the customers leave the system in the same order in which they entered it. For finite buffer queue, the steady state queue size distribution has been obtained.? 

2009
Tzu-Rung Lee Kwo-Cheng Chiu Da-Wei Chang

Buffer overflow has become a major source of network security vulnerability. Traditional schemes for detecting buffer overflow attacks usually terminate the attacked service, degrading the service availability. In this paper, we propose a lightweight buffer overflow protection mechanism that allows continued network service. The proposed mechanism allows a service program to reconfigure itself ...

2001
Aamer Jaleel Bruce Jacob

The effects of the general-purpose precise interrupt mechanisms in use for the past few decades have received very little attention. When modern out-of-order processors handle interrupts precisely, they typically begin by flushing the pipeline to make the CPU available to execute handler instructions. In doing so, the CPU ends up flushing many instructions that have been brought in to the reord...

1998
Crispan Cowan

This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attacks gained notoriety in 1988 as part of the Morris Worm incident on the Internet. While it is fairly simple to fix individual buffer overflow vulnerabilities, buffer overflow attacks continue to this day. Hundreds of attacks have been discovered, and while most of the obvious vuln...

Journal: :Physica Status Solidi A-applications and Materials Science 2023

Submicrometer‐thick AlGaN/GaN high‐electron‐mobility transistor (HEMT) epilayers grown on silicon substrate with a state‐of‐the art vertical buffer breakdown field as high 6 MV cm −1 enabling voltage of 250 V for short gate‐to‐drain distances despite such thin structure are reported. HEMTs gate length 100 nm exhibit good DC characteristics low drain‐induced barrier, going mV DS 30 V. Breakdown ...

2005
Martín Abadi Mihai Budiu Úlfar Erlingsson Jay Ligatti

Control-Flow Integrity (CFI) means that the execution of a program dynamically follows only certain paths, in accordance with a static policy. CFI can prevent attacks that, by exploiting buffer overflows and other vulnerabilities, attempt to control program behavior. This paper develops the basic theory that underlies two practical techniques for CFI enforcement, with precise formulations of hy...

1982
Alan K. Melby

At COLING80, we reported on an Interactive Translation System called ITS. We will discuss t h r ee p rob lems in the design of the first version of ITS: (1) human f ac to r s , (2) the "all or noth ing" syndrome, and (3) traditional centralized processing. We will also discuss a new vers ion of ITS, which is now being programmed. This new vers ion will hopeful ly o v e r c o m e these p rob lem...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید