The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for overflow with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1957-1976 (16) 1977-1980 (16) 1981-1983 (16) 1984-1985 (16) 1986-1987 (20) 1988-1989 (19) 1990-1991 (22) 1992-1993 (24) 1994-1995 (24) 1996 (15) 1997 (17) 1998 (18) 1999 (19) 2000 (27) 2001 (35) 2002 (46) 2003 (68) 2004 (78) 2005 (97) 2006 (122) 2007 (110) 2008 (113) 2009 (72) 2010 (39) 2011 (32) 2012 (29) 2013 (41) 2014 (45) 2015 (55) 2016 (72) 2017 (72) 2018 (94) 2019 (106) 2020 (112) 2021 (105) 2022 (115) 2023 (113) 2024 (22)
Publication types (Num. hits)
article(873) book(1) data(2) incollection(6) inproceedings(1178) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1155 occurrences of 729 keywords

Results
Found 2062 publication records. Showing 2062 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
29Boris Tsybakov, Nicolas D. Georganas On self-similar traffic in ATM queues definitions, overflow probability bound, and cell delay distribution. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF cell delay, finite ATM buffer, self-similar traffic, overflow probability, cell loss
29Fred J. Taylor An Overflow-Free Residue Multiplier. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1983 DBLP  DOI  BibTeX  RDF residue numbers, Dynamic range overflow, fixed-point multiplier, error model
27Eric W. M. Wong, Yin-Chi Chan A Century-Long Challenge in Teletraffic Theory: Blocking Probability Evaluation for Overflow Loss Systems With Mutual Overflow. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Mark Swillus, Andy Zaidman Sentiment Overflow in the Testing Stack: Analysing Software Testing Posts on Stack Overflow. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Mark Swillus, Andy Zaidman Sentiment overflow in the testing stack: Analyzing software testing posts on Stack Overflow. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Lili Xu, Mingjie Xu, Feng Li, Wei Huo ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Mingjie Xu, Shengnan Li, Lili Xu, Feng Li, Wei Huo, Jing Ma, Xinhua Li, Qingjia Huang A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection. Search on Bibsonomy Inscrypt The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Dorra Attiaoui Belief Detection and Temporal Analysis of Experts in Question Answering Communities: case study Stack Overflow. (Détection et Analyse Temporelle des Experts dans les Réseaux Communautaires de Questions Réponses : étude de cas Stack Overflow). Search on Bibsonomy 2017   RDF
27Hao Sun, Xiangyu Zhang 0001, Chao Su, Qingkai Zeng 0002 Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Yunquan Dong, Pingyi Fan, Khaled Ben Letaief, Ross D. Murch Performance analysis for buffer-aided communication over block Rayleigh fading channels: queue length distribution, overflow probability, and ε-overflow rate. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Chao Zhang 0008, Wei Zou, Tielei Wang, Yu Chen, Tao Wei Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Yong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Chao Zhang 0008, Tielei Wang, Tao Wei, Yu Chen, Wei Zou IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Kyung-suk Lhee, Steve J. Chapin Buffer overflow and format string overflow vulnerabilities. Search on Bibsonomy Softw. Pract. Exp. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Tsung-Hsien Lee, Ting-Chi Wang Robust layer assignment for via optimization in multi-layer global routing. Search on Bibsonomy ISPD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF optimization, computer-aided design, global routing, via, layer assignment
25Zhen Cao, Tong Jing, Jinjun Xiong, Yu Hu 0002, Zhe Feng 0002, Lei He 0001, Xianlong Hong Fashion: A Fast and Accurate Solution to Global Routing Problem. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Qian Huang 0003, King-Tim Ko, Villy Bæk Iversen Approximation of loss calculation for hierarchical networks with multiservice overflows. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Jhih-Rong Gao, Pei-Ci Wu, Ting-Chi Wang A new global router for modern designs. Search on Bibsonomy ASP-DAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Yen-Jung Chang, Yu-Ting Lee, Ting-Chi Wang NTHU-Route 2.0: a fast and stable global router. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Denis I. Miretskiy, Werner R. W. Scheinhardt, Michel Mandjes Tandem queue with server slow-down. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF memory corruption, debugging, vulnerability analysis
25Sriram Sankaranarayanan 0001, Franjo Ivancic, Aarti Gupta Program Analysis Using Symbolic Ranges. Search on Bibsonomy SAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Colin Blundell, Joe Devietti, E. Christopher Lewis, Milo M. K. Martin Making the fast case common and the uncommon case simple in unbounded transactional memory. Search on Bibsonomy ISCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel programming, concurrency, transactions, transactional memory
25Leonidas Georgiadis, Leandros Tassiulas Optimal overload response in sensor networks. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF lexicographic optimization, lost traffic minimization, most balanced allocation, overload response, sensor networks, distributed algorithms, network control, throughput maximization
25Guanling Chen, David Kotz Policy-Driven Data Dissemination for Context-Aware Applications. Search on Bibsonomy PerCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Wilfred W. K. Lin, Tharam S. Dillon, Allan K. Y. Wong Using the Novel FLC Dynamic Buffer Size Tuning Technique to Support More Dependable Location-Aware Information Retrieval. Search on Bibsonomy ICMB The full citation details ... 2005 DBLP  DOI  BibTeX  RDF location-aware information retrieval, small-form-factor (SFF) devices, Fuzzy Logic Controller (FLC), dynamic buffer size tuning, Internet traffic patterns, dependability
25Rami Atar, Adam Shwartz, Paul Dupuis Explicit Solution for a Network Control Problem in the Large Deviation Regime. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF stochastic risk-sensitive control, HJB equation, large deviations, tandem queue, differential game
25Christopher Dahn, Spiros Mancoridis Using Program Transformation to Secure C Programs Against Buffer Overflows. Search on Bibsonomy WCRE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Ruby B. Lee, David K. Karig, John Patrick McGregor, Zhijie Shi Enlisting Hardware Architecture to Thwart Malicious Code Injection. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Ravishankar K. Iyer, Shuo Chen 0001, Jun Xu 0003, Zbigniew Kalbarczyk Security Vulnerabilities - From Data Analysis to Protection Mechanisms. Search on Bibsonomy WORDS Fall The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Christof Fetzer, Zhen Xiao Detecting Heap Smashing Attacks through Fault Containment Wrappers. Search on Bibsonomy SRDS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Francesca Cesarini, Giovanni Soda A Dynamic Hash Method with Signature. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF dynamic hashing, external hashing, generalized spiral storage, signature functions
25Peter B. Danzig Finite Buffers and Fast Multicast. Search on Bibsonomy SIGMETRICS The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
24Sameh Najeh, Hichem Besbes Queue-balancing resource allocation for rate-stable OFDMA systems. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF OFDMA system, stability, fairness, buffer overflow
24Dino Schweitzer, Jeff Boleng A simple machine simulator for teaching stack frames. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF stack frames, visualization, active learning, buffer overflow
24Mingfu Li, Shih-Han Cheng Arrival Process-Controlled Adaptive Media Playout for Video Streaming. Search on Bibsonomy FMN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adaptive media playout, Buffer underflow, Buffer overflow, Multimedia streaming, Arrival process
24Bart Steyaert, Koenraad Laevens, Danny De Vleeschauwer, Herwig Bruneel Analysis and design of a playout buffer for VBR streaming video. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dejittering, Playout buffer, Underflow, Streaming media, Overflow
24Aurélien Francillon, Claude Castelluccia Code injection attacks on harvard-architecture devices. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF harvard architecture, return oriented programming, wireless sensor networks, buffer overflow, embedded devices, computer worms, code injection attacks, gadgets
24Sriraman Tallam, Chen Tian 0002, Rajiv Gupta 0001, Xiangyu Zhang 0001 Avoiding Program Failures Through Safe Execution Perturbations. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF avoiding failures, environmental faults, logging/replay tools, bad user requests, heap overflow, atomicity violation
24Qian Huang 0003, King-Tim Ko, Sammy Chan, Villy Bæk Iversen Loss performance evaluation in heterogeneous hierarchical networks. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiservice loss model, overflow traffic, hierarchical network
24R. Krishnan, S. Murali Krishna, Nishil Bharill Code quality tools: learning from our experience. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2007 DBLP  DOI  BibTeX  RDF buffer overflow and memory corruption, memory leak, code quality
24Hsiang-Lun Huang, Tzong-Jye Liu, Kuong-Ho Chen, Chyi-Ren Dow, Lih-Chyau Wuu A polymorphic shellcode detection mechanism in the network. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF polymorphic shellcode, intrusion detection system, buffer overflow
24Hilmi Ozdoganoglu, T. N. Vijaykumar, Carla E. Brodley, Benjamin A. Kuperman, Ankit Jalote SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF function return address, hardware stack, Buffer overflow
24Jaydip Sen, Piyali Roy Chowdhury, Indranil Sengupta 0001 A Mechanism for Detection and Prevention of Distributed Denial of Service Attacks. Search on Bibsonomy ICDCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Traffic level measurement, Security, DDoS, Buffer overflow
24Hyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee 0001 A Model for Security Vulnerability Pattern. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Abstract Syntax Tree (AST), Static analysis, Buffer overflow, Software security, Pushdown Automata (PDA)
24Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou Improving software security via runtime instruction-level taint checking. Search on Bibsonomy ASID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF format string, hardware tagging, buffer overflow
24Do Young Eun, Ness B. Shroff Analyzing a Two-Stage Queueing System with Many Point Process Arrivals at Upstream Queue. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF many-sources-asymptotic, queueing networks, point processes, overflow probability
24M. F. M. Nuyens The Maximum Queue Length for Heavy-Tailed Service Times in the M/G/1 FB Queue. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF maximum queue length, log-convex density, foreground background (FB), unstable queue, finite waiting room, buffer, overflow, heavy tails, service discipline, busy cycle
24Misha Zitser, Richard Lippmann, Tim Leek Testing static analysis tools using exploitable buffer overflows from open source code. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF test detection, security, evaluation, static analysis, source code, buffer overflow, exploit, false alarm
24Dewi Utami, Hadi Suwastio, Bambang Sumadjudin FPGA Implementation of Digital Chaotic Cryptography. Search on Bibsonomy EurAsia-ICT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF digital filter overflow, FPGA, cryptography, Chaos, fixed point
24Hee Yong Youn, Choong Gun Oh, Hyunseung Choo, Jin-Wook Chung, Dongman Lee An Efficient Algorithm-Based Fault Tolerance Design Using the Weighted Data-Check Relationship. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Hamming correcting code, VLSI processor array, Algorithm-based fault tolerance, overflow, matrix computations, round-off error
24Sangman Bak, Albert Mo Kim Cheng, Jorge Arturo Cobb, Ernst L. Leiss Load-Balanced Routing and Scheduling for Real-Time Traffic in Packet-Switch Networks. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF load-balanced routing, shortest-path routing protocols, least-laxity scheduling algorithm, scheduling, protocols, computer networks, computer networks, packet switching, routing algorithm, scheduling algorithm, buffer overflow, telecommunication network routing, telecommunication traffic, packet loss, time-delay, packet-switch networks, end-to-end delay, bottlenecks, real-time traffic, network throughput, traffic load, data packets
24Tatsuya Hagiwara, Hiroki Doi, Hideki Tode, Hiromasa Ikeda High-Speed Calculation Method of the Hurst Parameter Based on Real Traffic. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF high-speed calculation method, traffic measurement analysis, packet traffic, long range dependent properties, variance-time plot method, performance, packet switching, fractals, self-similarity, buffer overflow, telecommunication traffic, network performance, telecommunication congestion control, network control, Hurst parameter
24Albrecht P. Stroele Test response compaction using arithmetic functions. Search on Bibsonomy VTS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF arithmetic functions, combinational faults, underflow, feed back, logic testing, built-in self test, digital arithmetic, test pattern generation, adders, circuits, registers, aliasing probability, overflow, subtracters, test response compaction, arithmetic logic units
24Soong Hee Lee A Reactive Access Control Scheme at UNI for Congestion Control in ATM-Based B-ISDN. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF reactive access control scheme, UNI, ATM-based B-ISDN, active traffic sources, feedback traffic, GFC field, B-NT system, network congestion state, probability of overflow, node output buffer, generic flow control, broadband network termination, user network interface, performance evaluation, asynchronous transfer mode, congestion control, computer simulation
24Victor C. S. Lee, Joseph Kee-Yin Ng, Kam-yiu Lam, Sheung-lun Hung Performance Studies of Transmitting Real-Time MPEG-I Video in ATM Networks. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF real-time MPEG-I video, real video programmes, workload characteristics, cell miss ratio, deadline missing, burst loss ratio, first-come-first-serve scheduling algorithm, virtual path bandwidth, simulation, asynchronous transfer mode, ATM networks, buffer overflow, ATM switch, gateways, performance studies, video data, video clips, cell loss ratio
24Hoon Lee A Gracious Cell Discard Scheme in ATM Multiplexer. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF gracious cell discard control, ATM output multiplexer, gracious cell throttle, temporary queue, main queue, high priority cells, low priority cells, nonlinear filter function, cell rejection policy, partial rejection, prioritized selection, QoS measures, cell delay, quality of service, asynchronous transfer mode, congestion control, overflow, ATM multiplexer, cell loss, finite capacity queue
24Luis A. Montalvo, Alain Guyot Svoboda-Tung division with no compensation. Search on Bibsonomy VLSI Design The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Svoboda-Tung division, radix-b division algorithm, iteration overflow, most significant digits, radix-b algorithm, IEEE normalised divisor, pre-scaling technique, stepwise approximation, VLSI, iterative methods, digital arithmetic, VLSI implementation, prescalers, dividing circuits
24Peter B. Danzig Flow Control for Limited Buffer Multicast. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF multiround flow control algorithm, limited buffer multicast, response holding, backoff time, recipients, available buffer space, buffer service time distribution, message retransmission, service time distribution, limited-buffer preemptive queuing process, protocol processing layers, multiprogrammed operating system, protocols, queueing theory, accuracy, storage management, buffer overflow, buffer storage, multiprogramming, network operating systems, telecommunications control, approximate analysis
24Yaoxue Zhang, Kaoru Takahashi, Norio Shiratori, Shoichi Noguchi An Interactive Protocol Synthesis Algorithm Using a Global State Transition Graph. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF interactive protocol synthesis algorithm, global state transition graph, global state transition graph, deadlock avoidance rules, complete reception, protocols, graph theory, finite-state machines, finite automata, buffer overflow, production rules, interactive programming, deadlock freeness
22Shikun Chen, Zhoujun Li Simplifying Buffer Overflow Detection Using Site-Safe Expressions. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Yves Younan, Frank Piessens, Wouter Joosen Protecting Global and Static Variables from Buffer Overflow Attacks. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Tugkan Tuglular, Can Arda Muftuoglu, Özgür Kaya, Fevzi Belli, Michael Linschulte GUI-Based Testing of Boundary Overflow Vulnerability. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Arif Ali Rehman, Abid Karim, Shakeel Ahmed Khoja Blocking Probabilities in WDM Switching Networks Using Overflow Analysis Method. Search on Bibsonomy IMTIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF WDM switching networks, Equivalent Random Theory (ERT)
22Victor F. Nicola, Tatiana S. Zaburnenko Efficient importance sampling heuristics for the simulation of population overflow in Jackson networks. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Asymptotic efficiency, importance sampling, variance reduction, queuing models, rare event simulation, Jackson networks
22Alexey Smirnov 0001, Tzi-cker Chiueh Automatic Patch Generation for Buffer Overflow Attacks. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Xiaolong Wu, Jun Zheng 0003, Emma E. Regentova, Yingtao Jiang Analysis of the Effect of Channel Sub-rating in Unidirectional Call Overflow Scheme for Call Admission in Hierarchical Cellular Networks. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Takao Hinamoto, Takuro Kawagoe Optimal Synthesis of State-Estimate Feedback Controllers with Minimum l2-Sensitivity and No Overflow Oscillations. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Andrzej Chydzinski Buffer overflow calculations in a batch arrival queue. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Tigang Jiang, Yuming Mao Bidirectional overflow channel allocation scheme with handoff queuing for macro/micro cellular systems. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF handoff, channel allocation, queuing
22Victor F. Nicola, Tatiana S. Zaburnenko Efficient heuristics for the simulation of population overflow in series and parallel queues. Search on Bibsonomy VALUETOOLS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood On evolving buffer overflow attacks using genetic programming. Search on Bibsonomy GECCO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intrusion detection systems, linear genetic programming, mimicry attacks
22Takahiro Shinagawa SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22John Regehr, Alastair Reid 0001, Kirk Webb Eliminating stack overflow by abstract interpretation. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF call stack, interrupt-driven, sensor network, abstract interpretation, Microcontroller, context sensitive, dataflow analysis
22Benjamin A. Kuperman, Carla E. Brodley, Hilmi Ozdoganoglu, T. N. Vijaykumar, Ankit Jalote Detection and prevention of stack buffer overflow attacks. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Mirko Loghi, Paolo Azzoni, Massimo Poncino Tag Overflow Buffering: An Energy-Efficient Cache Architecture. Search on Bibsonomy DATE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Victor F. Nicola, Tatiana S. Zaburnenko Importance Sampling Simulation of Population Overflow in Two-node Tandem Networks. Search on Bibsonomy QEST The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Victor F. Nicola, Tatiana S. Zaburnenko Efficient importance sampling heuristics for the simulation of population overflow in Jackson networks. Search on Bibsonomy WSC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22O-Hoon Kwon, Seung-Min Lee, Heejo Lee, Jong Kim 0001, Sang Cheon Kim, Gun Woo Nam, Joong Gil Park HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood Evolving Successful Stack Overflow Attacks for Vulnerability Testing. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Ioannis Ch. Paschalidis, Spyridon Vassilaras Importance sampling for the estimation of buffer overflow probabilities via trace-driven simulations. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF MPEG traces, simulation, importance sampling, large deviations, variance reduction, statistical multiplexing
22Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon A Novel Fuzzy-PID Dynamic Buffer Tuning Model to Eliminate Overflow and Shorten the End-to-End Roundtrip Time for TCP Channels. Search on Bibsonomy ISPA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22John Regehr, Alastair Reid 0001, Kirk Webb Eliminating Stack Overflow by Abstract Interpretation. Search on Bibsonomy EMSOFT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Pramod Ramarao, Akhilesh Tyagi, Gyungho Lee Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Ying Luo, Yi Pan 0001, Jie Li 0002, Yang Xiao 0001, Xiaola Lin A New Overflow Replacement Policy for Efficient Location Management in Mobile Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Tomás Lang, Javier D. Bruguera Multilevel Reverse-Carry Computation for Comparison and for Sign and Overflow Detection in Addition. Search on Bibsonomy ICCD The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Most significant carry, prefix tree, carry look-ahead adder
22Hercule Kwan, Robert Leonard Nelson Jr., Earl E. Swartzlander Jr. Cascaded Implementation of an Iterative Inverse--Square--Root Algorithm, with Overflow Lookahead. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
22Ricardo A. Baeza-Yates An Adaptive Overflow Technique for B-trees. Search on Bibsonomy EDBT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
17Hailun Tan, Wen Hu, Sanjay Jha 0001 A hardware-based remote attestation protocol in wireless sensor networks. Search on Bibsonomy IPSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless sensor networks, trusted platform module, remote attestation
17Tai-Hsuan Wu, Azadeh Davoodi, Jeffrey T. Linderoth A parallel integer programming approach to global routing. Search on Bibsonomy DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF parallelism, integer programming, global routing
17Gabriella Castelli, Ronaldo Menezes, Franco Zambonelli Self-organized control of knowledge generation in pervasive computing systems. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF context-awareness, pervasive computing, self-organization, knowledge engineering
17Michel Hanna, Socrates Demetriades, Sangyeun Cho, Rami G. Melhem CHAP: Enabling Efficient Hardware-Based Multiple Hash Schemes for IP Lookup. Search on Bibsonomy Networking The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hardware multiple hashing, content-based probing, IP lookup
17Hideya Ochiai, Hiroshi Esaki Message routing on potential-fields in forwarding-based DTNs. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF forwarding-based message delivery, potential-based routing, delay tolerant networks
17Owen S. Hofmann, Christopher J. Rossbach, Emmett Witchel Maximum benefit from a minimal HTM. Search on Bibsonomy ASPLOS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hardware transactional memory
17Wilfred W. K. Lin, Tharam S. Dillon, Allan K. Y. Wong Applying FLC-based dynamic buffer size tuning to shorten the information retrieval round trip time in mobile location-aware environments. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Tsung-Hsien Lee, Ting-Chi Wang Congestion-Constrained Layer Assignment for Via Minimization in Global Routing. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Michael B. Baer Optimal Prefix Codes for Infinite Alphabets With Nonlinear Costs. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Anh Tuan Hoang, Mehul Motani Cross-layer Adaptive Transmission: Optimal Strategies in Fading Channels. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Anh Tuan Hoang, Mehul Motani Cross-layer adaptive transmission with incomplete system state information. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Yi Yang 0002, Sencun Zhu, Guohong Cao Improving sensor network immunity under worm attacks: a software diversity approach. Search on Bibsonomy MobiHoc The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor worm, graph coloring, sensor network security, percolation theory, software diversity
Displaying result #101 - #200 of 2062 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license