The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for overflow with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1957-1976 (16) 1977-1980 (16) 1981-1983 (16) 1984-1985 (16) 1986-1987 (20) 1988-1989 (19) 1990-1991 (22) 1992-1993 (24) 1994-1995 (24) 1996 (15) 1997 (17) 1998 (18) 1999 (19) 2000 (27) 2001 (35) 2002 (46) 2003 (68) 2004 (78) 2005 (97) 2006 (122) 2007 (110) 2008 (113) 2009 (72) 2010 (39) 2011 (32) 2012 (29) 2013 (41) 2014 (45) 2015 (55) 2016 (72) 2017 (72) 2018 (94) 2019 (106) 2020 (112) 2021 (105) 2022 (115) 2023 (113) 2024 (22)
Publication types (Num. hits)
article(873) book(1) data(2) incollection(6) inproceedings(1178) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1155 occurrences of 729 keywords

Results
Found 2062 publication records. Showing 2062 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Mingzhu Wei, Elke A. Rundensteiner, Murali Mani Utility-driven load shedding for xml stream processing. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF xml query processing, xml streams, preference model, load shedding
17Jalil S. Harsini, Farshad Lahouti Adaptive Transmission of QoS-Guaranteed Traffic over MIMO Wireless Links. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Furong Wang, Yasha Liu, Lai Tu, Peng Zhang Analysis of User Mobility Effects on Packet Level Performances in Next Generation Mobile Communication Networks. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF packet level performance, call level performance, user mobility, cell residence time
17Zhenzhong Chen, King Ngi Ngan Towards Rate-Distortion Tradeoff in Real-Time Color Video Coding. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Alicia Nicki Washington, Harry G. Perros Performance Analysis of Traffic-Groomed Optical Networks Employing Alternate Routing Techniques. Search on Bibsonomy ITC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Tae-Chul Hong, Kun Seok Kang, Do-Seob Ahn, Hojin Lee Selective Repeat Hybrid ARQ Type II in the GEO Satellite Networks. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Peng Liu 0006, Yu-ping Ma, Jianshe Dong Adaptive Processing Scheme of Overflowed Buckets for Bucket Sort Algorithm. Search on Bibsonomy IFSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF THSort, THSort2, NTSort, External Sort, Bucket Sort
17Xiao Hu, Pengyong Ma, Shuming Chen Scheduling for Combining Traffic of On-Chip Trace Data in Embedded Multi-core Processor. Search on Bibsonomy ICESS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Alicia Nicki Washington, Harry G. Perros Analysis of a Traffic-Groomed Optical Network with Alternate Routing. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Adel Elsayed Visual mining in the information spa. Search on Bibsonomy CEC/EEE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Chang-Hsien Tsai, Shih-Kun Huang Detection and Diagnosis of Control Interception. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Asia Slowinska, Herbert Bos The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack analysis, honeypots, intrusion detection and prevention
17Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh Dynamic multi-process information flow tracking for web application security. Search on Bibsonomy Middleware (Demos and Posters) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dynamic checking compiler, SQL injection, cross-site scripting, web application security, taint analysis, information flow tracking
17Stelios Sidiroglou, Angelos D. Keromytis Execution transactions for defending against software failures: use and evaluation. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Transactional Execution, Buffer overflows, Exception
17Amparo Gil, Javier Segura 0001, Nico M. Temme Computing the real parabolic cylinder functions U(a, x), V(a, x). Search on Bibsonomy ACM Trans. Math. Softw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Parabolic cylinder functions, nonoscillating integral representations, asymptotic expansions, numerical quadrature
17Danny Hendler, Yossi Lev, Mark Moir, Nir Shavit A dynamic-sized nonblocking work stealing deque. Search on Bibsonomy Distributed Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Load balancing, Data structures, Concurrent programming, Lock-free, Work stealing
17Lei Ying 0001, R. Srikant 0001, Atilla Eryilmaz, Geir E. Dullerud A Large Deviations Analysis of Scheduling in Wireless Networks. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Minqiang Jiang, Nam Ling Low-delay rate control for real-time H.264/AVC video coding. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Pieter-Tjerk de Boer Analysis of state-independent importance-sampling measures for the two-node tandem queue. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF tandem queueing networks, importance-sampling, Rare-event simulation
17Minqiang Jiang, Nam Ling Bit Allocation Scheme for Low-Delay H.264/AVC Rate Control. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Weidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang 0002 InfoShield: a security architecture for protecting information usage in memory. Search on Bibsonomy HPCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Juan J. Alcaraz, Fernando Cerdán Slope based discard: a buffer management scheme for 3G links supporting TCP traffic. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCP over 3G links, radio link control (RLC)
17Zhiqiang Lin, Bing Mao, Li Xie 0001 A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Qi Zhao 0006, Jun (Jim) Xu, Zhen Liu Design of a novel statistics counter architecture with optimal space and time efficiency. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2006 DBLP  DOI  BibTeX  RDF statistics counter, data streaming, router
17József Bíró Loss ratio approximations in buffered systems with regulated inputs. Search on Bibsonomy VALUETOOLS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Divya Arora, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha Architectural support for safe software execution on embedded processors. Search on Bibsonomy CODES+ISSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF type safety, memory safety, extensible processors
17Sylvie Boldo Pitfalls of a Full Floating-Point Proof: Example on the Formal Proof of the Veltkamp/Dekker Algorithms. Search on Bibsonomy IJCAR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Hoon Lee, Yoon Kee Kim, Kwang-Hui Lee Bandwidth Management for Smooth Playback of Video Streaming Services. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Cheng-Liang Chen, Meng-Fen Ho, Chung-Lin Huang Adaptive rate control for H.264/AVC using Kalman filter. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Brian Hackett, Manuvir Das, Daniel Wang, Zhe Yang 0001 Modular checking for buffer overflows in the large. Search on Bibsonomy ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF annotation design, annotation inference, modular analysis, buffer overflows
17Susanta Nanda, Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh Foreign Code Detection on the Windows/X86 Platform. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Rafiahamed Shaik, Mrityunjoy Chakraborty An Efficient Realization of the Decision Feedback Equalizer using Block Floating Point Arithmetic. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Dong Ye 0004, David R. Kaeli A reliable return address stack: microarchitectural features to defeat stack smashing. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Pieter-Tjerk de Boer Rare-Event Simulation of Non-Markovian Queueing Networks Using a State-Dependent Change of Measure Determined Using Cross-Entropy. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF queueing networks, rare-event simulation, cross-entropy method
17Takeshi Hashimoto Bounds on a probability for the heavy tailed distribution and the probability of deficient decoding in sequential decoding. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Guillermo Barrenetxea, Baltasar Beferull-Lozano, Martin Vetterli Efficient routing with small buffers in dense networks. Search on Bibsonomy IPSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Konstantina Karagianni, Vassilis Paliouras Low-Power Aspects of Nonlinear Signal Processing. Search on Bibsonomy PATMOS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Hind Castel-Taleb, Jean-Michel Fourneau, Nihal Pekergin Stochastic Bounds on Partial Ordering: Application to Memory Overflows Due to Bursty Arrivals. Search on Bibsonomy ISCIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Concettina Del Grosso, Giuliano Antoniol, Massimiliano Di Penta, Philippe Galinier, Ettore Merlo Improving network applications security: a new heuristic to generate stress testing data. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, test data generation, evolutionary testing, stress testing
17David Primeaux Programming with Gaussian Logarithms to Compute the Approximate Addition and Subtraction of Very Small (or Very Large) Positive Numbers. Search on Bibsonomy SNPD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Jang-Sub Kim, Min Young Chung, Dong Ryeol Shin A Vertical Handoff Decision Process and Algorithm Based on Context Information in CDMA-WLAN Interworking. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Sujeong Choi, Sang Hyuk Kang, Bara Kim Packet scheduling based on GeoY/G/infinity input process modeling for streaming video. Search on Bibsonomy ISCAS (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Ying-Jiun Hsieh, Yavuz A. Bozer Analytical Modeling of Closed-Loop Conveyors with Load Recirculation. Search on Bibsonomy ICCSA (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Conveyor systems, Manufacturing systems, Material handling
17Jang-Sub Kim, Min Young Chung, Dong Ryeol Shin A Vertical Handoff Algorithm Based on Context Information in CDMA-WLAN Integrated Networks. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Ward Whitt Heavy-Traffic Limits for Loss Proportions in Single-Server Queues. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF finite dam, local limit, heavy-tailed probability distribution, stable process, blocking probability, heavy-traffic, single-server queue, overflows, diffusion approximation, loss rate, finite-capacity queue
17Scott Jordan, Kalpana Jogi, Chunlin Shi, Ikhlaq Sidhu The variation of optimal bandwidth and buffer allocation with the number of sources. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF resource allocation, dimensioning, cost minimization
17Yu Sun 0003, Ishfaq Ahmad A robust and adaptive rate control algorithm for object-based video coding. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Qiong Li, Mihaela van der Schaar Providing adaptive QoS to layered video over wireless local area networks through real-time retry limit adaptation. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh On the effectiveness of address-space randomization. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF address-space randomization, automated attacks, diversity
17Danny Hendler, Yossi Lev, Nir Shavit Dynamic Memory ABP Work-Stealing. Search on Bibsonomy DISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya ARCHERR: Runtime Environment Driven Program Safety. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Sem C. Borst, Michel Mandjes, Miranda van Uitert Generalized processor sharing with light-tailed and heavy-tailed input. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Markov fluid, heavy-tailed traffic, light-tailed traffic, weighted fair queueing, workload asymptotics, large deviations, Generalized processor sharing (GPS), regular variation
17Sylvie Boldo, Marc Daumas Representable Correcting Terms for Possibly Underflowing Floating Point Operations. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Rachid El Azouzi, Eitan Altman A Queuing Analysis of Packet Dropping over a Wireless Link with Retransmissions. Search on Bibsonomy PWC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms
17Jun Xu 0003, Zbigniew Kalbarczyk, Ravishankar K. Iyer Transparent Runtime Randomization for Security. Search on Bibsonomy SRDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Costas Courcoubetis, Antonis Dimakis, George D. Stamoulis Traffic equivalence and subistution in a multiplexer with applications to dynamic available capacity estimation. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF available capacity, many-sources asymptotic, on-line estimation, call admission control, traffic modeling, effective bandwidth
17Shin-ichi Minato Streaming BDD Manipulation. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF algorithm, verification, testing, data structure, logic design, binary decision diagram, BDD, combinatorial problem, VLSI CAD
17Gang Luo 0001, Curt J. Ellmann, Peter J. Haas, Jeffrey F. Naughton A scalable hash ripple join algorithm. Search on Bibsonomy SIGMOD Conference The full citation details ... 2002 DBLP  DOI  BibTeX  RDF World Wide Web (WWW)
17Pieter-Tjerk de Boer, Dirk P. Kroese, Reuven Y. Rubinstein Rare event simulation and combinatorial optimization using cross entropy: estimating buffer overflows in three stages using cross-entropy. Search on Bibsonomy WSC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Sem C. Borst, Michel Mandjes, Miranda van Uitert Generalized processor sharing with heterogeneous traffic classes. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Nurit Dor, Michael Rodeh, Shmuel Sagiv Cleanness Checking of String Manipulations in C Programs via Integer Analysis. Search on Bibsonomy SAS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Seon Wook Kim, Chong-liang Ooi, Rudolf Eigenmann, Babak Falsafi, T. N. Vijaykumar Reference idempotency analysis: a framework for optimizing speculative execution. Search on Bibsonomy PPoPP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Yi-Bing Lin, Wei-Ru Lai, Rong-Jaye Chen Performance Analysis for Dual Band PCS Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Dual band, macrocell, microcell, handoff, GSM, personal communications services
17U. Pal 0001, B. B. Chaudhuri 0001 Automatic Recognition of Unconstrained Off-Line Bangla Handwritten Numerals. Search on Bibsonomy ICMI The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Pieter-Tjerk de Boer, Victor F. Nicola, Reuven Y. Rubinstein Techniques for simulating difficult queueing problems: adaptive importance sampling simulation of queueing networks. Search on Bibsonomy WSC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Allan K. Y. Wong, Tharam S. Dillon A Fault-Tolerant Data Communication Setup to Improve Reliability and Performance for Internet Based Distributed Applications. Search on Bibsonomy PRDC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF consecutive message transmission and adaptive buffer management, fault tolerance, performance, reliability
17Han Zhou, C. H. Chang A dynamic bandwidth allocation scheme for multimedia data over ATM networks. Search on Bibsonomy ICNP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Edward Omiecinski, Eileen Tien Lin The Adaptive-Hash Join Algorithm for a Hypercube Multicomputer. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF adaptive-hash join algorithm, hybrid-hash, parallel algorithms, hypercube networks, file organisation, nested-loop, hypercube multicomputer
17Tobias G. Noll Carry-save architectures for high-speed digital signal processing. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
17R. Victor Klassen Integer Forward Differencing of Cubic Polynomials: Analysis and Algorithms. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF Be´zier curves, parametric curve plotting
17Michael Freeston A Well-Behaved File Structure for the Storage of Spatial Objects. Search on Bibsonomy SSD The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
17David B. Lomet A Simple Bounded Disorder File Organization with Good Performance. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
17Clinton R. Foulk Macintosh assembly language. Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1988 DBLP  DOI  BibTeX  RDF Macintosh
17Michel Scholl New File Organizations Based on Dynamic Hashing. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1981 DBLP  DOI  BibTeX  RDF dynamic hashing, linear splitting, data structure, hashing, file organization
15George Lawton On the Trail of the Conficker Worm. Search on Bibsonomy Computer The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conficker, Malware, Worms, Buffer overflow, Security and privacy
15Tugkan Tuglular, Can Arda Muftuoglu, Fevzi Belli, Michael Linschulte Event-Based Input Validation Using Design-by-Contract Patterns. Search on Bibsonomy ISSRE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Boundary Overflow, Decision Tables, Design by Contract, Security Testing, Event Sequence Graphs, Input Validation
15Mu Zhang 0004, Johnny Wong, Wallapak Tavanapong, Jung-Hwan Oh 0001, Piet C. de Groen Deadline-constrained media uploading systems. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF File upload, Emergency control for storage overflow, Scheduling algorithms, Hard real-time systems
15Chetan Parampalli, R. Sekar 0001, Rob Johnson A practical mimicry attack against powerful system-call monitors. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack
15Hyungwoo Kang Security Assessment Framework Using Static Analysis and Fault Injection. Search on Bibsonomy ICIC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RPC (Remote Procedure Call), Static analysis, Fault injection, Buffer overflow, Software security, Security assessment
15Sandeep Bhatkar, R. Sekar 0001 Data Space Randomization. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF address space randomization, buffer overflow, memory error
15Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Benjamin G. Zorn Archipelago: trading address space for reliability and security. Search on Bibsonomy ASPLOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Archipelago, probabilistic memory safety, randomized algorithms, virtual memory, buffer overflow, dynamic memory allocation, memory errors
15Qijun Gu, Rizwan Noorani Towards self-propagate mal-packets in sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mal-packet, sensor worm, buffer overflow, control flow
15Danyel Fisher, A. J. Bernheim Brush, Bernie Hogan, Marc A. Smith, Andy Jacobs Using Social Metadata in Email Triage: Lessons from the Field. Search on Bibsonomy HCI (9) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Email overflow, email triage, social metadata, social sorting
15Hyungwoo Kang, Dong Hoon Lee 0001 Security Assessment for Application Network Services Using Fault Injection. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RPC (Remote Procedure Call), Fault injection, Buffer overflow, Software security, Security assessment
15Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong Minos: Architectural support for protecting control data. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Control data, worms, buffer overflow
15Danny Nebenzahl, Shmuel Sagiv, Avishai Wool Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computer security, instrumentation, buffer overflow
15Do Young Eun, Ness B. Shroff Network decomposition: theory and practice. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF many-sources-asymptotic, performance analysis, network, aggregation, decomposition, overflow probability
15Zhenkai Liang, R. Sekar 0001 Fast and automated generation of attack signatures: a basis for building self-protecting servers. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF denial-of-service protection, worm defense, buffer overflow, signature generation, memory error
15Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. Search on Bibsonomy ICAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion-tolerant computing, survivable service, buffer overflow, self-healing, rootkits, chip multi processor
15Søren Asmussen, Mats Pihlsgård Transient Properties of Many-Server Queues and Related QBDs. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF exponential martingale, first passage problem, heterogeneous servers, Kella-Whitt martingale, Lévy process, MMM/MMM/c queue, optional stopping, buffer overflow, Laplace transform, Markov additive process, birth-death process
15G. Edward Suh, Jae W. Lee, David Zhang 0001, Srinivas Devadas Secure program execution via dynamic information flow tracking. Search on Bibsonomy ASPLOS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF format string, hardware tagging, buffer overflow
15Alan A. Jorgensen Testing with hostile data streams. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Adobe Acrobat Reader, software testing, steganography, random testing, buffer overflow, internet security, buffer overrun
15Prabhaker Mateti A laboratory-based course on internet security. Search on Bibsonomy SIGCSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TCP/IP exploits, network security, ethics, firewalls, buffer overflow, internet security
15Yichen Xie 0001, Andy Chou, Dawson R. Engler ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. Search on Bibsonomy ESEC / SIGSOFT FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF memory access errors, security, static analysis, error detection, buffer overflow, buffer overrun
15Nurit Dor, Michael Rodeh, Shmuel Sagiv CSSV: towards a realistic tool for statically detecting all buffer overflows in C. Search on Bibsonomy PLDI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF static analysis, abstract interpretation, error detection, contracts, buffer overflow
15Cheng-Shang Chang, Rene L. Cruz, Jean-Yves Le Boudec, Patrick Thiran A min, + system theory for constrained traffic regulation and dynamic service guarantees. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF (min, +) algebra, performance analysis, buffer overflow, packet losses, network calculus, traffic shaping
15Yishay Mansour, Boaz Patt-Shamir Jitter control in QoS networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Buffer overflow and underflow, streaming connections, competitive analysis, jitter control, quality of service networks
15Michael Frey, Son Nguyen-Quang A gamma-based framework for modeling variable-rate MPEG video sources: the GOP GBAR model. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF buffer overflow loss, frame size model, group of pictures, video traffic modeling, MPEG video
15Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini Operating system enhancements to prevent the misuse of system calls. Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF access control database, buffer overflow based attacks, Linux, Linux, isolation, system calls interception
Displaying result #201 - #300 of 2062 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license