Suchergebnisse - "Buffer-overflow"

  1. 1

    On time-to-buffer overflow distribution in a single-machine discrete-time system with finite capacity von Kempa, Wojciech M.

    ISSN: 1392-6292, 1648-3510
    Veröffentlicht: Vilnius Vilnius Gediminas Technical University 01.03.2020
    Veröffentlicht in Mathematical modelling and analysis (01.03.2020)
    “… The closed-form formula for the generating function of the time to the first buffer overflow distribution conditioned by the initial buffer state is found …”
    Volltext
    Journal Article
  2. 2

    On the structure of data losses induced by an overflowed buffer von Chydzinski, Andrzej

    ISSN: 0096-3003
    Veröffentlicht: Elsevier Inc 15.02.2022
    Veröffentlicht in Applied mathematics and computation (15.02.2022)
    “… •The autocorrelation of the interarrival times of a stream of packets has a deep impact on the structure of losses induced by an overflowed buffer.•The burst …”
    Volltext
    Journal Article
  3. 3

    Optimal Resource Allocation for Energy-Harvesting Communication Networks Under Statistical QoS Constraints von Zewde, Tewodros Aklilu, Gursoy, M. Cenk

    ISSN: 0733-8716, 1558-0008
    Veröffentlicht: New York IEEE 01.02.2019
    Veröffentlicht in IEEE journal on selected areas in communications (01.02.2019)
    “… ) in the presence of delay-limited sources. Each energy-harvesting user equipment is assumed to be subject to limitations on the buffer overflow probability, specified …”
    Volltext
    Journal Article
  4. 4

    Goal-oriented dynamic test generation von Do, TheAnh, Khoo, Siau-Cheng, Fong, Alvis Cheuk Ming, Pears, Russel, Quan, Tho Thanh

    ISSN: 0950-5849, 1873-6025
    Veröffentlicht: Amsterdam Elsevier B.V 01.10.2015
    Veröffentlicht in Information and software technology (01.10.2015)
    “… Memory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats …”
    Volltext
    Journal Article
  5. 5

    Wireless-powered communication under statistical quality of service constraints von Zewde, Tewodros A., Gursoy, M. Cenk

    ISSN: 1938-1883
    Veröffentlicht: IEEE 01.05.2016
    “… ). Each user is subject to limitations on the buffer overflow probability, specified by the quality of service (QoS) exponent θ …”
    Volltext
    Tagungsbericht Journal Article
  6. 6

    Cross-layer Adaptive Transmission: Optimal Strategies in Fading Channels von Anh Tuan Hoang, Motani, M.

    ISSN: 0090-6778, 1558-0857
    Veröffentlicht: New York, NY IEEE 01.05.2008
    Veröffentlicht in IEEE transactions on communications (01.05.2008)
    “… ) requirement, maximizing the system throughput is equivalent to minimizing packet loss due to buffer overflow …”
    Volltext
    Journal Article
  7. 7

    Stable Scheduling Policies for Maximizing Throughput in Generalized Constrained Queueing Systems von Chaporkar, P., Sarkar, S.

    ISSN: 0018-9286, 1558-2523
    Veröffentlicht: New York, NY IEEE 01.09.2008
    Veröffentlicht in IEEE transactions on automatic control (01.09.2008)
    “… We consider a class of queueing networks referred to as "generalized constrained queueing networks" which form the basis of several different communication …”
    Volltext
    Journal Article
  8. 8

    Cross-layer adaptive transmission with incomplete system state information von Anh Tuan Hoang, Motani, M.

    ISSN: 0090-6778, 1558-0857
    Veröffentlicht: New York, NY IEEE 01.11.2008
    Veröffentlicht in IEEE transactions on communications (01.11.2008)
    “… Data packets are subject to loss due to buffer overflow and transmission errors. We study the problem of adapting the transmit power and rate based on the buffer …”
    Volltext
    Journal Article
  9. 9

    Assuring software security against buffer overflow attacks in embedded software development life cycle von Chul Su Park, Jae Hee Lee, Seong Chae Seo, Byung Ki Kim

    ISBN: 1424454271, 9781424454273
    ISSN: 1738-9445
    Veröffentlicht: IEEE 01.02.2010
    “… , mitigates, and removes the vulnerabilities throughout system development life cycle. This paper is intended to introduce embedded software analyzer to challenges involved in designing secure embedded systems against buffer overflow attacks …”
    Volltext
    Tagungsbericht
  10. 10

    Multilevel diversity coding with distortion von Yeung, R.W.

    ISSN: 0018-9448, 1557-9654
    Veröffentlicht: New York, NY IEEE 01.03.1995
    Veröffentlicht in IEEE transactions on information theory (01.03.1995)
    “… The reconstructions of the source by decoders within the same level are identical, and are subject to the same distortion criterion …”
    Volltext
    Journal Article Tagungsbericht
  11. 11

    Energy-Efficient Time Allocation for Wireless Energy Harvesting Communication Networks von Zewde, Tewodros A., Gursoy, M. Cenk

    Veröffentlicht: IEEE 01.12.2016
    Veröffentlicht in 2016 IEEE Globecom Workshops (GC Wkshps) (01.12.2016)
    “… Each user is subject to limitations on the buffer overflow probability, specified by the quality of service (QoS) exponent …”
    Volltext
    Tagungsbericht
  12. 12

    Bit Allocation Scheme for Low-Delay H.264/AVC Rate Control von Jiang, M., Ling, N.

    ISBN: 9781424404803, 1424404800
    ISSN: 1522-4880
    Veröffentlicht: IEEE 01.10.2006
    Veröffentlicht in 2006 International Conference on Image Processing (01.10.2006)
    “… In our scheme, we propose a close-form solution to optimal bit allocation problem subject to constraints and we derive theoretically a mean absolute difference based (MAD-based) complexity measure …”
    Volltext
    Tagungsbericht
  13. 13

    Throughput maximization with buffer constraints in broadband OFDMA networks von Guoqing Li, Hui Liu

    ISBN: 9780780376632, 0780376633
    ISSN: 1520-6149
    Veröffentlicht: IEEE 2003
    “… The problem of maximizing the base-station packet throughput subject to individual users' outage probability constraints is formulated …”
    Volltext
    Tagungsbericht
  14. 14

    Universal coding with minimum probability of codeword length overflow von Merhav, N.

    ISSN: 0018-9448, 1557-9654
    Veröffentlicht: New York, NY IEEE 01.05.1991
    Veröffentlicht in IEEE transactions on information theory (01.05.1991)
    “… The aim is to minimize the probability that the normalized length of the codeword will exceed a given threshold B, subject to the Kraft inequality …”
    Volltext
    Journal Article
  15. 15

    Omnipod CTO Available for Comments and Observations in Regards to Reports on Yahoo Instant Messenger Security Flaw; Omnipod's Secure IM Solution Not Vulnerable to Buffer Overflow Attacks von Business Editors/High-Tech Writers

    Veröffentlicht: New York Business Wire 08.12.2003
    Veröffentlicht in Business Wire (08.12.2003)
    “… Recognized as a contributing writer and researcher on the subject of Enterprise Instant Messaging, Omnipod's Chief Technology Officer, [Matthew Hunt …”
    Volltext
    Newsletter
  16. 16

    A New Congestion Control Mechanism for WSNs von Michopoulos, V, Guan, L, Phillips, I

    ISBN: 1424475473, 9781424475476
    Veröffentlicht: IEEE 01.06.2010
    “… As a result, the performance of the whole network is subject to undesirable change; an issue that renders congestion control an issue of uttermost importance for such networks …”
    Volltext
    Tagungsbericht
  17. 17

    Analysis of controlled multiplexing systems via numerical stochastic control methods von Kushner, H.J.

    ISSN: 0733-8716
    Veröffentlicht: IEEE 01.09.1995
    Veröffentlicht in IEEE journal on selected areas in communications (01.09.1995)
    “… low-order AR schemes). Control problems arise when we wish to control cell loss due to buffer overflows by regulating the sources …”
    Volltext
    Journal Article
  18. 18

    The Evolution and Decay of Statically Detected Source Code Vulnerabilities von Di Penta, M., Cerulo, L., Aversano, L.

    ISBN: 9780769533537, 0769533531
    Veröffentlicht: IEEE 01.09.2008
    “… To this aim, a number of static analysis tools have been developed to detect the presence of instructions that can be subject to vulnerability attacks, ranging from buffer overflow exploitations …”
    Volltext
    Tagungsbericht
  19. 19

    On the Capacity of MIMO Channels and Its Effect on Network Performance von Luccini, M., Primak, S., Shami, A.

    ISBN: 1424417511, 9781424417513
    Veröffentlicht: IEEE 01.04.2008
    “… ) and upper layer performances (i.e. Medium Access Control layer, MAC). In this paper, we consider a single buffer queuing system subject to a buffer overflow probability …”
    Volltext
    Tagungsbericht
  20. 20

    A Cross-Platform Multifunctional Testbed for Vulnerability Attack von Yin Xinchun, Shen Xiaobin, Yuan Fuchao, Mao Bing, Xie Li

    ISBN: 9780769539300, 1424454220, 9781424454228, 0769539300
    Veröffentlicht: IEEE 01.12.2009
    “… In this paper, we first analyzed the characteristics and disadvantages of existing tools and testbeds for vulnerability attack, and discussed popular software bug types, including buffer overflows and integer overflows …”
    Volltext
    Tagungsbericht