Buffer theory

Results: 53



#Item
1

Exploit Programming From Buffer Overflows to “Weird Machines” and Theory of Computation Se r g e y B r a t u s , M i c h a e l E . L o c a s t o , M e r e d i t h L . P a t t e r s o n , Le n S a s s a m a n , a n d

Add to Reading List

Source URL: langsec.org

Language: English - Date: 2011-12-01 04:09:18
    2Data management / Computing / Software / Database management systems / SQL / Database theory / Query optimization / Join / Query plan / Extensible Storage Engine / Full table scan / Database index

    Buffer Pool Aware Query Optimization Ravishankar Ramamurthy David J. DeWitt Department of Computer Sciences, University of Wisconsin-Madison Madison, USA

    Add to Reading List

    Source URL: www-db.cs.wisc.edu

    Language: English - Date: 2011-09-16 15:44:48
    3Demography / Human geography / Human migration / Cultural geography / Population / Anthropology / Immigration / Buffer theory / Policy Network / Migrant worker / Unemployment / Modern immigration to the United Kingdom

    On the move? Labour migration in times of recession What can we learn from the past? policy network paper

    Add to Reading List

    Source URL: www.policy-network.net

    Language: English - Date: 2010-06-18 13:36:23
    4Graph theory / Network performance / Throughput / Topological graph theory / Cycle / Connectivity

    Exploring Trade-Offs in Buffer Requirements and Throughput Constraints for Synchronous Dataflow Graphs Sander Stuijk, Marc Geilen, Twan Basten

    Add to Reading List

    Source URL: www.es.ele.tue.nl

    Language: English - Date: 2005-10-31 13:15:23
    5Network performance / Throughput / Transmission Control Protocol / Network packet / Queueing theory

    Dummy Rate Analysis of Buffer Constrained Chaum Mix Abhishek Mishra Parv Venkitasubramaniam Lehigh University

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2011-08-01 22:51:59
    6Computability theory / Vulnerability / Public-key cryptography / Theoretical computer science / Models of computation / Buffer overflow / Social vulnerability / Zero-day / Ring signature / Symbolic execution / Turing machine / Halting problem

    Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    7Computer security / Buffer overflow / Heap overflow / Circular buffer / Integer overflow / Vulnerability / Code injection / Pointer / Stack overflow / Computing / Software bugs / Cyberwarfare

    Microsoft Word - CWEs_as_vuln_theory.doc

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2007-07-18 14:25:17
    8Audio engineering / Electronic design / Analog circuits / Filter theory / Impedance matching / Input impedance / Output impedance / Clipping / Current source / Electronic engineering / Electromagnetism / Electronics

    The First Watt B1 Buffer Preamp Nelson Pass, June 2008 Side A So here we are in the New Millennium, and thanks to Tom Holman and THX we’ve got lots of gain in our electronics. More gain than some of us

    Add to Reading List

    Source URL: www.firstwatt.com

    Language: English - Date: 2011-12-29 21:26:48
    9

    Exploit Programming From Buffer Overflows to “Weird Machines” and Theory of Computation Se r g e y B r a t u s , M i c h a e l E . L o c a s t o , M e r e d i t h L . P a t t e r s o n , Le n S a s s a m a n , a n d

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
      10

      ► Konzept der Theory of Constraints kurz erklärt ◄ « Was versteht man eigentlich unter Drum-Buffer-Rope? » ► Als Drum-Buffer-Rope, kurz DBR, bezeichnet man die TOC-Methode für das

      Add to Reading List

      Source URL: www.conny-dethloff.de

      Language: German - Date: 2009-10-09 09:07:10
        UPDATE