نتایج جستجو برای: overflow detection

تعداد نتایج: 572254  

2017

Item # Vulnerability ID Score Source Score Summary 1 CVE-2015-2059 CVSS 2.0 7.5 High libidn: out-of-bounds read with stringprep on invalid UTF-8. [1] 2 CVE-2011-1425 CVSS 2.0 7.5 High xmlsec1: arbitrary file creation when verifying signatures [2] 3 CVE-2015-7696 CVSS 3.0 6.8 Med unzip: Heap overflow and DoS in 6.0 [3] 4 CVE-2014-9471 CVSS 2.0 7.5 High coreutils: memory corruption flaw in parse_...

2010
E. Savage

Fano Sequential Decoding is a technique for communicating at a high information rate and with a high reliability over a large class of channels. However, equipment cost and variation in the time required to decode successive transmitted digits limit its use. This work is concerned with the latter limitation. Others have shown that the average processing time per decoded digit is small if the in...

2006
James C.Y. Guo

The operational cycle of a storm water quality control basin can be divided into the waiting period between events and the filling and draining period during an event. In this study, an inherent overflow risk is defined as the probability of having a large event exceed the basin storage capacity. Such a probability is prescribed by the basin storage capacity and the local distribution of rainfa...

Journal: :Journal of Systems and Software 2023

Software testing is an integral part of modern software engineering practice. Past research has not only underlined its significance, but also revealed multi-faceted nature. The practice and adoption influenced by many factors that go beyond tools or technology. This paper sets out to investigate the context from practitioners’ point view mining analyzing sentimental posts on widely used questi...

2007
Nico M. van Dijk

Conditions are provided to conclude an error bound for truncations and perturbations of Markov decision problems. Both the average and finite horizon case are covered. The results are illustrated by a truncation of a Jacksonian queueing network with overflow control. An explicit error bound for this example is obtained. Key-words Markov Decision Problems * Truncation * Perturbation * Error Boun...

2013
Jussi Mäki

Buffer overflows still remain a problem for software today. Even with address space randomization and non-executable stacks software remains vulnerable to clever exploits. In this paper we introduce the buffer overflow through a pratical example and take a retrospective look on the past 25 years of the arms race on buffer overflow exploits and protections.

Journal: :Nature Reviews Cancer 2019

Journal: :Journal of Cell Biology 2005

Journal: :Comp.-Aided Civil and Infrastruct. Engineering 2006
Jianyang Zheng Yinhai Wang Nancy L. Nihan Mark E. Hallenbeck

Signal cycle failure (or overflow) is an interrupted traffic condition in which a number of queued vehicles are unable to depart due to insufficient capacity during a signal cycle. Cycle failure detection is essential for identifying signal control problems at intersections. However, typical traffic sensors do not have the capability of capturing cycle failures. In this paper, we introduce an a...

2014
L. Strüder J. Soltau J. Schmidt R. Hartmann M. Huth H. Soltau P. Holl M. Simson H. Ryll

Two dimensional direct detection electron imaging solid state sensor systems, subject to intense radiation, suffer from charge overflow to neighbouring pixels. This not only affects the dynamic range and linearity, but also the position precision of e.g. the electron impinging on the detector. Various techniques have been proposed to overcome the problem of charge overflowing the pixels. Severa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید