|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1155 occurrences of 729 keywords
|
|
|
Results
Found 2062 publication records. Showing 2062 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Mingzhu Wei, Elke A. Rundensteiner, Murali Mani |
Utility-driven load shedding for xml stream processing. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
xml query processing, xml streams, preference model, load shedding |
17 | Jalil S. Harsini, Farshad Lahouti |
Adaptive Transmission of QoS-Guaranteed Traffic over MIMO Wireless Links. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Furong Wang, Yasha Liu, Lai Tu, Peng Zhang |
Analysis of User Mobility Effects on Packet Level Performances in Next Generation Mobile Communication Networks. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
packet level performance, call level performance, user mobility, cell residence time |
17 | Zhenzhong Chen, King Ngi Ngan |
Towards Rate-Distortion Tradeoff in Real-Time Color Video Coding. |
IEEE Trans. Circuits Syst. Video Technol. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Alicia Nicki Washington, Harry G. Perros |
Performance Analysis of Traffic-Groomed Optical Networks Employing Alternate Routing Techniques. |
ITC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Tae-Chul Hong, Kun Seok Kang, Do-Seob Ahn, Hojin Lee |
Selective Repeat Hybrid ARQ Type II in the GEO Satellite Networks. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Peng Liu 0006, Yu-ping Ma, Jianshe Dong |
Adaptive Processing Scheme of Overflowed Buckets for Bucket Sort Algorithm. |
IFSA (2) |
2007 |
DBLP DOI BibTeX RDF |
THSort, THSort2, NTSort, External Sort, Bucket Sort |
17 | Xiao Hu, Pengyong Ma, Shuming Chen |
Scheduling for Combining Traffic of On-Chip Trace Data in Embedded Multi-core Processor. |
ICESS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Alicia Nicki Washington, Harry G. Perros |
Analysis of a Traffic-Groomed Optical Network with Alternate Routing. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Adel Elsayed |
Visual mining in the information spa. |
CEC/EEE |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Chang-Hsien Tsai, Shih-Kun Huang |
Detection and Diagnosis of Control Interception. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Asia Slowinska, Herbert Bos |
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
attack analysis, honeypots, intrusion detection and prevention |
17 | Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh |
Dynamic multi-process information flow tracking for web application security. |
Middleware (Demos and Posters) |
2007 |
DBLP DOI BibTeX RDF |
dynamic checking compiler, SQL injection, cross-site scripting, web application security, taint analysis, information flow tracking |
17 | Stelios Sidiroglou, Angelos D. Keromytis |
Execution transactions for defending against software failures: use and evaluation. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Transactional Execution, Buffer overflows, Exception |
17 | Amparo Gil, Javier Segura 0001, Nico M. Temme |
Computing the real parabolic cylinder functions U(a, x), V(a, x). |
ACM Trans. Math. Softw. |
2006 |
DBLP DOI BibTeX RDF |
Parabolic cylinder functions, nonoscillating integral representations, asymptotic expansions, numerical quadrature |
17 | Danny Hendler, Yossi Lev, Mark Moir, Nir Shavit |
A dynamic-sized nonblocking work stealing deque. |
Distributed Comput. |
2006 |
DBLP DOI BibTeX RDF |
Load balancing, Data structures, Concurrent programming, Lock-free, Work stealing |
17 | Lei Ying 0001, R. Srikant 0001, Atilla Eryilmaz, Geir E. Dullerud |
A Large Deviations Analysis of Scheduling in Wireless Networks. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Minqiang Jiang, Nam Ling |
Low-delay rate control for real-time H.264/AVC video coding. |
IEEE Trans. Multim. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Pieter-Tjerk de Boer |
Analysis of state-independent importance-sampling measures for the two-node tandem queue. |
ACM Trans. Model. Comput. Simul. |
2006 |
DBLP DOI BibTeX RDF |
tandem queueing networks, importance-sampling, Rare-event simulation |
17 | Minqiang Jiang, Nam Ling |
Bit Allocation Scheme for Low-Delay H.264/AVC Rate Control. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Weidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang 0002 |
InfoShield: a security architecture for protecting information usage in memory. |
HPCA |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Juan J. Alcaraz, Fernando Cerdán |
Slope based discard: a buffer management scheme for 3G links supporting TCP traffic. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
TCP over 3G links, radio link control (RLC) |
17 | Zhiqiang Lin, Bing Mao, Li Xie 0001 |
A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Qi Zhao 0006, Jun (Jim) Xu, Zhen Liu |
Design of a novel statistics counter architecture with optimal space and time efficiency. |
SIGMETRICS/Performance |
2006 |
DBLP DOI BibTeX RDF |
statistics counter, data streaming, router |
17 | József Bíró |
Loss ratio approximations in buffered systems with regulated inputs. |
VALUETOOLS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Divya Arora, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha |
Architectural support for safe software execution on embedded processors. |
CODES+ISSS |
2006 |
DBLP DOI BibTeX RDF |
type safety, memory safety, extensible processors |
17 | Sylvie Boldo |
Pitfalls of a Full Floating-Point Proof: Example on the Formal Proof of the Veltkamp/Dekker Algorithms. |
IJCAR |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Hoon Lee, Yoon Kee Kim, Kwang-Hui Lee |
Bandwidth Management for Smooth Playback of Video Streaming Services. |
APNOMS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Cheng-Liang Chen, Meng-Fen Ho, Chung-Lin Huang |
Adaptive rate control for H.264/AVC using Kalman filter. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Brian Hackett, Manuvir Das, Daniel Wang, Zhe Yang 0001 |
Modular checking for buffer overflows in the large. |
ICSE |
2006 |
DBLP DOI BibTeX RDF |
annotation design, annotation inference, modular analysis, buffer overflows |
17 | Susanta Nanda, Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh |
Foreign Code Detection on the Windows/X86 Platform. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Rafiahamed Shaik, Mrityunjoy Chakraborty |
An Efficient Realization of the Decision Feedback Equalizer using Block Floating Point Arithmetic. |
APCCAS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Dong Ye 0004, David R. Kaeli |
A reliable return address stack: microarchitectural features to defeat stack smashing. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Pieter-Tjerk de Boer |
Rare-Event Simulation of Non-Markovian Queueing Networks Using a State-Dependent Change of Measure Determined Using Cross-Entropy. |
Ann. Oper. Res. |
2005 |
DBLP DOI BibTeX RDF |
queueing networks, rare-event simulation, cross-entropy method |
17 | Takeshi Hashimoto |
Bounds on a probability for the heavy tailed distribution and the probability of deficient decoding in sequential decoding. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Guillermo Barrenetxea, Baltasar Beferull-Lozano, Martin Vetterli |
Efficient routing with small buffers in dense networks. |
IPSN |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Konstantina Karagianni, Vassilis Paliouras |
Low-Power Aspects of Nonlinear Signal Processing. |
PATMOS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Hind Castel-Taleb, Jean-Michel Fourneau, Nihal Pekergin |
Stochastic Bounds on Partial Ordering: Application to Memory Overflows Due to Bursty Arrivals. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Concettina Del Grosso, Giuliano Antoniol, Massimiliano Di Penta, Philippe Galinier, Ettore Merlo |
Improving network applications security: a new heuristic to generate stress testing data. |
GECCO |
2005 |
DBLP DOI BibTeX RDF |
security, test data generation, evolutionary testing, stress testing |
17 | David Primeaux |
Programming with Gaussian Logarithms to Compute the Approximate Addition and Subtraction of Very Small (or Very Large) Positive Numbers. |
SNPD |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jang-Sub Kim, Min Young Chung, Dong Ryeol Shin |
A Vertical Handoff Decision Process and Algorithm Based on Context Information in CDMA-WLAN Interworking. |
International Conference on Computational Science (2) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Sujeong Choi, Sang Hyuk Kang, Bara Kim |
Packet scheduling based on GeoY/G/infinity input process modeling for streaming video. |
ISCAS (4) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Ying-Jiun Hsieh, Yavuz A. Bozer |
Analytical Modeling of Closed-Loop Conveyors with Load Recirculation. |
ICCSA (4) |
2005 |
DBLP DOI BibTeX RDF |
Conveyor systems, Manufacturing systems, Material handling |
17 | Jang-Sub Kim, Min Young Chung, Dong Ryeol Shin |
A Vertical Handoff Algorithm Based on Context Information in CDMA-WLAN Integrated Networks. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Ward Whitt |
Heavy-Traffic Limits for Loss Proportions in Single-Server Queues. |
Queueing Syst. Theory Appl. |
2004 |
DBLP DOI BibTeX RDF |
finite dam, local limit, heavy-tailed probability distribution, stable process, blocking probability, heavy-traffic, single-server queue, overflows, diffusion approximation, loss rate, finite-capacity queue |
17 | Scott Jordan, Kalpana Jogi, Chunlin Shi, Ikhlaq Sidhu |
The variation of optimal bandwidth and buffer allocation with the number of sources. |
IEEE/ACM Trans. Netw. |
2004 |
DBLP DOI BibTeX RDF |
resource allocation, dimensioning, cost minimization |
17 | Yu Sun 0003, Ishfaq Ahmad |
A robust and adaptive rate control algorithm for object-based video coding. |
IEEE Trans. Circuits Syst. Video Technol. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Qiong Li, Mihaela van der Schaar |
Providing adaptive QoS to layered video over wireless local area networks through real-time retry limit adaptation. |
IEEE Trans. Multim. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh |
On the effectiveness of address-space randomization. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
address-space randomization, automated attacks, diversity |
17 | Danny Hendler, Yossi Lev, Nir Shavit |
Dynamic Memory ABP Work-Stealing. |
DISC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya |
ARCHERR: Runtime Environment Driven Program Safety. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Sem C. Borst, Michel Mandjes, Miranda van Uitert |
Generalized processor sharing with light-tailed and heavy-tailed input. |
IEEE/ACM Trans. Netw. |
2003 |
DBLP DOI BibTeX RDF |
Markov fluid, heavy-tailed traffic, light-tailed traffic, weighted fair queueing, workload asymptotics, large deviations, Generalized processor sharing (GPS), regular variation |
17 | Sylvie Boldo, Marc Daumas |
Representable Correcting Terms for Possibly Underflowing Floating Point Operations. |
IEEE Symposium on Computer Arithmetic |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Rachid El Azouzi, Eitan Altman |
A Queuing Analysis of Packet Dropping over a Wireless Link with Retransmissions. |
PWC |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi |
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms |
17 | Jun Xu 0003, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
Transparent Runtime Randomization for Security. |
SRDS |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Costas Courcoubetis, Antonis Dimakis, George D. Stamoulis |
Traffic equivalence and subistution in a multiplexer with applications to dynamic available capacity estimation. |
IEEE/ACM Trans. Netw. |
2002 |
DBLP DOI BibTeX RDF |
available capacity, many-sources asymptotic, on-line estimation, call admission control, traffic modeling, effective bandwidth |
17 | Shin-ichi Minato |
Streaming BDD Manipulation. |
IEEE Trans. Computers |
2002 |
DBLP DOI BibTeX RDF |
algorithm, verification, testing, data structure, logic design, binary decision diagram, BDD, combinatorial problem, VLSI CAD |
17 | Gang Luo 0001, Curt J. Ellmann, Peter J. Haas, Jeffrey F. Naughton |
A scalable hash ripple join algorithm. |
SIGMOD Conference |
2002 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW) |
17 | Pieter-Tjerk de Boer, Dirk P. Kroese, Reuven Y. Rubinstein |
Rare event simulation and combinatorial optimization using cross entropy: estimating buffer overflows in three stages using cross-entropy. |
WSC |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Sem C. Borst, Michel Mandjes, Miranda van Uitert |
Generalized processor sharing with heterogeneous traffic classes. |
SIGMETRICS Perform. Evaluation Rev. |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Nurit Dor, Michael Rodeh, Shmuel Sagiv |
Cleanness Checking of String Manipulations in C Programs via Integer Analysis. |
SAS |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Seon Wook Kim, Chong-liang Ooi, Rudolf Eigenmann, Babak Falsafi, T. N. Vijaykumar |
Reference idempotency analysis: a framework for optimizing speculative execution. |
PPoPP |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Yi-Bing Lin, Wei-Ru Lai, Rong-Jaye Chen |
Performance Analysis for Dual Band PCS Networks. |
IEEE Trans. Computers |
2000 |
DBLP DOI BibTeX RDF |
Dual band, macrocell, microcell, handoff, GSM, personal communications services |
17 | U. Pal 0001, B. B. Chaudhuri 0001 |
Automatic Recognition of Unconstrained Off-Line Bangla Handwritten Numerals. |
ICMI |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Pieter-Tjerk de Boer, Victor F. Nicola, Reuven Y. Rubinstein |
Techniques for simulating difficult queueing problems: adaptive importance sampling simulation of queueing networks. |
WSC |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Allan K. Y. Wong, Tharam S. Dillon |
A Fault-Tolerant Data Communication Setup to Improve Reliability and Performance for Internet Based Distributed Applications. |
PRDC |
1999 |
DBLP DOI BibTeX RDF |
consecutive message transmission and adaptive buffer management, fault tolerance, performance, reliability |
17 | Han Zhou, C. H. Chang |
A dynamic bandwidth allocation scheme for multimedia data over ATM networks. |
ICNP |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Edward Omiecinski, Eileen Tien Lin |
The Adaptive-Hash Join Algorithm for a Hypercube Multicomputer. |
IEEE Trans. Parallel Distributed Syst. |
1992 |
DBLP DOI BibTeX RDF |
adaptive-hash join algorithm, hybrid-hash, parallel algorithms, hypercube networks, file organisation, nested-loop, hypercube multicomputer |
17 | Tobias G. Noll |
Carry-save architectures for high-speed digital signal processing. |
J. VLSI Signal Process. |
1991 |
DBLP DOI BibTeX RDF |
|
17 | R. Victor Klassen |
Integer Forward Differencing of Cubic Polynomials: Analysis and Algorithms. |
ACM Trans. Graph. |
1991 |
DBLP DOI BibTeX RDF |
Be´zier curves, parametric curve plotting |
17 | Michael Freeston |
A Well-Behaved File Structure for the Storage of Spatial Objects. |
SSD |
1989 |
DBLP DOI BibTeX RDF |
|
17 | David B. Lomet |
A Simple Bounded Disorder File Organization with Good Performance. |
ACM Trans. Database Syst. |
1988 |
DBLP DOI BibTeX RDF |
|
17 | Clinton R. Foulk |
Macintosh assembly language. |
ACM Conference on Computer Science |
1988 |
DBLP DOI BibTeX RDF |
Macintosh |
17 | Michel Scholl |
New File Organizations Based on Dynamic Hashing. |
ACM Trans. Database Syst. |
1981 |
DBLP DOI BibTeX RDF |
dynamic hashing, linear splitting, data structure, hashing, file organization |
15 | George Lawton |
On the Trail of the Conficker Worm. |
Computer |
2009 |
DBLP DOI BibTeX RDF |
Conficker, Malware, Worms, Buffer overflow, Security and privacy |
15 | Tugkan Tuglular, Can Arda Muftuoglu, Fevzi Belli, Michael Linschulte |
Event-Based Input Validation Using Design-by-Contract Patterns. |
ISSRE |
2009 |
DBLP DOI BibTeX RDF |
Boundary Overflow, Decision Tables, Design by Contract, Security Testing, Event Sequence Graphs, Input Validation |
15 | Mu Zhang 0004, Johnny Wong, Wallapak Tavanapong, Jung-Hwan Oh 0001, Piet C. de Groen |
Deadline-constrained media uploading systems. |
Multim. Tools Appl. |
2008 |
DBLP DOI BibTeX RDF |
File upload, Emergency control for storage overflow, Scheduling algorithms, Hard real-time systems |
15 | Chetan Parampalli, R. Sekar 0001, Rob Johnson |
A practical mimicry attack against powerful system-call monitors. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack |
15 | Hyungwoo Kang |
Security Assessment Framework Using Static Analysis and Fault Injection. |
ICIC (1) |
2008 |
DBLP DOI BibTeX RDF |
RPC (Remote Procedure Call), Static analysis, Fault injection, Buffer overflow, Software security, Security assessment |
15 | Sandeep Bhatkar, R. Sekar 0001 |
Data Space Randomization. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
address space randomization, buffer overflow, memory error |
15 | Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Benjamin G. Zorn |
Archipelago: trading address space for reliability and security. |
ASPLOS |
2008 |
DBLP DOI BibTeX RDF |
Archipelago, probabilistic memory safety, randomized algorithms, virtual memory, buffer overflow, dynamic memory allocation, memory errors |
15 | Qijun Gu, Rizwan Noorani |
Towards self-propagate mal-packets in sensor networks. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
mal-packet, sensor worm, buffer overflow, control flow |
15 | Danyel Fisher, A. J. Bernheim Brush, Bernie Hogan, Marc A. Smith, Andy Jacobs |
Using Social Metadata in Email Triage: Lessons from the Field. |
HCI (9) |
2007 |
DBLP DOI BibTeX RDF |
Email overflow, email triage, social metadata, social sorting |
15 | Hyungwoo Kang, Dong Hoon Lee 0001 |
Security Assessment for Application Network Services Using Fault Injection. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
RPC (Remote Procedure Call), Fault injection, Buffer overflow, Software security, Security assessment |
15 | Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong |
Minos: Architectural support for protecting control data. |
ACM Trans. Archit. Code Optim. |
2006 |
DBLP DOI BibTeX RDF |
Control data, worms, buffer overflow |
15 | Danny Nebenzahl, Shmuel Sagiv, Avishai Wool |
Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Computer security, instrumentation, buffer overflow |
15 | Do Young Eun, Ness B. Shroff |
Network decomposition: theory and practice. |
IEEE/ACM Trans. Netw. |
2005 |
DBLP DOI BibTeX RDF |
many-sources-asymptotic, performance analysis, network, aggregation, decomposition, overflow probability |
15 | Zhenkai Liang, R. Sekar 0001 |
Fast and automated generation of attack signatures: a basis for building self-protecting servers. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
denial-of-service protection, worm defense, buffer overflow, signature generation, memory error |
15 | Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh |
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. |
ICAC |
2005 |
DBLP DOI BibTeX RDF |
Intrusion-tolerant computing, survivable service, buffer overflow, self-healing, rootkits, chip multi processor |
15 | Søren Asmussen, Mats Pihlsgård |
Transient Properties of Many-Server Queues and Related QBDs. |
Queueing Syst. Theory Appl. |
2004 |
DBLP DOI BibTeX RDF |
exponential martingale, first passage problem, heterogeneous servers, Kella-Whitt martingale, Lévy process, MMM/MMM/c queue, optional stopping, buffer overflow, Laplace transform, Markov additive process, birth-death process |
15 | G. Edward Suh, Jae W. Lee, David Zhang 0001, Srinivas Devadas |
Secure program execution via dynamic information flow tracking. |
ASPLOS |
2004 |
DBLP DOI BibTeX RDF |
format string, hardware tagging, buffer overflow |
15 | Alan A. Jorgensen |
Testing with hostile data streams. |
ACM SIGSOFT Softw. Eng. Notes |
2003 |
DBLP DOI BibTeX RDF |
Adobe Acrobat Reader, software testing, steganography, random testing, buffer overflow, internet security, buffer overrun |
15 | Prabhaker Mateti |
A laboratory-based course on internet security. |
SIGCSE |
2003 |
DBLP DOI BibTeX RDF |
TCP/IP exploits, network security, ethics, firewalls, buffer overflow, internet security |
15 | Yichen Xie 0001, Andy Chou, Dawson R. Engler |
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. |
ESEC / SIGSOFT FSE |
2003 |
DBLP DOI BibTeX RDF |
memory access errors, security, static analysis, error detection, buffer overflow, buffer overrun |
15 | Nurit Dor, Michael Rodeh, Shmuel Sagiv |
CSSV: towards a realistic tool for statically detecting all buffer overflows in C. |
PLDI |
2003 |
DBLP DOI BibTeX RDF |
static analysis, abstract interpretation, error detection, contracts, buffer overflow |
15 | Cheng-Shang Chang, Rene L. Cruz, Jean-Yves Le Boudec, Patrick Thiran |
A min, + system theory for constrained traffic regulation and dynamic service guarantees. |
IEEE/ACM Trans. Netw. |
2002 |
DBLP DOI BibTeX RDF |
(min, +) algebra, performance analysis, buffer overflow, packet losses, network calculus, traffic shaping |
15 | Yishay Mansour, Boaz Patt-Shamir |
Jitter control in QoS networks. |
IEEE/ACM Trans. Netw. |
2001 |
DBLP DOI BibTeX RDF |
Buffer overflow and underflow, streaming connections, competitive analysis, jitter control, quality of service networks |
15 | Michael Frey, Son Nguyen-Quang |
A gamma-based framework for modeling variable-rate MPEG video sources: the GOP GBAR model. |
IEEE/ACM Trans. Netw. |
2000 |
DBLP DOI BibTeX RDF |
buffer overflow loss, frame size model, group of pictures, video traffic modeling, MPEG video |
15 | Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini |
Operating system enhancements to prevent the misuse of system calls. |
CCS |
2000 |
DBLP DOI BibTeX RDF |
access control database, buffer overflow based attacks, Linux, Linux, isolation, system calls interception |
Displaying result #201 - #300 of 2062 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|