Buffer

Results: 4742



#Item
631Circular buffer / Switzerland / Empa / Laboratories / Dübendorf

SIXTH FRAMEWORK PROGRAMME

Add to Reading List

Source URL: www.kestcells.eu

Language: English - Date: 2015-02-23 12:13:25
632Ecology / Habitats / Conservation / Hydrology / .gov / General Services Administration / Data buffer / Riparian zone / Buffer / Computer memory / Water / Environment

Microsoft Word - BYB Website.doc

Add to Reading List

Source URL: trees.maryland.gov

Language: English - Date: 2015-03-26 13:58:24
633Central processing unit / Memory management / CPU cache / Write buffer / Computer memory / Cache / Computer hardware

EN164: Design of Computing Systems Lecture 28: Memory Systems 4 Professor Sherief Reda http://scale.engin.brown.edu Electrical Sciences and Computer Engineering School of Engineering

Add to Reading List

Source URL: scale.engin.brown.edu

Language: English - Date: 2014-03-23 13:26:55
634Distributed computing / Intellectual property law / BitTorrent / Peer-to-peer / Peer-to-peer computing / Circular buffer / Chunk / File sharing / Streaming media / Computing / File sharing networks / Concurrent computing

42 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 1, FEBRUARY 2011 A Simple Model for Chunk-Scheduling Strategies in P2P Streaming

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-12-11 22:54:15
635Data transmission / Computer memory / RS-232 / Centronics / Software flow control / Bus / Flow control / D-subminiature / Data buffer / Computer hardware / Computing / Computer buses

PDF Document

Add to Reading List

Source URL: www.rose.com

Language: English - Date: 2014-03-03 08:38:19
636Microsoft SQL Server / Stack buffer overflow / Circular buffer / Ip / SQL / ATS / X-Forwarded-For / Integer / Library / Computing / Software engineering / Relational database management systems

David Litchfield Database Security - The Pot and the Kettle This talk will examine the database server offerings from both Microsoft and Oracle and show that, regardless of certification, market campaigns and slurs, each

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
637Cell biology / DNA / Lysis buffer / Molecular biology / Protein methods / Jurkat cells / Immunoprecipitation / Lymphocyte / SDS-PAGE / Biology / Chemistry / Laboratory techniques

Additional files Supplementary methods Two-hybrid screening and cDNA isolation The Saccharomyces cerevisiae reporter strain EGY48 used for the GAL4 two-hybrid screen was purchased from Clontech Laboratories, Inc. (Palo A

Add to Reading List

Source URL: biosignaling.com

Language: English
638Network architecture / Internet standards / Telnet / Transmission Control Protocol / Portmap / Secure Shell / Port / Ident / Netstat / Internet protocols / Computing / Internet

Lecture 21: Buffer Overflow Attack Lecture Notes on “Computer and Network Security” by Avi Kak () April 2, 2015 3:58pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-02 15:59:28
639Software bugs / X86 architecture / Computer programming / Assembly languages / Computer errors / MOV / Buffer overflow / Shellcode / Stack buffer overflow / Computing / X86 instructions / Software engineering

Variations in Exploit methods between Linux and Windows David Litchfieldth July 2003 This paper will examine the differences and commonality in the way a vulnerability common to both Windows a

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:39
640Integrated circuits / Operational amplifier / Buffer amplifier / Biasing / Analog circuits / Electronic circuits / Voltage regulator / Electronic engineering / Electronics / Electromagnetism

NJM2115 DUAL OPERATIONAL AMPLIFIER ■ GENERAL DESCRIPTION NJM2115 is a low operating Voltage ( ±1.0V min. ) and low saturation output voltage ( ±2.0VP-P at supply voltage ±2.5V ) operational amplifier.It is applicabl

Add to Reading List

Source URL: www.njr.com

Language: English - Date: 2013-02-12 02:17:02
UPDATE