|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1155 occurrences of 729 keywords
|
|
|
Results
Found 2062 publication records. Showing 2062 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | Boris Tsybakov, Nicolas D. Georganas |
On self-similar traffic in ATM queues definitions, overflow probability bound, and cell delay distribution. |
IEEE/ACM Trans. Netw. |
1997 |
DBLP DOI BibTeX RDF |
cell delay, finite ATM buffer, self-similar traffic, overflow probability, cell loss |
29 | Fred J. Taylor |
An Overflow-Free Residue Multiplier. |
IEEE Trans. Computers |
1983 |
DBLP DOI BibTeX RDF |
residue numbers, Dynamic range overflow, fixed-point multiplier, error model |
27 | Eric W. M. Wong, Yin-Chi Chan |
A Century-Long Challenge in Teletraffic Theory: Blocking Probability Evaluation for Overflow Loss Systems With Mutual Overflow. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Mark Swillus, Andy Zaidman |
Sentiment Overflow in the Testing Stack: Analysing Software Testing Posts on Stack Overflow. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Mark Swillus, Andy Zaidman |
Sentiment overflow in the testing stack: Analyzing software testing posts on Stack Overflow. |
J. Syst. Softw. |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Lili Xu, Mingjie Xu, Feng Li, Wei Huo |
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Mingjie Xu, Shengnan Li, Lili Xu, Feng Li, Wei Huo, Jing Ma, Xinhua Li, Qingjia Huang |
A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection. |
Inscrypt |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Dorra Attiaoui |
Belief Detection and Temporal Analysis of Experts in Question Answering Communities: case study Stack Overflow. (Détection et Analyse Temporelle des Experts dans les Réseaux Communautaires de Questions Réponses : étude de cas Stack Overflow). |
|
2017 |
RDF |
|
27 | Hao Sun, Xiangyu Zhang 0001, Chao Su, Qingkai Zeng 0002 |
Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability. |
AsiaCCS |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Yunquan Dong, Pingyi Fan, Khaled Ben Letaief, Ross D. Murch |
Performance analysis for buffer-aided communication over block Rayleigh fading channels: queue length distribution, overflow probability, and ε-overflow rate. |
Wirel. Commun. Mob. Comput. |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Chao Zhang 0008, Wei Zou, Tielei Wang, Yu Chen, Tao Wei |
Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat. |
J. Comput. Secur. |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Yong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng |
RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Chao Zhang 0008, Tielei Wang, Tao Wei, Yu Chen, Wei Zou |
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. |
ESORICS |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Kyung-suk Lhee, Steve J. Chapin |
Buffer overflow and format string overflow vulnerabilities. |
Softw. Pract. Exp. |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Tsung-Hsien Lee, Ting-Chi Wang |
Robust layer assignment for via optimization in multi-layer global routing. |
ISPD |
2009 |
DBLP DOI BibTeX RDF |
optimization, computer-aided design, global routing, via, layer assignment |
25 | Zhen Cao, Tong Jing, Jinjun Xiong, Yu Hu 0002, Zhe Feng 0002, Lei He 0001, Xianlong Hong |
Fashion: A Fast and Accurate Solution to Global Routing Problem. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Qian Huang 0003, King-Tim Ko, Villy Bæk Iversen |
Approximation of loss calculation for hierarchical networks with multiservice overflows. |
IEEE Trans. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Jhih-Rong Gao, Pei-Ci Wu, Ting-Chi Wang |
A new global router for modern designs. |
ASP-DAC |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yen-Jung Chang, Yu-Ting Lee, Ting-Chi Wang |
NTHU-Route 2.0: a fast and stable global router. |
ICCAD |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Denis I. Miretskiy, Werner R. W. Scheinhardt, Michel Mandjes |
Tandem queue with server slow-down. |
SIGMETRICS Perform. Evaluation Rev. |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 |
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
memory corruption, debugging, vulnerability analysis |
25 | Sriram Sankaranarayanan 0001, Franjo Ivancic, Aarti Gupta |
Program Analysis Using Symbolic Ranges. |
SAS |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Colin Blundell, Joe Devietti, E. Christopher Lewis, Milo M. K. Martin |
Making the fast case common and the uncommon case simple in unbounded transactional memory. |
ISCA |
2007 |
DBLP DOI BibTeX RDF |
parallel programming, concurrency, transactions, transactional memory |
25 | Leonidas Georgiadis, Leandros Tassiulas |
Optimal overload response in sensor networks. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
lexicographic optimization, lost traffic minimization, most balanced allocation, overload response, sensor networks, distributed algorithms, network control, throughput maximization |
25 | Guanling Chen, David Kotz |
Policy-Driven Data Dissemination for Context-Aware Applications. |
PerCom |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Wilfred W. K. Lin, Tharam S. Dillon, Allan K. Y. Wong |
Using the Novel FLC Dynamic Buffer Size Tuning Technique to Support More Dependable Location-Aware Information Retrieval. |
ICMB |
2005 |
DBLP DOI BibTeX RDF |
location-aware information retrieval, small-form-factor (SFF) devices, Fuzzy Logic Controller (FLC), dynamic buffer size tuning, Internet traffic patterns, dependability |
25 | Rami Atar, Adam Shwartz, Paul Dupuis |
Explicit Solution for a Network Control Problem in the Large Deviation Regime. |
Queueing Syst. Theory Appl. |
2004 |
DBLP DOI BibTeX RDF |
stochastic risk-sensitive control, HJB equation, large deviations, tandem queue, differential game |
25 | Christopher Dahn, Spiros Mancoridis |
Using Program Transformation to Secure C Programs Against Buffer Overflows. |
WCRE |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Ruby B. Lee, David K. Karig, John Patrick McGregor, Zhijie Shi |
Enlisting Hardware Architecture to Thwart Malicious Code Injection. |
SPC |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Ravishankar K. Iyer, Shuo Chen 0001, Jun Xu 0003, Zbigniew Kalbarczyk |
Security Vulnerabilities - From Data Analysis to Protection Mechanisms. |
WORDS Fall |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Christof Fetzer, Zhen Xiao |
Detecting Heap Smashing Attacks through Fault Containment Wrappers. |
SRDS |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Francesca Cesarini, Giovanni Soda |
A Dynamic Hash Method with Signature. |
ACM Trans. Database Syst. |
1991 |
DBLP DOI BibTeX RDF |
dynamic hashing, external hashing, generalized spiral storage, signature functions |
25 | Peter B. Danzig |
Finite Buffers and Fast Multicast. |
SIGMETRICS |
1989 |
DBLP DOI BibTeX RDF |
|
24 | Sameh Najeh, Hichem Besbes |
Queue-balancing resource allocation for rate-stable OFDMA systems. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
OFDMA system, stability, fairness, buffer overflow |
24 | Dino Schweitzer, Jeff Boleng |
A simple machine simulator for teaching stack frames. |
SIGCSE |
2010 |
DBLP DOI BibTeX RDF |
stack frames, visualization, active learning, buffer overflow |
24 | Mingfu Li, Shih-Han Cheng |
Arrival Process-Controlled Adaptive Media Playout for Video Streaming. |
FMN |
2009 |
DBLP DOI BibTeX RDF |
Adaptive media playout, Buffer underflow, Buffer overflow, Multimedia streaming, Arrival process |
24 | Bart Steyaert, Koenraad Laevens, Danny De Vleeschauwer, Herwig Bruneel |
Analysis and design of a playout buffer for VBR streaming video. |
Ann. Oper. Res. |
2008 |
DBLP DOI BibTeX RDF |
Dejittering, Playout buffer, Underflow, Streaming media, Overflow |
24 | Aurélien Francillon, Claude Castelluccia |
Code injection attacks on harvard-architecture devices. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
harvard architecture, return oriented programming, wireless sensor networks, buffer overflow, embedded devices, computer worms, code injection attacks, gadgets |
24 | Sriraman Tallam, Chen Tian 0002, Rajiv Gupta 0001, Xiangyu Zhang 0001 |
Avoiding Program Failures Through Safe Execution Perturbations. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
avoiding failures, environmental faults, logging/replay tools, bad user requests, heap overflow, atomicity violation |
24 | Qian Huang 0003, King-Tim Ko, Sammy Chan, Villy Bæk Iversen |
Loss performance evaluation in heterogeneous hierarchical networks. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
multiservice loss model, overflow traffic, hierarchical network |
24 | R. Krishnan, S. Murali Krishna, Nishil Bharill |
Code quality tools: learning from our experience. |
ACM SIGSOFT Softw. Eng. Notes |
2007 |
DBLP DOI BibTeX RDF |
buffer overflow and memory corruption, memory leak, code quality |
24 | Hsiang-Lun Huang, Tzong-Jye Liu, Kuong-Ho Chen, Chyi-Ren Dow, Lih-Chyau Wuu |
A polymorphic shellcode detection mechanism in the network. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
polymorphic shellcode, intrusion detection system, buffer overflow |
24 | Hilmi Ozdoganoglu, T. N. Vijaykumar, Carla E. Brodley, Benjamin A. Kuperman, Ankit Jalote |
SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
function return address, hardware stack, Buffer overflow |
24 | Jaydip Sen, Piyali Roy Chowdhury, Indranil Sengupta 0001 |
A Mechanism for Detection and Prevention of Distributed Denial of Service Attacks. |
ICDCN |
2006 |
DBLP DOI BibTeX RDF |
Traffic level measurement, Security, DDoS, Buffer overflow |
24 | Hyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee 0001 |
A Model for Security Vulnerability Pattern. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Abstract Syntax Tree (AST), Static analysis, Buffer overflow, Software security, Pushdown Automata (PDA) |
24 | Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou |
Improving software security via runtime instruction-level taint checking. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
format string, hardware tagging, buffer overflow |
24 | Do Young Eun, Ness B. Shroff |
Analyzing a Two-Stage Queueing System with Many Point Process Arrivals at Upstream Queue. |
Queueing Syst. Theory Appl. |
2004 |
DBLP DOI BibTeX RDF |
many-sources-asymptotic, queueing networks, point processes, overflow probability |
24 | M. F. M. Nuyens |
The Maximum Queue Length for Heavy-Tailed Service Times in the M/G/1 FB Queue. |
Queueing Syst. Theory Appl. |
2004 |
DBLP DOI BibTeX RDF |
maximum queue length, log-convex density, foreground background (FB), unstable queue, finite waiting room, buffer, overflow, heavy tails, service discipline, busy cycle |
24 | Misha Zitser, Richard Lippmann, Tim Leek |
Testing static analysis tools using exploitable buffer overflows from open source code. |
SIGSOFT FSE |
2004 |
DBLP DOI BibTeX RDF |
test detection, security, evaluation, static analysis, source code, buffer overflow, exploit, false alarm |
24 | Dewi Utami, Hadi Suwastio, Bambang Sumadjudin |
FPGA Implementation of Digital Chaotic Cryptography. |
EurAsia-ICT |
2002 |
DBLP DOI BibTeX RDF |
digital filter overflow, FPGA, cryptography, Chaos, fixed point |
24 | Hee Yong Youn, Choong Gun Oh, Hyunseung Choo, Jin-Wook Chung, Dongman Lee |
An Efficient Algorithm-Based Fault Tolerance Design Using the Weighted Data-Check Relationship. |
IEEE Trans. Computers |
2001 |
DBLP DOI BibTeX RDF |
Hamming correcting code, VLSI processor array, Algorithm-based fault tolerance, overflow, matrix computations, round-off error |
24 | Sangman Bak, Albert Mo Kim Cheng, Jorge Arturo Cobb, Ernst L. Leiss |
Load-Balanced Routing and Scheduling for Real-Time Traffic in Packet-Switch Networks. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
load-balanced routing, shortest-path routing protocols, least-laxity scheduling algorithm, scheduling, protocols, computer networks, computer networks, packet switching, routing algorithm, scheduling algorithm, buffer overflow, telecommunication network routing, telecommunication traffic, packet loss, time-delay, packet-switch networks, end-to-end delay, bottlenecks, real-time traffic, network throughput, traffic load, data packets |
24 | Tatsuya Hagiwara, Hiroki Doi, Hideki Tode, Hiromasa Ikeda |
High-Speed Calculation Method of the Hurst Parameter Based on Real Traffic. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
high-speed calculation method, traffic measurement analysis, packet traffic, long range dependent properties, variance-time plot method, performance, packet switching, fractals, self-similarity, buffer overflow, telecommunication traffic, network performance, telecommunication congestion control, network control, Hurst parameter |
24 | Albrecht P. Stroele |
Test response compaction using arithmetic functions. |
VTS |
1996 |
DBLP DOI BibTeX RDF |
arithmetic functions, combinational faults, underflow, feed back, logic testing, built-in self test, digital arithmetic, test pattern generation, adders, circuits, registers, aliasing probability, overflow, subtracters, test response compaction, arithmetic logic units |
24 | Soong Hee Lee |
A Reactive Access Control Scheme at UNI for Congestion Control in ATM-Based B-ISDN. |
LCN |
1996 |
DBLP DOI BibTeX RDF |
reactive access control scheme, UNI, ATM-based B-ISDN, active traffic sources, feedback traffic, GFC field, B-NT system, network congestion state, probability of overflow, node output buffer, generic flow control, broadband network termination, user network interface, performance evaluation, asynchronous transfer mode, congestion control, computer simulation |
24 | Victor C. S. Lee, Joseph Kee-Yin Ng, Kam-yiu Lam, Sheung-lun Hung |
Performance Studies of Transmitting Real-Time MPEG-I Video in ATM Networks. |
LCN |
1996 |
DBLP DOI BibTeX RDF |
real-time MPEG-I video, real video programmes, workload characteristics, cell miss ratio, deadline missing, burst loss ratio, first-come-first-serve scheduling algorithm, virtual path bandwidth, simulation, asynchronous transfer mode, ATM networks, buffer overflow, ATM switch, gateways, performance studies, video data, video clips, cell loss ratio |
24 | Hoon Lee |
A Gracious Cell Discard Scheme in ATM Multiplexer. |
LCN |
1996 |
DBLP DOI BibTeX RDF |
gracious cell discard control, ATM output multiplexer, gracious cell throttle, temporary queue, main queue, high priority cells, low priority cells, nonlinear filter function, cell rejection policy, partial rejection, prioritized selection, QoS measures, cell delay, quality of service, asynchronous transfer mode, congestion control, overflow, ATM multiplexer, cell loss, finite capacity queue |
24 | Luis A. Montalvo, Alain Guyot |
Svoboda-Tung division with no compensation. |
VLSI Design |
1995 |
DBLP DOI BibTeX RDF |
Svoboda-Tung division, radix-b division algorithm, iteration overflow, most significant digits, radix-b algorithm, IEEE normalised divisor, pre-scaling technique, stepwise approximation, VLSI, iterative methods, digital arithmetic, VLSI implementation, prescalers, dividing circuits |
24 | Peter B. Danzig |
Flow Control for Limited Buffer Multicast. |
IEEE Trans. Software Eng. |
1994 |
DBLP DOI BibTeX RDF |
multiround flow control algorithm, limited buffer multicast, response holding, backoff time, recipients, available buffer space, buffer service time distribution, message retransmission, service time distribution, limited-buffer preemptive queuing process, protocol processing layers, multiprogrammed operating system, protocols, queueing theory, accuracy, storage management, buffer overflow, buffer storage, multiprogramming, network operating systems, telecommunications control, approximate analysis |
24 | Yaoxue Zhang, Kaoru Takahashi, Norio Shiratori, Shoichi Noguchi |
An Interactive Protocol Synthesis Algorithm Using a Global State Transition Graph. |
IEEE Trans. Software Eng. |
1988 |
DBLP DOI BibTeX RDF |
interactive protocol synthesis algorithm, global state transition graph, global state transition graph, deadlock avoidance rules, complete reception, protocols, graph theory, finite-state machines, finite automata, buffer overflow, production rules, interactive programming, deadlock freeness |
22 | Shikun Chen, Zhoujun Li |
Simplifying Buffer Overflow Detection Using Site-Safe Expressions. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Yves Younan, Frank Piessens, Wouter Joosen |
Protecting Global and Static Variables from Buffer Overflow Attacks. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Tugkan Tuglular, Can Arda Muftuoglu, Özgür Kaya, Fevzi Belli, Michael Linschulte |
GUI-Based Testing of Boundary Overflow Vulnerability. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Arif Ali Rehman, Abid Karim, Shakeel Ahmed Khoja |
Blocking Probabilities in WDM Switching Networks Using Overflow Analysis Method. |
IMTIC |
2008 |
DBLP DOI BibTeX RDF |
WDM switching networks, Equivalent Random Theory (ERT) |
22 | Victor F. Nicola, Tatiana S. Zaburnenko |
Efficient importance sampling heuristics for the simulation of population overflow in Jackson networks. |
ACM Trans. Model. Comput. Simul. |
2007 |
DBLP DOI BibTeX RDF |
Asymptotic efficiency, importance sampling, variance reduction, queuing models, rare event simulation, Jackson networks |
22 | Alexey Smirnov 0001, Tzi-cker Chiueh |
Automatic Patch Generation for Buffer Overflow Attacks. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Xiaolong Wu, Jun Zheng 0003, Emma E. Regentova, Yingtao Jiang |
Analysis of the Effect of Channel Sub-rating in Unidirectional Call Overflow Scheme for Call Admission in Hierarchical Cellular Networks. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Takao Hinamoto, Takuro Kawagoe |
Optimal Synthesis of State-Estimate Feedback Controllers with Minimum l2-Sensitivity and No Overflow Oscillations. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Andrzej Chydzinski |
Buffer overflow calculations in a batch arrival queue. |
SIGMETRICS Perform. Evaluation Rev. |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Tigang Jiang, Yuming Mao |
Bidirectional overflow channel allocation scheme with handoff queuing for macro/micro cellular systems. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
handoff, channel allocation, queuing |
22 | Victor F. Nicola, Tatiana S. Zaburnenko |
Efficient heuristics for the simulation of population overflow in series and parallel queues. |
VALUETOOLS |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood |
On evolving buffer overflow attacks using genetic programming. |
GECCO |
2006 |
DBLP DOI BibTeX RDF |
intrusion detection systems, linear genetic programming, mimicry attacks |
22 | Takahiro Shinagawa |
SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks. |
SRDS |
2006 |
DBLP DOI BibTeX RDF |
|
22 | John Regehr, Alastair Reid 0001, Kirk Webb |
Eliminating stack overflow by abstract interpretation. |
ACM Trans. Embed. Comput. Syst. |
2005 |
DBLP DOI BibTeX RDF |
call stack, interrupt-driven, sensor network, abstract interpretation, Microcontroller, context sensitive, dataflow analysis |
22 | Benjamin A. Kuperman, Carla E. Brodley, Hilmi Ozdoganoglu, T. N. Vijaykumar, Ankit Jalote |
Detection and prevention of stack buffer overflow attacks. |
Commun. ACM |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Mirko Loghi, Paolo Azzoni, Massimo Poncino |
Tag Overflow Buffering: An Energy-Efficient Cache Architecture. |
DATE |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Victor F. Nicola, Tatiana S. Zaburnenko |
Importance Sampling Simulation of Population Overflow in Two-node Tandem Networks. |
QEST |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Victor F. Nicola, Tatiana S. Zaburnenko |
Efficient importance sampling heuristics for the simulation of population overflow in Jackson networks. |
WSC |
2005 |
DBLP DOI BibTeX RDF |
|
22 | O-Hoon Kwon, Seung-Min Lee, Heejo Lee, Jong Kim 0001, Sang Cheon Kim, Gun Woo Nam, Joong Gil Park |
HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities. |
ICOIN |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood |
Evolving Successful Stack Overflow Attacks for Vulnerability Testing. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Ioannis Ch. Paschalidis, Spyridon Vassilaras |
Importance sampling for the estimation of buffer overflow probabilities via trace-driven simulations. |
IEEE/ACM Trans. Netw. |
2004 |
DBLP DOI BibTeX RDF |
MPEG traces, simulation, importance sampling, large deviations, variance reduction, statistical multiplexing |
22 | Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon |
A Novel Fuzzy-PID Dynamic Buffer Tuning Model to Eliminate Overflow and Shorten the End-to-End Roundtrip Time for TCP Channels. |
ISPA |
2004 |
DBLP DOI BibTeX RDF |
|
22 | John Regehr, Alastair Reid 0001, Kirk Webb |
Eliminating Stack Overflow by Abstract Interpretation. |
EMSOFT |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Pramod Ramarao, Akhilesh Tyagi, Gyungho Lee |
Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Ying Luo, Yi Pan 0001, Jie Li 0002, Yang Xiao 0001, Xiaola Lin |
A New Overflow Replacement Policy for Efficient Location Management in Mobile Networks. |
ICDCS Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Tomás Lang, Javier D. Bruguera |
Multilevel Reverse-Carry Computation for Comparison and for Sign and Overflow Detection in Addition. |
ICCD |
1999 |
DBLP DOI BibTeX RDF |
Most significant carry, prefix tree, carry look-ahead adder |
22 | Hercule Kwan, Robert Leonard Nelson Jr., Earl E. Swartzlander Jr. |
Cascaded Implementation of an Iterative Inverse--Square--Root Algorithm, with Overflow Lookahead. |
IEEE Symposium on Computer Arithmetic |
1995 |
DBLP DOI BibTeX RDF |
|
22 | Ricardo A. Baeza-Yates |
An Adaptive Overflow Technique for B-trees. |
EDBT |
1990 |
DBLP DOI BibTeX RDF |
|
17 | Hailun Tan, Wen Hu, Sanjay Jha 0001 |
A hardware-based remote attestation protocol in wireless sensor networks. |
IPSN |
2010 |
DBLP DOI BibTeX RDF |
wireless sensor networks, trusted platform module, remote attestation |
17 | Tai-Hsuan Wu, Azadeh Davoodi, Jeffrey T. Linderoth |
A parallel integer programming approach to global routing. |
DAC |
2010 |
DBLP DOI BibTeX RDF |
parallelism, integer programming, global routing |
17 | Gabriella Castelli, Ronaldo Menezes, Franco Zambonelli |
Self-organized control of knowledge generation in pervasive computing systems. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
context-awareness, pervasive computing, self-organization, knowledge engineering |
17 | Michel Hanna, Socrates Demetriades, Sangyeun Cho, Rami G. Melhem |
CHAP: Enabling Efficient Hardware-Based Multiple Hash Schemes for IP Lookup. |
Networking |
2009 |
DBLP DOI BibTeX RDF |
hardware multiple hashing, content-based probing, IP lookup |
17 | Hideya Ochiai, Hiroshi Esaki |
Message routing on potential-fields in forwarding-based DTNs. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
forwarding-based message delivery, potential-based routing, delay tolerant networks |
17 | Owen S. Hofmann, Christopher J. Rossbach, Emmett Witchel |
Maximum benefit from a minimal HTM. |
ASPLOS |
2009 |
DBLP DOI BibTeX RDF |
hardware transactional memory |
17 | Wilfred W. K. Lin, Tharam S. Dillon, Allan K. Y. Wong |
Applying FLC-based dynamic buffer size tuning to shorten the information retrieval round trip time in mobile location-aware environments. |
Pers. Ubiquitous Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Tsung-Hsien Lee, Ting-Chi Wang |
Congestion-Constrained Layer Assignment for Via Minimization in Global Routing. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Michael B. Baer |
Optimal Prefix Codes for Infinite Alphabets With Nonlinear Costs. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Anh Tuan Hoang, Mehul Motani |
Cross-layer Adaptive Transmission: Optimal Strategies in Fading Channels. |
IEEE Trans. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Anh Tuan Hoang, Mehul Motani |
Cross-layer adaptive transmission with incomplete system state information. |
IEEE Trans. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Yi Yang 0002, Sencun Zhu, Guohong Cao |
Improving sensor network immunity under worm attacks: a software diversity approach. |
MobiHoc |
2008 |
DBLP DOI BibTeX RDF |
sensor worm, graph coloring, sensor network security, percolation theory, software diversity |
Displaying result #101 - #200 of 2062 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|