نتایج جستجو برای: buffer space

تعداد نتایج: 535110  

Journal: :Journal of Applied Mathematics and Computational Mechanics 2018

2003
Zvi Lotker Boaz Patt-Shamir J. Roberts

We consider a FIFO buffer with finite storage space. An arbitrary input stream of packets arrives at the buffer, but the output stream rate is bounded, so overflows may occur. We assume that each packet has value which is either 1 or a, for some a > 1. The buffer management task is to decide which packets to drop so as to minimize the total value of lost packets, subject to the buffer space bou...

Journal: :Computer Networks 2003
Zvi Lotker Boaz Patt-Shamir

We consider a FIFO buffer with finite storage space. An arbitrary input stream of packets arrives at the buffer, but the output stream rate is bounded, so overflows may occur. We assume that each packet has value which is either 1 or a, for some a > 1. The buffer management task is to decide which packets to drop so as to minimize the total value of lost packets, subject to the buffer space bou...

2005
Anuj Kumar Rabi N. Mahapatra

This paper addresses scheduling and memory management in input queued switches having finite buffer space to improve the performance in terms of throughput and average delay. Most of the prior works on scheduling related to input queued switches assume infinite buffer space. In practice, buffer space being a finite resource, special memory management scheme becomes essential. We introduce a buf...

2007
Lorene Inouye Louise E. Moser P. M. Melliar-Smith

The 64 64 QuickRing ATM switch is a multi-stage switch constructed from 8 8 QuickRing ATM switches. The buffering requirements of such a switch must be carefully considered in the design. Under both Poisson and bursty traffic, the buffer space needed at an intermediate node is less than one-third of the buffer space needed at an output node.

2008
Michael Dalton Hari Kannan Christoforos E. Kozyrakis

Despite having been around for more than 25 years, buffer overflow attacks are still a major security threat for deployed software. Existing techniques for buffer overflow detection provide partial protection at best as they detect limited cases, suffer from many false positives, require source code access, or introduce large performance overheads. Moreover, none of these techniques are easily ...

2013
Chee Meng Tey Debin Gao

Heap based buffer overflows are a dangerous class of vulnerability. One countermeasure is randomizing the location of heap memory blocks. Existing techniques segregate the address space into clusters, each of which is used exclusively for one block size. This approach requires a large amount of address space reservation, and results in lower location randomization for larger blocks. In this pap...

Journal: :IEICE Transactions 2011
Toshifusa Sekizawa Takashi Toyoshima Koichi Takahashi Kazuko Takahashi

Probabilistic model checking is an emerging technology for analyzing systems which exhibit stochastic behaviors. The verification of a larger system using probabilistic model checking faces the same state explosion problem as ordinary model checking. Probabilistic symmetry reduction is a technique to tackle this problem. In this paper, we study probabilistic symmetry reduction for a system with...

Journal: :Queueing Syst. 2004
Rami Atar Adam Shwartz Paul Dupuis

We consider optimal control of a stochastic network, where service is controlled to prevent buffer overflow. We use a risk-sensitive escape time criterion, which in comparison to the ordinary escape time criteria heavily penalizes exits which occur on short time intervals. A limit as the buffer sizes tend to infinity is considered. In [2] we showed that, for a large class of networks, the limit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید