نتایج جستجو برای: intensity running forced could prevent memory corruption

تعداد نتایج: 1469556  

Journal: :Technological Forecasting and Social Change 2022

The economic costs of white-collar crimes, such as corruption, bribery, embezzlement, abuse authority, and fraud, are substantial. How to eradicate them is a mounting task in many countries. Using police archives, we apply machine learning algorithms predict corruption crimes Italian municipalities. Drawing on input data from 2011, our classification trees correctly forecast over 70 % (about 80...

2015
Antonio Barresi Kaveh Razavi Mathias Payer Thomas R. Gross

Modern systems rely on Address-Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to protect software against memory corruption vulnerabilities. The security of ASLR depends on randomizing regions in memory which can be broken by leaking addresses. While information leaks are common for client applications, server software has been hardened to reduce such information leaks. M...

2014
Hee Jin Kim Ki Young Shin Keun-A Chang Sangzin Ahn Hee Soon Choi Hye-Sun Kim Yoo-Hun Suh

Dehydroevodiamine·HCl (DHED) has been reported to prevent memory impairment and neuronal cell loss in a rat model with cognitive disturbance. We investigated the effect of DHED on memory impairment and behavioral abnormality caused by stress. We demonstrated that DHED can improve stress-induced memory impairments and depression-like behaviors by using open-field test, Y-maze test and forced swi...

Farinaz Nasirinezhad, Fatemeh Mohammadi, Majid Asadi-Shekaari, Marzieh Maneshian, Mina Behzadi, Mohammad Shabani,

Introduction: Minocycline has anti-inflammatory, anti-apoptotic, and anti-oxidant effects. Preclinical data suggest that minocycline could be beneficial for treating common neurological disorders, including Parkinson disease and multiple sclerosis. Methods: In this study, the effects of minocycline on harmaline-induced motor and cognitive impairments were studied in male Wistar rats. The rats ...

2017
Xiangkun Jia Chao Zhang Purui Su Yi Yang Huafeng Huang Dengguo Feng

Heap overflow is a prevalent memory corruption vulnerability, playing an important role in recent attacks. Finding such vulnerabilities in applications is thus critical for security. Many state-of-art solutions focus on runtime detection, requiring abundant inputs to explore program paths in order to reach a high code coverage and luckily trigger security violations. It is likely that the input...

2003
Emmanuel Briot Franco Gasperoni Robert Dewar Dirk Craeynest Philippe Waroquiers

This article discusses the tools that Ada offers to deal with dynamic memory problems. The article shows how the storage pools mechanism of Ada 95 can be extended to enpower developers when tracking memory leaks and memory corruption in their code. This Ada extension rests on the notion of “checked pools”, i.e. storage pools with an additional Dereference operation. The paper describes how a pa...

1999
Philip Bohannon Rajeev Rastogi S. Seshadri Abraham Silberschatz S. Sudarshan

Increasingly, for extensibility and performance, specialpurpose application code is being integrated with database system code. Such application code has direct access to database system buffers, and as a result, the danger of data being corrupted due to inadvertent application writes is increased. Previously proposed hardware techniques to protect from corruption require system calls, and thei...

2016
Alexandra Boldyreva Taesoo Kim Richard J. Lipton Bogdan Warinschi

Memory corruption attacks may lead to complete takeover of systems. There are numerous works offering protection mechanisms for this important problem. But the security guarantees that are offered by most works are only heuristic and, furthermore, most solutions are designed for protecting the local memory. In this paper we initiate the study of provably secure remote memory attestation; we con...

ABSTRACT: Aim: Quantifying the relationship between volume and intensity as key components of training is a precise manner that is complicated for most coaches.  The aim of this study was to quantify the inverse relationships between training volume and intensity during exhaustive treadmill running among active young men. Method and Material: 32 active young men aged 21 years selected as subjec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید