نتایج جستجو برای: overflow distribution

تعداد نتایج: 614641  

Journal: :CoRR 2013
Georg Böcherer Rana Ali Amjad

In this work, binary block-to-block distribution matching is considered. m independent and uniformly distributed bits are mapped to n output bits resembling a target product distribution. A rate R is called achieved by a sequence of encoder-decoder pairs, if for m,n → ∞, (1) m/n → R, (2) the informational divergence per bit of the output distribution and the target distribution goes to zero, an...

Combining the computational fluid dynamics (CFD) and the design of experiments (DOE) methods, as a mixed approach in modeling was proposed so that to simultaneously benefit from the advantages of both modeling methods. The presented method was validated using a coal hydraulic classifier in an industrial scale. Effects of operating parameters including feed flow rate, solid content and baffle le...

Journal: :The Journal of neuroscience : the official journal of the Society for Neuroscience 1999
W A Cass M W Manning

Repeated administration of methamphetamine (METH) to animals can result in long-lasting decreases in striatal dopamine (DA) content. In addition, the evoked overflow of striatal DA is reduced in rats 1 week after neurotoxic doses of METH. However, whether these functional changes in DA release are permanent or tend to recover over time has not been established. In the present study we used in v...

Journal: :IEEE Trans. Vehicular Technology 2000
Yi-Bing Lin

In a cellular phone system, the service area is partitioned into several location areas (LA’s). Every LA is associated with a mobility database called visitor location register (VLR). When a mobile user enters an LA, the user must register to the VLR before receiving any cellular service. If the VLR is full, the registration procedure fails and the system cannot deliver services to the user und...

2002
Timothy K. Tsai Navjot Singh

Libsafe is a practical solution that protects against the most common forms of buffer overflow attacks. Such attacks often result in granting the attacker full privileges on the target system. Libsafe is implemented as a shared library that intercepts calls to vulnerable standard library functions. Based on an inspection of the process stack and the function arguments, Libsafe ensures that no r...

2003
Shuo Chen Zbigniew T. Kalbarczyk Jun Xu Ravishankar K. Iyer

This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) model to depict and reason about security vulnerabilities. An in-depth analysis of the vulnerability reports and the corresponding source code of the applications leads to three observations: (i) exploits must pass thro...

2012
Pankaj B. Pawar Malti Nagle Pankaj K. Kawadkar

Now a day internet threat takes a blended attack form, targeting individual users to gain control over networks and data. Buffer Overflow which is one of the most occurring security vulnerabilities in a Computer’s world. Buffer Overflow occurs while writing data to a buffer and it overruns the buffer's boundary and overwrites it to a adjacent memory. The techniques to exploit buffer overflow vu...

1998
Crispan Cowan

This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attacks gained notoriety in 1988 as part of the Morris Worm incident on the Internet. While it is fairly simple to fix individual buffer overflow vulnerabilities, buffer overflow attacks continue to this day. Hundreds of attacks have been discovered, and while most of the obvious vuln...

Journal: :Journal of Japan Society of Civil Engineers, Ser. B2 (Coastal Engineering) 2012

2005
Michael Zhivich Tim Leek Richard Lippmann

The capabilities of seven dynamic buffer overflow detection tools (Chaperon, Valgrind, CCured, CRED, Insure++, ProPolice and TinyCC) are evaluated in this paper. These tools employ different approaches to runtime buffer overflow detection and range from commercial products to opensource gcc-enhancements. A comprehensive testsuite was developed consisting of specifically-designed test cases and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید