Suchergebnisse - "Buffer-overflow"
-
1
On time-to-buffer overflow distribution in a single-machine discrete-time system with finite capacity
ISSN: 1392-6292, 1648-3510Veröffentlicht: Vilnius Vilnius Gediminas Technical University 01.03.2020Veröffentlicht in Mathematical modelling and analysis (01.03.2020)“… The closed-form formula for the generating function of the time to the first buffer overflow distribution conditioned by the initial buffer state is found …”
Volltext
Journal Article -
2
On the structure of data losses induced by an overflowed buffer
ISSN: 0096-3003Veröffentlicht: Elsevier Inc 15.02.2022Veröffentlicht in Applied mathematics and computation (15.02.2022)“… •The autocorrelation of the interarrival times of a stream of packets has a deep impact on the structure of losses induced by an overflowed buffer.•The burst …”
Volltext
Journal Article -
3
Optimal Resource Allocation for Energy-Harvesting Communication Networks Under Statistical QoS Constraints
ISSN: 0733-8716, 1558-0008Veröffentlicht: New York IEEE 01.02.2019Veröffentlicht in IEEE journal on selected areas in communications (01.02.2019)“… ) in the presence of delay-limited sources. Each energy-harvesting user equipment is assumed to be subject to limitations on the buffer overflow probability, specified …”
Volltext
Journal Article -
4
Goal-oriented dynamic test generation
ISSN: 0950-5849, 1873-6025Veröffentlicht: Amsterdam Elsevier B.V 01.10.2015Veröffentlicht in Information and software technology (01.10.2015)“… Memory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats …”
Volltext
Journal Article -
5
Wireless-powered communication under statistical quality of service constraints
ISSN: 1938-1883Veröffentlicht: IEEE 01.05.2016Veröffentlicht in IEEE International Conference on Communications (2003) (01.05.2016)“… ). Each user is subject to limitations on the buffer overflow probability, specified by the quality of service (QoS) exponent θ …”
Volltext
Tagungsbericht Journal Article -
6
Cross-layer Adaptive Transmission: Optimal Strategies in Fading Channels
ISSN: 0090-6778, 1558-0857Veröffentlicht: New York, NY IEEE 01.05.2008Veröffentlicht in IEEE transactions on communications (01.05.2008)“… ) requirement, maximizing the system throughput is equivalent to minimizing packet loss due to buffer overflow …”
Volltext
Journal Article -
7
Stable Scheduling Policies for Maximizing Throughput in Generalized Constrained Queueing Systems
ISSN: 0018-9286, 1558-2523Veröffentlicht: New York, NY IEEE 01.09.2008Veröffentlicht in IEEE transactions on automatic control (01.09.2008)“… We consider a class of queueing networks referred to as "generalized constrained queueing networks" which form the basis of several different communication …”
Volltext
Journal Article -
8
Cross-layer adaptive transmission with incomplete system state information
ISSN: 0090-6778, 1558-0857Veröffentlicht: New York, NY IEEE 01.11.2008Veröffentlicht in IEEE transactions on communications (01.11.2008)“… Data packets are subject to loss due to buffer overflow and transmission errors. We study the problem of adapting the transmit power and rate based on the buffer …”
Volltext
Journal Article -
9
Assuring software security against buffer overflow attacks in embedded software development life cycle
ISBN: 1424454271, 9781424454273ISSN: 1738-9445Veröffentlicht: IEEE 01.02.2010Veröffentlicht in 2010 The 12th International Conference on Advanced Communication Technology (ICACT) (01.02.2010)“… , mitigates, and removes the vulnerabilities throughout system development life cycle. This paper is intended to introduce embedded software analyzer to challenges involved in designing secure embedded systems against buffer overflow attacks …”
Volltext
Tagungsbericht -
10
Multilevel diversity coding with distortion
ISSN: 0018-9448, 1557-9654Veröffentlicht: New York, NY IEEE 01.03.1995Veröffentlicht in IEEE transactions on information theory (01.03.1995)“… The reconstructions of the source by decoders within the same level are identical, and are subject to the same distortion criterion …”
Volltext
Journal Article Tagungsbericht -
11
Energy-Efficient Time Allocation for Wireless Energy Harvesting Communication Networks
Veröffentlicht: IEEE 01.12.2016Veröffentlicht in 2016 IEEE Globecom Workshops (GC Wkshps) (01.12.2016)“… Each user is subject to limitations on the buffer overflow probability, specified by the quality of service (QoS) exponent …”
Volltext
Tagungsbericht -
12
Bit Allocation Scheme for Low-Delay H.264/AVC Rate Control
ISBN: 9781424404803, 1424404800ISSN: 1522-4880Veröffentlicht: IEEE 01.10.2006Veröffentlicht in 2006 International Conference on Image Processing (01.10.2006)“… In our scheme, we propose a close-form solution to optimal bit allocation problem subject to constraints and we derive theoretically a mean absolute difference based (MAD-based) complexity measure …”
Volltext
Tagungsbericht -
13
Throughput maximization with buffer constraints in broadband OFDMA networks
ISBN: 9780780376632, 0780376633ISSN: 1520-6149Veröffentlicht: IEEE 2003Veröffentlicht in 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03) (2003)“… The problem of maximizing the base-station packet throughput subject to individual users' outage probability constraints is formulated …”
Volltext
Tagungsbericht -
14
Universal coding with minimum probability of codeword length overflow
ISSN: 0018-9448, 1557-9654Veröffentlicht: New York, NY IEEE 01.05.1991Veröffentlicht in IEEE transactions on information theory (01.05.1991)“… The aim is to minimize the probability that the normalized length of the codeword will exceed a given threshold B, subject to the Kraft inequality …”
Volltext
Journal Article -
15
Omnipod CTO Available for Comments and Observations in Regards to Reports on Yahoo Instant Messenger Security Flaw; Omnipod's Secure IM Solution Not Vulnerable to Buffer Overflow Attacks
Veröffentlicht: New York Business Wire 08.12.2003Veröffentlicht in Business Wire (08.12.2003)“… Recognized as a contributing writer and researcher on the subject of Enterprise Instant Messaging, Omnipod's Chief Technology Officer, [Matthew Hunt …”
Volltext
Newsletter -
16
A New Congestion Control Mechanism for WSNs
ISBN: 1424475473, 9781424475476Veröffentlicht: IEEE 01.06.2010Veröffentlicht in 2010 IEEE 10th International Conference on Computer and Information Technology (01.06.2010)“… As a result, the performance of the whole network is subject to undesirable change; an issue that renders congestion control an issue of uttermost importance for such networks …”
Volltext
Tagungsbericht -
17
Analysis of controlled multiplexing systems via numerical stochastic control methods
ISSN: 0733-8716Veröffentlicht: IEEE 01.09.1995Veröffentlicht in IEEE journal on selected areas in communications (01.09.1995)“… low-order AR schemes). Control problems arise when we wish to control cell loss due to buffer overflows by regulating the sources …”
Volltext
Journal Article -
18
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
ISBN: 9780769533537, 0769533531Veröffentlicht: IEEE 01.09.2008Veröffentlicht in SCAM 2008 : proceedings : eighth IEEE International Working Conference on Source Code Analysis and Manipulation : 28-29 September 2008, Beijing, China (01.09.2008)“… To this aim, a number of static analysis tools have been developed to detect the presence of instructions that can be subject to vulnerability attacks, ranging from buffer overflow exploitations …”
Volltext
Tagungsbericht -
19
On the Capacity of MIMO Channels and Its Effect on Network Performance
ISBN: 1424417511, 9781424417513Veröffentlicht: IEEE 01.04.2008Veröffentlicht in 2008 3rd International Conference on Information and Communication Technologies : from Theory to Applications : Damascus, Syria 7-11 April 2008 (01.04.2008)“… ) and upper layer performances (i.e. Medium Access Control layer, MAC). In this paper, we consider a single buffer queuing system subject to a buffer overflow probability …”
Volltext
Tagungsbericht -
20
A Cross-Platform Multifunctional Testbed for Vulnerability Attack
ISBN: 9780769539300, 1424454220, 9781424454228, 0769539300Veröffentlicht: IEEE 01.12.2009Veröffentlicht in Proceedings : 2009 International Forum on Computer Science-Technology and Applications ; IFCSTA 2009 ; 25-27 December 2009, Chongqing, China / [edited by Zhou Qihai ; sponsored by IITAA (01.12.2009)“… In this paper, we first analyzed the characteristics and disadvantages of existing tools and testbeds for vulnerability attack, and discussed popular software bug types, including buffer overflows and integer overflows …”
Volltext
Tagungsbericht

