Overflow, access, and attention

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Buffer overflow and format string overflow vulnerabilities

Buffer overflow vulnerabilities are among the most widespread of security problems. Numerous incidents of buffer overflow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called format string overflow has recently been found, and though not as popular as buffer overflow, ...

متن کامل

Enhancing the performance and security against media-access-control table overflow vulnerability attacks

A media-access-control (MAC) table of switches is used to store the MAC addresses of stations in a local area network (LAN) segment to enable frame forwarding. Each incoming frame is broadcast to all switch ports through a switch backplane when an MAC address is not registered in the MAC table. If an address is registered, the switch forwards the frame to the port connected to the destination h...

متن کامل

Multiple parallel access in visual attention.

It is widely accepted that there exists a region or locus of maximal resource allocation in visual perception--sometimes referred to as the spotlight of attention. We have argued that even if there is a single locus of processing, there must be multiple loci of parallel access--several places in the visual field must be indexed at once and these indexes can be used to determine where attention ...

متن کامل

Introspective access to implicit shifts of attention.

Literature in metacognition has systematically rejected the possibility of introspective access to complex cognitive processes. This situation derives from the difficulty of experimentally manipulating cognitive processes while abiding by the two contradictory constraints. First, participants must not be aware of the experimental manipulation, otherwise they run the risk of incorporating their ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Behavioral and Brain Sciences

سال: 2007

ISSN: 0140-525X,1469-1825

DOI: 10.1017/s0140525x07003111