Buffer state

Results: 399



#Item
71Cache / Readahead / Prefetcher / CPU cache / Solid-state drive / Paging / File system fragmentation / Data buffer / Computer data storage / Computer hardware / Computer memory / Computing

Reducing Seek Overhead with Application-Directed Prefetching Steve VanDeBogart Christopher Frost UCLA

Add to Reading List

Source URL: www.frostnet.net

Language: English - Date: 2009-05-01 02:14:48
72Circular buffer / Solid-state drive / Statistics / Computing / Science / Aggregation / Natural language processing / Sum of absolute differences

Image Guided Cost Aggregation for Hierarchical Depth Map Fusion Thilo Borgmann and Thomas Sikora Communication Systems Group, Technische Universit¨at Berlin {borgmann, sikora}@nue.tu-berlin.de

Add to Reading List

Source URL: elvera.nue.tu-berlin.de

Language: English - Date: 2013-06-14 08:49:38
73Laboratory techniques / Molecular biology / Cell biology / Lysis buffer / Tris-Cl / Proteinase K / DNA extraction / Buffer solution / TE buffer / Chemistry / Buffers / DNA

Medina Lab, Penn State University DNA extraction from frozen coral sperm protocol (modified from Sambrook and Russell) Solutions Lysis Buffer (prepare 50 mL):

Add to Reading List

Source URL: medinalab.org

Language: English - Date: 2014-07-25 18:28:41
74Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security

Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:18
75Polymorphic code / Buffer overflow / Assembly languages / Self-modifying code / Computer programming / Shellcode / Polymorphic engine / Addressing mode / Malware / Computing / Software engineering

Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:00
76Circular buffer / Balancing in international relations / Buffer state / Kenneth Waltz / Argument / International relations / International relations theory / Neorealism in international relations

COPYRIGHT NOTICE: Tanisha M. Fazal: State Death is published by Princeton University Press and copyrighted, © 2007, by Princeton University Press. All rights reserved. No part of this book may be reproduced in any form

Add to Reading List

Source URL: press.princeton.edu

Language: English - Date: 2007-08-16 15:16:48
77Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
78Grammar / Human communication / Question / Circular buffer / Chat room / Information / Data / Online chat / Computing / Data collection

How you can view ‘Meet the Members’ live stream on your Computer Finding the Stream Open the Autism Victoria website www.autismvictoria.org.au Click on ‘State Election tab 2010’ on the left hand side

Add to Reading List

Source URL: www.autismvictoria.org.au

Language: English - Date: 2010-10-03 21:08:55
79Integrated circuits / Electronic circuits / Logic families / IC power supply pin / Schmitt trigger / Logic level / Propagation delay / Buffer amplifier / CMOS / Electronic engineering / Digital electronics / Electronics

INTEGRATED CIRCUITS DATA SHEET 74AHC244; 74AHCT244 Octal buffer/line driver; 3-state

Add to Reading List

Source URL: www.learn-c.com

Language: English - Date: 2010-04-15 16:42:43
80Software bugs / Subroutines / Memory management / Call stack / Buffer overflow protection / Pointer / Stack buffer overflow / Stack / C dynamic memory allocation / Computing / Software engineering / Computer programming

Automated Security Debugging Using Program Structural Constraints∗ Chongkyung Kil∗, Emre Can Sezer∗, Peng Ning∗, and Xiaolan Zhang† Department of Computer Science∗ North Carolina State University {ckil, eseze

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
UPDATE