Buffer

Results: 4742



#Item
381

Microsoft PowerPoint - 11-Geometry-Buffer-Anti-Aliasing-(GBAA)

Add to Reading List

Source URL: iryoku.com

Language: English - Date: 2015-02-23 07:40:34
    382

    Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade* Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole Department of Computer Science and Engineering Oregon Graduate Instit

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2012-10-06 22:14:19
      383

      AVR101: High Endurance EEPROM Storage Features • Circular Buffer in EEPROM • RESET Protection of EEPROM Buffer • Increased Endurance of EEPROM Storage

      Add to Reading List

      Source URL: www.atmel.com

      Language: English - Date: 2014-10-13 00:33:19
        384

        Downton Abbey Without the Hiccups: Buffer-Based Rate Adaptation for HTTP Video Streaming Te-Yuan Huang Ramesh Johari

        Add to Reading List

        Source URL: conferences.sigcomm.org

        Language: English - Date: 2013-07-17 11:51:16
          385Computing / Computer architecture / Memory management / Software bugs / POSIX / Process / C standard library / Exit / Stack buffer overflow / Pointer / Segmentation fault / Stack

          .oO Phrack 49 Oo. Volume Seven, Issue Forty­Nine File 14 of 16 BugTraq, r00t, and Underground.Org  bring you Smashing The Stack For Fun And Profit

          Add to Reading List

          Source URL: inst.eecs.berkeley.edu

          Language: English - Date: 2008-08-26 17:57:09
          386Cyberwarfare / Computer security / Security / Computer network security / Software testing / Software bugs / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack

          Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

          Add to Reading List

          Source URL: adam.shostack.org

          Language: English - Date: 2014-06-11 11:49:30
          387

          Modeling and Analysis of Switched Buffer Networks using Hybrid Automata Goran Frehse and Oded Maler Verimag, {goran.frehse,oded.maler}@imag.fr, WWW home page: http://www-verimag.imag.fr/~{frehse,maler} Abstract. In this

          Add to Reading List

          Source URL: www-verimag.imag.fr

          Language: English - Date: 2006-10-23 11:29:24
            388

            SLG74120 Twelve Output PCI Express Clock Buffer Features Output Summary

            Add to Reading List

            Source URL: www.silego.com

            Language: English - Date: 2014-03-07 12:23:04
              389Computing / Computer errors / Application checkpointing / Parallel computing / Crash / Synchronization / Data corruption / Exception handling / Checkpoint / Segmentation fault / Virtualization / Buffer overflow

              Self-Healing Multitier Architectures Using Cascading Rescue Points Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis Department of Computer Science Columbia University, New York, NY, USA {azavou, porto, angelos

              Add to Reading List

              Source URL: www.cs.columbia.edu

              Language: English - Date: 2013-01-22 23:52:05
              390

              wgkb evRvi g~j¨ w¯’wZkxj ivLvi j‡¶¨ wba©vwiZ KwZcq wbZ¨ cª‡qvRbxq c‡Y¨i Avc`Kvjxb gRy` (evdvi ÷K) M‡o ‡Zvjv| Mission Maintain buffer stock of some selected

              Add to Reading List

              Source URL: tcb.portal.gov.bd

              - Date: 2015-12-14 18:34:00
                UPDATE