نتایج جستجو برای: overflow detection
تعداد نتایج: 572254 فیلتر نتایج به سال:
Item # Vulnerability ID Score Source Score Summary 1 CVE-2015-2059 CVSS 2.0 7.5 High libidn: out-of-bounds read with stringprep on invalid UTF-8. [1] 2 CVE-2011-1425 CVSS 2.0 7.5 High xmlsec1: arbitrary file creation when verifying signatures [2] 3 CVE-2015-7696 CVSS 3.0 6.8 Med unzip: Heap overflow and DoS in 6.0 [3] 4 CVE-2014-9471 CVSS 2.0 7.5 High coreutils: memory corruption flaw in parse_...
Fano Sequential Decoding is a technique for communicating at a high information rate and with a high reliability over a large class of channels. However, equipment cost and variation in the time required to decode successive transmitted digits limit its use. This work is concerned with the latter limitation. Others have shown that the average processing time per decoded digit is small if the in...
The operational cycle of a storm water quality control basin can be divided into the waiting period between events and the filling and draining period during an event. In this study, an inherent overflow risk is defined as the probability of having a large event exceed the basin storage capacity. Such a probability is prescribed by the basin storage capacity and the local distribution of rainfa...
Software testing is an integral part of modern software engineering practice. Past research has not only underlined its significance, but also revealed multi-faceted nature. The practice and adoption influenced by many factors that go beyond tools or technology. This paper sets out to investigate the context from practitioners’ point view mining analyzing sentimental posts on widely used questi...
Conditions are provided to conclude an error bound for truncations and perturbations of Markov decision problems. Both the average and finite horizon case are covered. The results are illustrated by a truncation of a Jacksonian queueing network with overflow control. An explicit error bound for this example is obtained. Key-words Markov Decision Problems * Truncation * Perturbation * Error Boun...
Buffer overflows still remain a problem for software today. Even with address space randomization and non-executable stacks software remains vulnerable to clever exploits. In this paper we introduce the buffer overflow through a pratical example and take a retrospective look on the past 25 years of the arms race on buffer overflow exploits and protections.
Signal cycle failure (or overflow) is an interrupted traffic condition in which a number of queued vehicles are unable to depart due to insufficient capacity during a signal cycle. Cycle failure detection is essential for identifying signal control problems at intersections. However, typical traffic sensors do not have the capability of capturing cycle failures. In this paper, we introduce an a...
Two dimensional direct detection electron imaging solid state sensor systems, subject to intense radiation, suffer from charge overflow to neighbouring pixels. This not only affects the dynamic range and linearity, but also the position precision of e.g. the electron impinging on the detector. Various techniques have been proposed to overcome the problem of charge overflowing the pixels. Severa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید