نتایج جستجو برای: stet buffer
تعداد نتایج: 42947 فیلتر نتایج به سال:
Abstract. Rawapening Lake is located in Semarang District, Central Java. The decreasing of lake function due to its many problems caused by environmental degradation which has happened for almost three decades. Buffer zone determination a very important basic action safe Lake. This research determine buffer and management. Hydraulic, topographic analysis was conducted within the along with iden...
Hypothetical Reference Decoder (HRD) is a mathematical model of a decoder and its input buffer. It represents a set of normative requirements on bitstream for the purpose of avoiding buffer overflow and underflow. In other words, any coded video bitstream shall meet constraints imposed by HRD model. Two HRD models, i.e. the Earliest Arrival Time Leaky Bucket (EATLB) and the Constrained Arrival ...
Heap and stack buffer overflows are still among the most common attack vectors in intrusion attempts. In this paper, we ask a simple question that is surprisingly difficult to answer: which bytes contributed to the overflow? By careful observation of all scenarios that may occur in overflows, we identified the information that needs to be tracked to pinpoint the offending bytes. There are many ...
Ideally, computer security should be an integral part of all programming courses. Beginning programming classes pose a particular challenge, because the students are learning basic concepts of programming. Thus, teaching them about buffer overflows as security problems, requiring an explanation of concepts such as ―smashing the stack,‖ will confuse students more than motivate them to check arra...
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded systems against buffer overflow attacks. In this paper, we propose the Hardware/Software Address Protection (HSAP) technique to solve this problem. We first classify buffer overflow attacks into two categories (stack s...
The ICAT statistics over the past few years have shown at least one out of every five CVE and CVE candidate vulnerabilities have been due to buffer overflows. This constitutes a significant portion of today’s computer related security concerns. In this paper we introduce a novel method for detecting stack smashing and buffer overflow attacks. Our runtime method extracts return addresses from th...
Background: The effect of kind of dialysis solution on the control of blood pressure and adequacy and efficacy of hemodialysis is a most debated and controversial issue. Methods: Twenty six chronic hemodialized patients in Ghaem hemodialysis center, Mashhad, Iran, in winter of the year 2004, enrolled this study for one month. The patients were dialyzed with bicarbonate buffer and were dialy...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید