نتایج جستجو برای: reservoir overflow
تعداد نتایج: 48275 فیلتر نتایج به سال:
Buffer overflow attacks are widely acknowledged by computer security professionals to be one of the greatest threats to the security of computer systems. We present an integrated softwarehardware approach to protect against buffer overflow attacks while minimizing performance degradation, software development time, and deployment costs. Our technique does not change the processor core, but inst...
The main aim of this paper is to derive a solution to the capacity problem faced by many perinatal networks in the United Kingdom. We propose a queueing model to determine the number of cots at all care units for any desired overflow and rejection probability in a neonatal unit. The model formulation is developed, being motivated by overflow models in telecommunication systems. Exact expression...
Linear hashing with partial expansions is a file organization intended for dynamic files. In this paper an improved version of the method is presented. Instead of having a separate overflow area, the storage area for overflow records is incorporated into the main file. Hence, all the records are stored in one file which grows and shrinks according to the number of records stored. By using sever...
Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, whic...
Activation of the sympathetic nervous system is well documented in heart failure. Our previous studies demonstrated an increase in evoked norepinephrine (NE) release from left ventricle (LV) slices at 10 days of pressure overload. The purpose of this study was to test the hypothesis that presynaptic modulation of NE release contributes to sympathetic activation after pressure overload. We exami...
In this paper, we are interested in wireless scheduling algorithms for the downlink of a single cell that can minimize the queue-overflow probability. Assuming that a samplepath large-deviation principle holds for the backlog process, we first study structural properties of the minimum-cost-pathto-overflow for a class of scheduling algorithms collectively referred to as the “α-algorithms.” For ...
The effect of ouabain on exocytotic and nonexocytotic norepinephrine release was investigated in perfused rat and guinea pig hearts. The overflow of endogenous norepinephrine and its neuronal metabolite 3,4-dihydroxyphenylethyleneglycol (DOPEG) was determined by highpressure liquid chromatography. DOPEG served as the indicator of free axoplasmic norepinephrine concentrations. The overflow of th...
In some particular environments such as battlefield, disaster recovery and wide area surveillance, most existing routing algorithms will fail to deliver messages to their destinations. Thus, it is an important research issue of how to deliver data in disconnected wireless sensor networks. This paper presents two efficient message ferry routing algorithms, denoted as MFRA1 and MFRA2, for data co...
Item # Vulnerability ID Score Source Score Summary 1 CVE-2015-2059 CVSS 2.0 7.5 High libidn: out-of-bounds read with stringprep on invalid UTF-8. [1] 2 CVE-2011-1425 CVSS 2.0 7.5 High xmlsec1: arbitrary file creation when verifying signatures [2] 3 CVE-2015-7696 CVSS 3.0 6.8 Med unzip: Heap overflow and DoS in 6.0 [3] 4 CVE-2014-9471 CVSS 2.0 7.5 High coreutils: memory corruption flaw in parse_...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید