String Buffer

Results: 87



#Item
21Mutable Strings in Java: Design, Implementation and Lightweight Text–Search Algorithms Paolo Boldi a Sebastiano Vigna a a  Dipartimento di Scienze dell’Informazione, Università degli Studi di Milano

Mutable Strings in Java: Design, Implementation and Lightweight Text–Search Algorithms Paolo Boldi a Sebastiano Vigna a a Dipartimento di Scienze dell’Informazione, Università degli Studi di Milano

Add to Reading List

Source URL: vigna.di.unimi.it

Language: English - Date: 2004-05-27 17:24:26
22MM74C906 Hex Open Drain N-Channel Buffers

MM74C906 Hex Open Drain N-Channel Buffers

Add to Reading List

Source URL: www.singlechips.com

Language: English - Date: 2012-06-15 14:36:15
23Implementation of the Legion Library Adam J. Ferrari, Mike Lewis, Charles L. Viles and Anh Nguyen-Tuong, Andrew S. Grimshaw The Legion Research Group1 Technical Report CS-96-16

Implementation of the Legion Library Adam J. Ferrari, Mike Lewis, Charles L. Viles and Anh Nguyen-Tuong, Andrew S. Grimshaw The Legion Research Group1 Technical Report CS-96-16

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 1998-12-07 09:56:18
24Unforgivable Vulnerabilities Steve Christey The MITRE Corporation  August 2, 2007

Unforgivable Vulnerabilities Steve Christey The MITRE Corporation August 2, 2007

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
25Guidance notes on completing job application forms Fingal Volunteer Centre’s mission is to to help individuals find meaningful opportunities to volunteer and to build the capacity of not-for-profit organisations to inv

Guidance notes on completing job application forms Fingal Volunteer Centre’s mission is to to help individuals find meaningful opportunities to volunteer and to build the capacity of not-for-profit organisations to inv

Add to Reading List

Source URL: www.volunteerfingal.ie

Language: English - Date: 2014-07-04 04:52:43
26Secure Programming with GCC and GLibc Marcel Holtmann CanSecWest 2008, Vancouver  Introduction

Secure Programming with GCC and GLibc Marcel Holtmann CanSecWest 2008, Vancouver Introduction

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:33
27Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome  Carnegie Mellon University Abstract

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Carnegie Mellon University Abstract

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
28Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers ∗ Zhenkai Liang and R. Sekar Dept. of Computer Science, Stony Brook University

Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers ∗ Zhenkai Liang and R. Sekar Dept. of Computer Science, Stony Brook University

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-08-03 23:33:34
29Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Dawn Song May 2004

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Dawn Song May 2004

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
30Implementation of the Legion Library Adam J. Ferrari, Mike Lewis, Charles L. Viles and Anh Nguyen-Tuong, Andrew S. Grimshaw The Legion Research Group1 Technical Report CS-96-16

Implementation of the Legion Library Adam J. Ferrari, Mike Lewis, Charles L. Viles and Anh Nguyen-Tuong, Andrew S. Grimshaw The Legion Research Group1 Technical Report CS-96-16

Add to Reading List

Source URL: legion.virginia.edu

Language: English - Date: 1998-12-07 09:56:18