نتایج جستجو برای: reservoir overflow

تعداد نتایج: 48275  

Journal: :IEICE Transactions 2005
Chien Trinh Nguyen Shinji Sugawara Tetsuya Miki

A new expression for cell/packet loss probability in an ATM and packet switched queue system with a finite buffer is presented. Cell and packet loss analysis is based on the new concept of a “buffer overflow cluster” and the overflow probability for a queue with an infinite buffer. This approach holds for a wide variety of long-range dependent traffic sources typical of wide-area networks, as w...

2005
Zhenkai Liang R. Sekar Daniel C. DuVarney

Buffer overflows have become the most common target for network-based attacks. They are also the primary propagation mechanism used by worms. Although many techniques (such as StackGuard) have been developed to protect servers from being compromised by buffer overflow attacks, these techniques cause the server to crash. In the face of automated, repetitive attacks such as those due to worms, th...

Journal: :Queueing Syst. 2010
Ali Devin Sezer

Importance sampling (IS) is a variance reduction method for simulating rare events. A recent paper by Dupuis, Wang and Sezer (Ann. App. Probab. 17(4):13061346, 2007) exploits connections between IS and subsolutions to a limit HJB equation and its boundary conditions to show how to design and analyze simple and efficient IS algorithms for various overflow events for tandem Jackson networks. The ...

2005
Kimitake Hayasaki Atsuo T. Okazaki

We compare the accretion flow onto the neutron star induced by Roche lobe overflow with that by the overflow from the Be disk, in a zero eccentricity, short period binary with the same mass transfer rate, performing three-dimensional Smoothed Particle Hydrodynamics simulations. We find that a persistent accretion disk is formed around the neutron star in both cases. The circularization radius o...

2003
Crispin Cowan Steve Beattie John Johansen Perry Wagle

Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the dominant form of software security vulnerability. This is because most buffer overflow defenses provide only partial coverage, and the attacks have adapted to exploit problems that are not well-defended, such as heap overflows. This paper presents PointGuard, a compiler ...

2005
Wenhui Zhang

In next generation heterogeneous wireless networks, a user with a multi-mode terminal may have different bearer services using different access technologies. Various approaches can be applied to improve user QoS, such as bandwidth degradation for real-time services, integration of real-time and data traffic, and overflow traffic in overlay networks. In this paper, new techniques are derived to ...

Journal: :Data Knowl. Eng. 2010
Jianguo Lu

Many deep web data sources are ranked data sources, i.e., they rank the matched documents and return at most the top k number of results even though there are more than k documents matching the query. While estimating the size of such ranked deep web data source, it is well known that there is a ranking bias– the traditional methods tend to underestimate the size when queries overflow ( match m...

Journal: :CoRR 2017
Yu-Jia Chen Li-Chun Wang

In this paper we define the overflow problem of a network coding storage system in which the encoding parameter and the storage parameter are mismatched. Through analyses and experiments, we first show the impacts of the overflow problem in a network coding scheme, which not only waste storage spaces, but also degrade coding efficiency. To avoid the overflow problem, we then develop the network...

1998
Derong Liu

In this short paper, the second method of Lyapunov is utilized to establish sufficient conditions for the global asymptotic stability of the trivial solution of zero-input two-dimensional (2-D) Fornasini–Marchesini state-space digital filters which are endowed with a general class of overflow nonlinearities. Results for the global asymptotic stability of the null solution of the 2-D Fornasini–M...

2009
Tielei Wang Tao Wei Zhiqiang Lin Wei Zou

The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, we present a system, IntScope, which can automatically detect integer overflow vulnerabilities in x86 binaries before an attacker does, with the goal of finally eliminating the vulnerabilities. IntScope first translates the disassembled code into our own intermediate representat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید