نتایج جستجو برای: buffer

تعداد نتایج: 42910  

1997
Aviezri S. Fraenkel Jamie Simpson Mike Paterson

A weak square in a binary word is a pair of adjacent non-empty blocks of the same length, having the same number of 1s. A weak circular square is a weak square which is possibly wrapped around the word: the tail protruding from the right end of the word reappears at the left end. Two weak circular squares are equivalent if they have the same length and contain the same number of ones. We prove ...

1998
Wladek Olesinski Pawel Gburzynski

We investigate experimentally several routing algorithms for asynchronous deflection networks, i.e., ones that operate in an unslotted manner. We determine the impact of an extra input buffer space on the quality of routing decisions. Finally, we compare the performance of asynchronous and synchronous deflection networks.

2009
Govindan Ravindran Michael Stumm

2011
Ravensara S. Travillian James Malone Chao Pang John M. Hancock Peter W. H. Holland Paul N. Schofield Helen E. Parkinson

2007
Michel Mandjes

In this paper GI/G/1 queueing systems with buffer overflows are involved. First, we will give asymptotic expressions for the long-run fraction of rejected customers, in case the buffer capacity K grows large. Furthermore, we give a non-trivial upper and lower bound for this fraction for all K larger than some constant. Finally, we treat a method to speed up the simulation of the fraction of rej...

2011
Harold Thimbleby Andy Gimblett Abigail Cauchi

We introduce an architectural software formalism, buffer automata, for the specification, implementation and analysis of a particular class of discrete interactive systems and devices. The approach defines a layer between the physical user interface and the application (if any) and provides a clear framework for highlighting a number of interaction design issues, in particular around modes and ...

1982
Per-Åke Larson

Linear hashing with partial expansions is a file organization intended for dynamic files. In this paper an improved version of the method is presented. Instead of having a separate overflow area, the storage area for overflow records is incorporated into the main file. Hence, all the records are stored in one file which grows and shrinks according to the number of records stored. By using sever...

Journal: :ICST Trans. Security Safety 2015
Kai Chen Jun Shao

An introduction to the key topics and challenges in Botnet, buffer overflow vulnerability, privacy-preserving and others.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی امیرکبیر(پلی تکنیک تهران) - دانشکده مهندسی کامپیوتر 1386

طراحی مدارات به روش آسنکرون، می تواند منجر به کاهش توازن مصرفی و افزایش پایداری مدار در مقایسه با مدارات سنکرون می شود. با این وجود، وجود دو مسیله در مورد مدارات آسنکرون، مانع از گسترش آن ها در طراحی های دیجیتال گردیده است. این دو مشکل را می توان در پیچیدگی روند طراحی این مدارات و تست آن ها بیان کرد. برای حل مشکل پیجیدگی روال طراحی این مدارات، روش های مختلفی ارایه گردیده است، که یکی از کاراتری...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید