نتایج جستجو برای: intensity running forced could prevent memory corruption

تعداد نتایج: 1469556  

2015
Alessandro Di Federico Amat Cama Yan Shoshitaishvili Christopher Krügel Giovanni Vigna

Throughout the last few decades, computer software has experienced an arms race between exploitation techniques leveraging memory corruption and detection/protection mechanisms. Effective mitigation techniques, such as Address Space Layout Randomization, have significantly increased the difficulty of successfully exploiting a vulnerability. A modern exploit is often two-stage: a first informati...

Journal: :IJGHPC 2011
Jitendra Kumar Rai Atul Negi Rajeev Wankar

Sharing of resources by the cores of multi-core processors brings performance issues for the system. Majority of the shared resources belong to memory hierarchy sub-system of the processors such as last level caches, prefetchers and memory buses. Programs co-running on the cores of a multi-core processor may interfere with each other due to usage of such shared resources. Such interference caus...

2012
Satish Krishnan Thompson S. H. Teo Vivien K. G. Lim

There is growing interest in the role and contribution of e-government to the level of corruption and the eco-efficiency in terms of economic prosperity and environmental degradation of nation states. In this paper, we use publicly available archival data to explore the relationships among e-government maturity, corruption, and eco-efficiency (defined in terms of economic prosperity and environ...

2002
P. D. Ezhilchelvan

1. Introduction We consider the problem of building middleware that facilitates service replication over a wide area network (e.g., the Internet) where service replicas are typically placed in different, geographically wide-apart locations. Several group communication protocols have been proposed in the literature, some have even been implemented ([C98, DM96, Moser96, VKM96]). However, many of ...

Journal: :Archives of internal medicine 1998
P T Williams

OBJECTIVE To assess the relationships of exercise amount and exercise intensity to coronary heart disease risk factors measured cross-sectionally in runners. METHODS Physician-supplied medical data were compared with subjects' reported average running amount (kilometers run per week) and running intensity during their best recent 10-km race (kilometers per hour) in 7059 male and 1837 female r...

Journal: :Neuropsychology 2006
Carmen E Westerberg Ken A Paller Sandra Weintraub M-Marsel Mesulam Juliet S Holdstock Andrew R Mayes Paul J Reber

Recognition can be guided by familiarity, a restricted form of retrieval devoid of contextual recall, or by recollection, which occurs when retrieval is sufficient to support the full experience of remembering an episode. Recollection and familiarity were disentangled by testing recognition memory using silhouette object drawings, high target-foil resemblance, and both yes-no and forced-choice ...

2018
Ronald F. DeMara Rizwan A. Ashraf

Extreme Heterogeneity (EH) resulting from diverse processors, accelerators, and memory devices impose urgent challenges to support scientific workflows in the post-Moore era. The position taken is that in-the-loop runtime machine learning and big-data approaches can offer feasible and efficient mechanisms to manage vast resources by realizing a thin autonomous layer of control and optimization....

A. Alhassan A.S. Alade Mohammed Kida, S. Liberty

Over the years, Nigeria depends on crude oil proceeds as the major source of national income, foreign exchange and external reserves. This dependence coupled with the huge cost of running and maintaining the political structure among other factors prove disastrous by leading the economy to the worst recession in decades. We therefore, chronicle the origin, effects and way out of the recession v...

2005
Arjuna Sathiaseelan Tomasz Radzik

Studies have shown that packet reordering is common, especially in satellite networks where there are link level retransmissions and multipath routing. Moreover, satellite networks exhibit high corruption rates causing packet losses. Reordering and corruption of packets decrease the TCP performance of a network, mainly because it leads to overestimation of the congestion in the network. We cons...

Holistic and multi-disciplinary responses should be prioritized given the depth and breadth through which corruption in the healthcare sector can cover. Here, taking the Peruvian context as an example, we will reflect on the issue of corruption in health systems, including corruption with roots within and outside the health sector, and ongoing efforts to combat it. Our ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید