The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for overflow with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1957-1976 (16) 1977-1980 (16) 1981-1983 (16) 1984-1985 (16) 1986-1987 (20) 1988-1989 (19) 1990-1991 (22) 1992-1993 (24) 1994-1995 (24) 1996 (15) 1997 (17) 1998 (18) 1999 (19) 2000 (27) 2001 (35) 2002 (46) 2003 (68) 2004 (78) 2005 (97) 2006 (122) 2007 (110) 2008 (113) 2009 (72) 2010 (39) 2011 (32) 2012 (29) 2013 (41) 2014 (45) 2015 (55) 2016 (72) 2017 (72) 2018 (94) 2019 (106) 2020 (112) 2021 (105) 2022 (115) 2023 (113) 2024 (22)
Publication types (Num. hits)
article(873) book(1) data(2) incollection(6) inproceedings(1178) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1155 occurrences of 729 keywords

Results
Found 2062 publication records. Showing 2062 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
95Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh Scalable network-based buffer overflow attack detection. Search on Bibsonomy ANCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CTCP, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks, buffer overflow attacks
86Surupa Biswas, Thomas W. Carley, Matthew S. Simpson, Bhuvan Middha, Rajeev Barua Memory overflow protection for embedded systems using run-time checks, reuse, and compression. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Out-of-memory errors, reliability, data compression, reuse, run-time checks, heap overflow, stack overflow
84Per-Åke Larson Analysis of Index-Sequential Files with Overflow Chaining. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1981 DBLP  DOI  BibTeX  RDF ISAM, index sequential files, indexed sequential access method, overflow chaining, overflow handling, performance analysis, analytic model, analysis of algorithms, file organization, overflow, file structure
79Yong-Joon Park, Gyungho Lee Repairing return address stack for buffer overflow protection. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF computer architecture, computer security, buffer overflow, intrusion tolerance
71Han Zhou, Chong Hwa Ghang, Da Tong Han A dynamic bandwidth allocation scheme for ATM networks. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF minimum overflow traffic algorithm, multiclass traffic environment, overflow traffic function, bandwidth assignment, mean overflow traffic to bandwidth ratio, optimization object function, average virtual cell loss probability, link capacity, quality of service, performance evaluation, asynchronous transfer mode, ATM networks, high throughput, dynamic bandwidth allocation
69Deok Jin Kim, Tae-Hyung Kim, Jong Kim 0001, Sung Je Hong Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Return Address, return-into-libc Attack, Data Injection Buffer Overflow Attack, Security, Randomization, Buffer Overflow, Instruction Set
65Michel Mandjes, Ad Ridder A large deviations analysis of the transient of a queue with many Markov fluid inputs: approximations and fast simulation. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF importance sampling simulations, large deviations asymptotics, transient probabilities, buffer overflow, queuing theory, IP routers, calculus of variations, ATM multiplexers
64Vinaitheerthan Sundaram, Sandip HomChaudhuri, Sachin Garg, Chandra M. R. Kintala, Saurabh Bagchi Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF resource constrained fault-tolerance, embedded systems, software rejuvenation, heap overflow, stack overflow
63Yongjian Hu, Heung-Kyu Lee, Jianwei Li DE-Based Reversible Data Hiding With Improved Overflow Location Map. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
62Tzu-Rung Lee, Kwo-Cheng Chiu, Da-Wei Chang A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Failure-Oblivious Computing, Guard Pages, Network Security, Self Reconfiguration, Buffer Overflow Attacks
62Andrzej Chydzinski Time to Buffer Overflow in an MMPP Queue. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MMPP queue, Performance evaluation, buffer overflow
62Shensheng Tang, Wei Wayne Li Modeling and analysis of hierarchical cellular networks with bidirectional overflow and take-back strategies under generally distributed cell residence times. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Take-back, Channel occupancy time, Handoff, Overflow, Cell residence time, Hierarchical cellular networks
62Wenhao Shan, Pingzhi Fan, Yi Pan 0001 Performance Evaluation of a Hierarchical Cellular System with Mobile Velocity-Based Bidirectional Call-Overflow Scheme. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Hierarchical cellular system, guard channel, Markov process, overflow
62Thomas Toth, Christopher Krügel Accurate Buffer Overflow Detection via Abstract Payload Execution. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Intrusion Detecion, Buffer Overflow Exploit, Network Security
62Michael J. Schulte, Pablo I. Balzola, Ahmet Akkas, Robert W. Brocato Integer Multiplication with Overflow Detection or Saturation. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF unsigned, tree multipliers, computer arithmetic, array multipliers, Overflow, saturation, integer, two's complement
61Surupa Biswas, Matthew S. Simpson, Rajeev Barua Memory overflow protection for embedded systems using run-time checks, reuse and compression. Search on Bibsonomy CASES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF out-of-memory errors, reliability, data compression, reuse, runtime checks, heap overflow, stack overflow
55Babak Salamat, Andreas Gal, Todd Jackson, Karthikeyan Manivannan, Gregor Wagner, Michael Franz Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy 0001, Tudor Leu A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
55Zili Shao, Qingfeng Zhuge, Yi He 0001, Edwin Hsing-Mean Sha Defending Embedded Systems Against Buffer Overflow via Hardware/Software. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
55Tzi-cker Chiueh, Fu-Hau Hsu RAD: A Compile-Time Solution to Buffer Overflow Attacks. Search on Bibsonomy ICDCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
54Mustafa Gök, Michael J. Schulte, Mark G. Arnold Integer Multipliers with Overflow Detection. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF high-speed arithmetic algorithms, overflow detection, Computer arithmetic, multiplication, combinational logic
54Zili Shao, Chun Xue, Qingfeng Zhuge, Mei Kang Qiu, Bin Xiao 0001, Edwin Hsing-Mean Sha Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hardware/software, Security, embedded system, protection, buffer overflow attack
54Krerk Piromsopa, Richard J. Enbody Secure Bit: Transparent, Hardware Buffer-Overflow Protection. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Buffer overflow, security and protection, security kernels, invasive software
54Mustapha Refai Exploiting a buffer overflow using metasploit framework. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metasploit, framework, buffer overflow, exploit, buffer overrun
54Yi-Bing Lin Eliminating Overflow for Large-Scale Mobility Databases in Cellular Telephone Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cellular telephone network, database overflow, visitor location register, home location register, large-scale database
47Yoonseo Choi, Hwansoo Han Optimal register reassignment for register stack overflow minimization. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF register stack, sequence graph, register allocation, Register assignment
47Hiroyasu Nishiyama SecureC: Control-Flow Protection Against General Buffer Overflow Attack. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Bharat B. Madan, Shashi Phoha, Kishor S. Trivedi StackOFFence: A Technique for Defending Against Buffer Overflow Attacks. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao 0001 Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Nathan Tuck, Brad Calder, George Varghese Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow. Search on Bibsonomy MICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Lynn Choi, Yong Shin Enforcement of Architectural Safety Guards to Deter Malicious Code Attacks through Buffer Overflow Vulnerabilities. Search on Bibsonomy ARCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Jiahua Zhu, HongJiang Zhang, Hui Shi, Binyu Zang, Chuanqi Zhu Overflow Controlled SIMD Arithmetic. Search on Bibsonomy LCPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Ioannis Ch. Paschalidis, Spyridon Vassilaras Model-based estimation of buffer overflow probabilities from measurements. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Akaike's information criterion, estimation, large deviations, effective bandwidth, Markov-modulated processes
45Mariusz Glabowski, Katarzyna Kubasik, Maciej Stasiak Modeling of systems with overflow multi-rate traffic. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Overflow traffic, Multiservice systems, Kaufman-Roberts recursion
45Hossain Shahriar, Mohammad Zulkernine Mutation-Based Testing of Buffer Overflow Vulnerabilities. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Mutation-based testing, Vulnerabilities, Buffer overflow
45Kelvin Ku, Thomas E. Hart, Marsha Chechik, David Lie A buffer overflow benchmark for software model checkers. Search on Bibsonomy ASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF model checking, benchmark, buffer overflow, array bounds checking
45Yong-Joon Park, Zhao Zhang, Gyungho Lee Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks. Search on Bibsonomy IEEE Micro The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Microarchitectural protection, stack-based, buffer overflow, RAS
45Andreas Brandt 0001, Manfred Brandt Individual Overflow and Freed Carried Traffics for a Link with Trunk Reservation. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF overflow traffic, freed carried traffic, factorial moments, peakedness, two-moment method, circuit switched network, trunk reservation
45Yongsu Park, Yookun Cho An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks. Search on Bibsonomy PARA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF randomization, buffer overflow, system security
45Andrew T. Phillips, Jack S. Eddy Tan Exploring security vulnerabilities by exploiting buffer overflow using the MIPS ISA. Search on Bibsonomy SIGCSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, pedagogy, buffer overflow
44A. Landauro, J. Liénard An Overflow Detection and Correction in Digital Filters. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1975 DBLP  DOI  BibTeX  RDF overflow detection, overflow oscillations, serial-parallel multiplier, Digital filters
41Devang Jariwala, John Lillis Trunk decomposition based global routing optimization. Search on Bibsonomy ICCAD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Qian Huang 0003, King-Tim Ko, Villy Bæk Iversen An Approximation Method for Multiservice Loss Performance in Hierarchical Networks. Search on Bibsonomy ITC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF overlay network, Hierarchical network, overflow
40Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon A Novel Traffic Independent NNC for Dynamic Buffer Tuning to Shorten the RTT of a TCP Channel. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PIDC, dynamic buffer tuning, traffic pattern independent, buffer overflow, active queue management, Neural Network Controller
40Douglas M. Priest Efficient scaling for complex division. Search on Bibsonomy ACM Trans. Math. Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Complex division, underflow, overflow
40Bárbara González-Arévalo Performance of a Leaky Bucket System with Long-Range Dependent Input Traffic. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF time until overflow, flow control, long-range dependence, finite buffer, heavy tails, leaky bucket, fluid queue
40May T. W. Ip, Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon, Dianhui Wang An Adaptive Buffer Management Algorithm for Enhancing Dependability and Performance in Mobile-Object-Based Real-Time Computing . Search on Bibsonomy ISORC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF MORC, P+I+D control algorithm, Convergence Algorithm, adaptive, buffer overflow
40Michael Weber, Viren Shah, Chris Ren A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. Search on Bibsonomy SCAM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF static analysis, buffer overflow, software security, software certification
39Bhuvan Middha, Matthew S. Simpson, Rajeev Barua MTSS: Multitask stack sharing for embedded systems. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Out-of-memory errors, cactus stack, meshed stack, reliability, data compression, reuse, virtual memory, runtime checks, heap overflow, stack overflow
38Sirisara Chiamwongpaet, Krerk Piromsopa The implementation of Secure Canary Word for buffer-overflow protection. Search on Bibsonomy EIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Wei Le, Mary Lou Soffa Marple: a demand-driven path-sensitive buffer overflow detector. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Wei Le, Mary Lou Soffa Refining buffer overflow detection via demand-driven path-sensitive analysis. Search on Bibsonomy PASTE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF path-sensitive, demand-driven, infeasible paths
38João Durães, Henrique Madeira A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code. Search on Bibsonomy LADC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Phone Lin, Yi-Bing Lin, Imrich Chlamtac Overflow control for UMTS high-speed downlink packet access. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Ge Zhu, Akhilesh Tyagi Protection against Indirect Overflow Attacks on Pointers. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Aishwarya Iyer, Lorie M. Liebrock Vulnerability Scanning for Buffer Overflow. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao 0001 Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Vahid Tabataba Vakili, Arash Aziminejad, Mohammad Reza Dehbozorgi A novel speed-sensitive bidirectional overflow and hand-down resource allocation strategy for hierarchical cellular networks. Search on Bibsonomy ISICT The full citation details ... 2003 DBLP  BibTeX  RDF hierarchical cellular structure, speed estimation and segregation, teletraffic performance, resource management
38Yang-Seo Choi, Dong-il Seo, Sung Won Sohn A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Robert B. Cooper, Martin K. Solomon The Average Time Until Bucket Overflow. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
37Michel Mandjes, Ad Ridder Optimal trajectory to overflow in a queue fed by a large number of sources. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF large deviations asymptotics, queueing theory, buffer overflow, calculus of variations, ATM multiplexers
33Yanheng Zhang, Yue Xu, Chris Chu FastRoute3.0: a fast and high quality global router based on virtual capacity. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33David Chase, Yossi Lev Dynamic circular work-stealing deque. Search on Bibsonomy SPAA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF deque, load balancing, lock-free, work stealing
33Shuo Chen 0001, Zbigniew Kalbarczyk, Jun Xu 0003, Ravishankar K. Iyer A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. Search on Bibsonomy DSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data analysis, security vulnerabilities, finite state machine modeling
33Ashok Rathi, Huizhu Lu, George E. Hedrick Performance Comparison of Extendible Hashing and Linear Hashing Techniques. Search on Bibsonomy SIGSMALL/PC Symposium The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
32Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter 0001 Breaking the memory secrecy assumption. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF buffer overread, probabilistic countermeasure, buffer overflow, systems security, bypass
32Shang Ma, Jianhao Hu, Lin Zhang, Xiang Ling 0002 An efficient RNS parity checker for moduli set {2 n - 1, 2 n + 1, 22 n + 1} and its applications. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF number comparison, sign determination, overflow detection, VLSI, RNS, parity check
32Weiwei Sun 0008, Yongrui Qin, Ping Yu 0001, Zhuoyao Zhang, Zhenying He HFilter: Hybrid Finite Automaton Based Stream Filtering for Deep and Recursive XML Data. Search on Bibsonomy DEXA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF XML stream filtering, deep and recursive XML data, hybrid finite automaton, data prefix sharing, memory overflow control
32Dimitar Radev, Elena Rashkova Computer simulation of rare event for M/M/1/N queuing system. Search on Bibsonomy CompSysTech The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Markov chains, simulation modeling, queuing theory, rare event, overflow probability
32Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer architecture, computer security, buffer overflow attack
32Yongsu Park, Yong Ho Song, Eul-Gyu Im Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer architecture, computer security, buffer overflow attack
32Chu Chao, Qin Zhang, Yingke Xie, Chengde Han Design of a high performance FFT processor based on FPGA. Search on Bibsonomy ASP-DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF FFT processor, overflow control, FPGA, address generation
32Belka Kraimeche, Habiba Skalli A frequency-hopping scheme for interference control in a GSM/GPRS network. Search on Bibsonomy WMuNeP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF interference control, GSM, GPRS, frequency hopping, overflow
32Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu, Erez Zadok An electric fence for kernel buffers. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, file systems, buffer overflow
32Ozcan Ozturk 0002, Ravi Mazumdar, Nikolay B. Likhanov Many Sources Asymptotics for Networks with Small Buffers. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF many sources asymptotics, overflow probabilities, large deviation principle
32Do Young Eun, Ness B. Shroff A measurement-analytic approach for QoS estimation in a network based on the dominant time scale. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF dominant time scale (DTS), measurements, Gaussian processes, stopping criterion, overflow probability
32Boris Igelnik, Yaakov Kogan, Vladimir Kriman, Debasis Mitra 0001 A new computational approach for stochastic fluid models of multiplexers with heterogeneous sources. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF buffer overflow probability, two-dimensional interpolating polynomials, Fluid models, ATM multiplexing, recursive computation
32Alexander Birman, H. Richard Gail, Sidney L. Hantler, Zvi Rosberg, Moshe Sidi An Optimal Service Policy for Buffer Systems. Search on Bibsonomy J. ACM The full citation details ... 1995 DBLP  DOI  BibTeX  RDF gradual input, multiplexor, switch, buffer overflow, parallel queues, service discipline
31Bhuvan Middha, Matthew S. Simpson, Rajeev Barua MTSS: multi task stack sharing for embedded systems. Search on Bibsonomy CASES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cactus stack, meshed stack, out-of-memory, reliability, reuse, runtime checks, heap overflow, stack overflow
31Carol A. Niznik A Quantization Approximation for Modeling Computer Network Nodal Queueing Delay. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1983 DBLP  DOI  BibTeX  RDF staircase function, Average Fractional Overflow, GI/ G1, Peak Measurement Accuracy, Peak Measurement Complexity, Markov Chain, quantization, buffer overflow, queueing system, mean waiting time
31Harvey L. Garner Theory of Computer Addition and Overflows. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1978 DBLP  DOI  BibTeX  RDF overflow behavior, Additive identity, compute through overflow (CTO), models of computer arithmetic, computer arithmetic, number systems
30Huang-Yu Chen, Chin-Hsiung Hsu, Yao-Wen Chang High-performance global routing with fast overflow reduction. Search on Bibsonomy ASP-DAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Chung-Ping Chung, Tung-Lin Lu, Hui-Chin Yang H-Buffer: An Efficient History-Based and Overflow Sharing Transparent Fragment Storage Method. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Gang Uk Hwang Analysis of Medium Access Delay and Packet Overflow Probability in IEEE 802.11 Networks. Search on Bibsonomy NEW2AN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Mariusz Glabowski, Katarzyna Kubasik, Maciej Stasiak Modeling of Systems with Overflow Multi-Rate Traffic. Search on Bibsonomy AICT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Seon Wook Kim, Chong-liang Ooi, Rudolf Eigenmann, Babak Falsafi, T. N. Vijaykumar Exploiting reference idempotency to reduce speculative storage overflow. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Idempotent references, compiler-assisted speculative execution, speculation
30Victor F. Nicola, Tatiana S. Zaburnenko Efficient simulation of population overflow in parallel queues. Search on Bibsonomy WSC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Koji Inoue Energy-security tradeoff in a secure cache architecture against buffer overflow attacks. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Andrzej Chydzinski, Ryszard Winiarczyk Distribution of the First Buffer Overflow Time in a Deterministic Service Time Queue. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon FLC: A Novel Dynamic Buffer Tuner for Shortening Service Roundtrip Time over the Internet by Eliminating User-Level Buffer Overflow on the Fly. Search on Bibsonomy APPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Archana Pasupulati, Jason Coit, Karl N. Levitt, Shyhtsun Felix Wu, S. H. Li, J. C. Kuo, K. P. Fan Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. Search on Bibsonomy NOMS (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Alexander A. Kist, Richard J. Harris 0002 Cost efficient overflow routing for outbound ISP traffic. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Changwoo Pyo, Byungchul Bae, Taejin Kim, Gyungho Lee Run-time Detection of Buffer Overflow Attacks without Explicit Sensor Data Objects. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Lennart Harnefors, Johnny Holmberg, Svante Signell Suppression of overflow limit cycles in LDI allpass/lattice filters. Search on Bibsonomy ISCAS (3) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
30Per-Åke Larson Linear Hashing with Overflow-Handling by Linear Probing. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
29Xinran Wang, Chi-Chun Pan, Peng Liu 0005, Sencun Zhu SigFree: A Signature-Free Buffer Overflow Attack Blocker. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Intrusion detection, code-injection attacks, buffer overflow attacks
29Krerk Piromsopa, Sirisara Chiamwongpaet Secure Bit Enhanced Canary: Hardware Enhanced Buffer-Overflow Protection. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Protection, Buffer overflow, security kernels, invasive software
29A. B. Dieker, Michel Mandjes Fast simulation of overflow probabilities in a queue with Gaussian input. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Asymptotic efficiency, queueing theory, importance sampling, large deviations, Gaussian processes, overflow probability
29Changwoo Pyo, Gyungho Lee Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF program counter, function pointer encoding, memory arrangement checking, buffer overflow attack
Displaying result #1 - #100 of 2062 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license