نتایج جستجو برای: overflow
تعداد نتایج: 6760 فیلتر نتایج به سال:
In this paper GI/G/1 queueing systems with buffer overflows are involved. First, we will give asymptotic expressions for the long-run fraction of rejected customers, in case the buffer capacity K grows large. Furthermore, we give a non-trivial upper and lower bound for this fraction for all K larger than some constant. Finally, we treat a method to speed up the simulation of the fraction of rej...
We are interested in the optimal control of sewage networks. It is of high public interest to minimize the overflow of sewage onto the streets and to the natural environment that may occur during periods of high rain. The assumption of linear flow in a discrete time setting has proven to be adequate for the practical control of larger systems. However, the possibility of overflow introduces a n...
Buffer overflow detection and mitigation for C programs has been an important concern for a long time. This paper defines a string buffer overflow analysis for C. The key ideas of our formulation are (a) separating buffers from the pointers that point to them, (b) modelling buffers in terms of sizes and sets of positions of null characters, and (c) defining stateless functions to compute the se...
A physical model of gabion overflow dams was studied to determine the velocity profile and Reynolds shear stress. Physical tests were done under two different conditions of dam crest, overflow dams with impermeable and with permeable crests. Instantaneous velocity components over dam crest were measured by an ADV (Acoustic Doppler Velocimeter) instrument. This instrument is capable of measuring...
DB2 data sharing offers many advantages in the right environment, and performs very well when DB2 is properly tuned. DB2 data sharing can significantly increase capacity, it offers increased availability, and it provides a flexible operating environment. In certain environments, DB2 data sharing can dramatically improve performance of DB2 subsystems (e.g., when most data are shared and most of ...
In order to deal with buffer overflow in ATM-based high-
Numerous security technologies which detect buffer overflow have already proposed. Almost these technologies detect if buffer overflows happen or not, but don’t detect alteration of variable integrity. But there are attacks which are not be able to be defenced unless the technology detect alteration of variable integrity. So in this paper, we propose a system which detect alteration of variable...
Heap based buffer overflows are a dangerous class of vulnerability. One countermeasure is randomizing the location of heap memory blocks. Existing techniques segregate the address space into clusters, each of which is used exclusively for one block size. This approach requires a large amount of address space reservation, and results in lower location randomization for larger blocks. In this pap...
Horn recursion is a term used to describe when non-vanishing products of Schubert classes in the cohomology of complex flag varieties are characterized by inequalities parameterized by similar non-vanishing products in the cohomology of “smaller” flag varieties. We consider the type A partial flag variety and find that its cohomology exhibits a Horn recursion on a certain deformation of the cup...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید