Výsledky vyhledávání - "buffer overflow"
-
1
On time-to-buffer overflow distribution in a single-machine discrete-time system with finite capacity
ISSN: 1392-6292, 1648-3510Vydáno: Vilnius Vilnius Gediminas Technical University 01.03.2020Vydáno v Mathematical modelling and analysis (01.03.2020)“… The closed-form formula for the generating function of the time to the first buffer overflow distribution conditioned by the initial buffer state is found…”
Získat plný text
Journal Article -
2
On the structure of data losses induced by an overflowed buffer
ISSN: 0096-3003Vydáno: Elsevier Inc 15.02.2022Vydáno v Applied mathematics and computation (15.02.2022)“…•The autocorrelation of the interarrival times of a stream of packets has a deep impact on the structure of losses induced by an overflowed buffer.•The burst…”
Získat plný text
Journal Article -
3
Optimal Resource Allocation for Energy-Harvesting Communication Networks Under Statistical QoS Constraints
ISSN: 0733-8716, 1558-0008Vydáno: New York IEEE 01.02.2019Vydáno v IEEE journal on selected areas in communications (01.02.2019)“…) in the presence of delay-limited sources. Each energy-harvesting user equipment is assumed to be subject to limitations on the buffer overflow probability, specified…”
Získat plný text
Journal Article -
4
Goal-oriented dynamic test generation
ISSN: 0950-5849, 1873-6025Vydáno: Amsterdam Elsevier B.V 01.10.2015Vydáno v Information and software technology (01.10.2015)“…Memory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats…”
Získat plný text
Journal Article -
5
Wireless-powered communication under statistical quality of service constraints
ISSN: 1938-1883Vydáno: IEEE 01.05.2016Vydáno v IEEE International Conference on Communications (2003) (01.05.2016)“…). Each user is subject to limitations on the buffer overflow probability, specified by the quality of service (QoS) exponent θ…”
Získat plný text
Konferenční příspěvek Journal Article -
6
Cross-layer Adaptive Transmission: Optimal Strategies in Fading Channels
ISSN: 0090-6778, 1558-0857Vydáno: New York, NY IEEE 01.05.2008Vydáno v IEEE transactions on communications (01.05.2008)“…) requirement, maximizing the system throughput is equivalent to minimizing packet loss due to buffer overflow…”
Získat plný text
Journal Article -
7
Stable Scheduling Policies for Maximizing Throughput in Generalized Constrained Queueing Systems
ISSN: 0018-9286, 1558-2523Vydáno: New York, NY IEEE 01.09.2008Vydáno v IEEE transactions on automatic control (01.09.2008)“…We consider a class of queueing networks referred to as "generalized constrained queueing networks" which form the basis of several different communication…”
Získat plný text
Journal Article -
8
Cross-layer adaptive transmission with incomplete system state information
ISSN: 0090-6778, 1558-0857Vydáno: New York, NY IEEE 01.11.2008Vydáno v IEEE transactions on communications (01.11.2008)“… Data packets are subject to loss due to buffer overflow and transmission errors. We study the problem of adapting the transmit power and rate based on the buffer…”
Získat plný text
Journal Article -
9
Assuring software security against buffer overflow attacks in embedded software development life cycle
ISBN: 1424454271, 9781424454273ISSN: 1738-9445Vydáno: IEEE 01.02.2010Vydáno v 2010 The 12th International Conference on Advanced Communication Technology (ICACT) (01.02.2010)“…, mitigates, and removes the vulnerabilities throughout system development life cycle. This paper is intended to introduce embedded software analyzer to challenges involved in designing secure embedded systems against buffer overflow attacks…”
Získat plný text
Konferenční příspěvek -
10
Multilevel diversity coding with distortion
ISSN: 0018-9448, 1557-9654Vydáno: New York, NY IEEE 01.03.1995Vydáno v IEEE transactions on information theory (01.03.1995)“… The reconstructions of the source by decoders within the same level are identical, and are subject to the same distortion criterion…”
Získat plný text
Journal Article Konferenční příspěvek -
11
Energy-Efficient Time Allocation for Wireless Energy Harvesting Communication Networks
Vydáno: IEEE 01.12.2016Vydáno v 2016 IEEE Globecom Workshops (GC Wkshps) (01.12.2016)“… Each user is subject to limitations on the buffer overflow probability, specified by the quality of service (QoS) exponent…”
Získat plný text
Konferenční příspěvek -
12
Bit Allocation Scheme for Low-Delay H.264/AVC Rate Control
ISBN: 9781424404803, 1424404800ISSN: 1522-4880Vydáno: IEEE 01.10.2006Vydáno v 2006 International Conference on Image Processing (01.10.2006)“… In our scheme, we propose a close-form solution to optimal bit allocation problem subject to constraints and we derive theoretically a mean absolute difference based (MAD-based) complexity measure…”
Získat plný text
Konferenční příspěvek -
13
Throughput maximization with buffer constraints in broadband OFDMA networks
ISBN: 9780780376632, 0780376633ISSN: 1520-6149Vydáno: IEEE 2003Vydáno v 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03) (2003)“… The problem of maximizing the base-station packet throughput subject to individual users' outage probability constraints is formulated…”
Získat plný text
Konferenční příspěvek -
14
Universal coding with minimum probability of codeword length overflow
ISSN: 0018-9448, 1557-9654Vydáno: New York, NY IEEE 01.05.1991Vydáno v IEEE transactions on information theory (01.05.1991)“… The aim is to minimize the probability that the normalized length of the codeword will exceed a given threshold B, subject to the Kraft inequality…”
Získat plný text
Journal Article -
15
A New Congestion Control Mechanism for WSNs
ISBN: 1424475473, 9781424475476Vydáno: IEEE 01.06.2010Vydáno v 2010 IEEE 10th International Conference on Computer and Information Technology (01.06.2010)“… As a result, the performance of the whole network is subject to undesirable change; an issue that renders congestion control an issue of uttermost importance for such networks…”
Získat plný text
Konferenční příspěvek -
16
Omnipod CTO Available for Comments and Observations in Regards to Reports on Yahoo Instant Messenger Security Flaw; Omnipod's Secure IM Solution Not Vulnerable to Buffer Overflow Attacks
Vydáno: New York Business Wire 08.12.2003Vydáno v Business Wire (08.12.2003)“…Recognized as a contributing writer and researcher on the subject of Enterprise Instant Messaging, Omnipod's Chief Technology Officer, [Matthew Hunt…”
Získat plný text
Newsletter -
17
Analysis of controlled multiplexing systems via numerical stochastic control methods
ISSN: 0733-8716Vydáno: IEEE 01.09.1995Vydáno v IEEE journal on selected areas in communications (01.09.1995)“… low-order AR schemes). Control problems arise when we wish to control cell loss due to buffer overflows by regulating the sources…”
Získat plný text
Journal Article -
18
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
ISBN: 9780769533537, 0769533531Vydáno: IEEE 01.09.2008Vydáno v SCAM 2008 : proceedings : eighth IEEE International Working Conference on Source Code Analysis and Manipulation : 28-29 September 2008, Beijing, China (01.09.2008)“… To this aim, a number of static analysis tools have been developed to detect the presence of instructions that can be subject to vulnerability attacks, ranging from buffer overflow exploitations…”
Získat plný text
Konferenční příspěvek -
19
On the Capacity of MIMO Channels and Its Effect on Network Performance
ISBN: 1424417511, 9781424417513Vydáno: IEEE 01.04.2008Vydáno v 2008 3rd International Conference on Information and Communication Technologies : from Theory to Applications : Damascus, Syria 7-11 April 2008 (01.04.2008)“…) and upper layer performances (i.e. Medium Access Control layer, MAC). In this paper, we consider a single buffer queuing system subject to a buffer overflow probability…”
Získat plný text
Konferenční příspěvek -
20
A Cross-Platform Multifunctional Testbed for Vulnerability Attack
ISBN: 9780769539300, 1424454220, 9781424454228, 0769539300Vydáno: IEEE 01.12.2009Vydáno v Proceedings : 2009 International Forum on Computer Science-Technology and Applications ; IFCSTA 2009 ; 25-27 December 2009, Chongqing, China / [edited by Zhou Qihai ; sponsored by IITAA (01.12.2009)“… In this paper, we first analyzed the characteristics and disadvantages of existing tools and testbeds for vulnerability attack, and discussed popular software bug types, including buffer overflows and integer overflows…”
Získat plný text
Konferenční příspěvek

