نتایج جستجو برای: stet buffer

تعداد نتایج: 42947  

Journal: :Journal of Biological Chemistry 1940

Journal: :Advances in Applied Mathematics 1998

Journal: :International Journal of Modeling and Optimization 2015

Journal: :Jurnal Teknik Sipil dan Perencanaan 2022

Abstract. Rawapening Lake is located in Semarang District, Central Java. The decreasing of lake function due to its many problems caused by environmental degradation which has happened for almost three decades. Buffer zone determination a very important basic action safe Lake. This research determine buffer and management. Hydraulic, topographic analysis was conducted within the along with iden...

2003
Lujun Yuan Wen Gao Yan Lu

Hypothetical Reference Decoder (HRD) is a mathematical model of a decoder and its input buffer. It represents a set of normative requirements on bitstream for the purpose of avoiding buffer overflow and underflow. In other words, any coded video bitstream shall meet constraints imposed by HRD model. Two HRD models, i.e. the Earliest Arrival Time Leaky Bucket (EATLB) and the Constrained Arrival ...

2007
Herbert Bos

Heap and stack buffer overflows are still among the most common attack vectors in intrusion attempts. In this paper, we ask a simple question that is surprisingly difficult to answer: which bytes contributed to the overflow? By careful observation of all scenarios that may occur in overflows, we identified the information that needs to be tracked to pinpoint the offending bytes. There are many ...

2009
Matt Bishop

Ideally, computer security should be an integral part of all programming courses. Beginning programming classes pose a particular challenge, because the students are learning basic concepts of programming. Thus, teaching them about buffer overflows as security problems, requiring an explanation of concepts such as ―smashing the stack,‖ will confuse students more than motivate them to check arra...

2003
Zili Shao Qingfeng Zhuge Yi He Edwin Hsing-Mean Sha

Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded systems against buffer overflow attacks. In this paper, we propose the Hardware/Software Address Protection (HSAP) technique to solve this problem. We first classify buffer overflow attacks into two categories (stack s...

2004
Mark Foster Joseph N. Wilson Shigang Chen

The ICAT statistics over the past few years have shown at least one out of every five CVE and CVE candidate vulnerabilities have been due to buffer overflows. This constitutes a significant portion of today’s computer related security concerns. In this paper we introduce a novel method for detecting stack smashing and buffer overflow attacks. Our runtime method extracts return addresses from th...

رضا حکمت, , محمد جواد مجاهدی, , هابیل گریوانی, ,

Background: The effect of kind of dialysis solution on the control of blood pressure and adequacy and efficacy of hemodialysis is a most debated and controversial issue. Methods: Twenty six chronic hemodialized patients in Ghaem hemodialysis center, Mashhad, Iran, in winter of the year 2004, enrolled this study for one month. The patients were dialyzed with bicarbonate buffer and were dialy...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید