Santosh

Results: 135



#Item
41Data types / Embedded systems / Memory management / Pointer / C / Watchdog timer / Vulnerability / Computing / Software engineering / Computer programming

Watchdog:   Hardware  for  Safe  and  Secure  Manual   Memory  Management  and  Full  Memory  Safety   Santosh  Nagaraka1e,  Milo  M.  K.  Mar8n,  Steve  Zdanc

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2012-09-24 17:17:58
42Teak / Forestry / Tectona / Dendroclimatology / Toona / Dendrochronology / Cedrela / Tamil Nadu / Eudicots / Dendrology / Wood

Tree-ring analysis of Tropical Indian tree with special emphasis on Tectona grandis and Cedrela toona. Santosh K. Shah* and Amalava Bhattacharyya Birbal Sahni Institute of Palaeobotany 53-University Road, Lucknow

Add to Reading List

Source URL: www.pages-igbp.org

Language: English - Date: 2013-12-10 08:31:30
43Streaming / Computer network security / Internet protocols / Data transmission / Denial-of-service attacks / Transmission Control Protocol / Packet loss / Real-time Transport Protocol / Denial-of-service attack / Data / Computing / Information

DoS Protection for Reliably Authenticated Broadcast Carl A. Gunter, Sanjeev Khanna, Kaijun Tan, and Santosh Venkatesh University of Pennsylvania Abstract Authenticating broadcast packet communications

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:43
44Data types / Type theory / Compiler construction / Primitive types / Cross-platform software / LLVM / Type safety / Blocks / Pointer / Software engineering / Computing / Computer programming

Formalizing the LLVM Intermediate Representation for Verified Program Transformations ∗ Jianzhou Zhao Santosh Nagarakatte

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2011-12-01 15:39:42
45Computer programming / Data types / Memory management / Primitive types / Computer architecture / Pointer / Memory safety / C / Dangling pointer / Computing / Software engineering / Software bugs

In the Proceedings of the 39th International Symposium on Computer Architecture (ISCAWatchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety Santosh Nagarakatte

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2012-05-03 14:35:31
46Punjab / South Asia / Indian society / Santosh Trophy / Haryana / Ahluwalia / Mahinder

WEEKLY CAUTION LIST FOR REGULAR BAIL MATTER REGISTERED ONFOLLOWING CASES ARE LIKELY TO BE LISTED Sr No Case Type Case Number Case Year 1 2 3

Add to Reading List

Source URL: highcourtchd.gov.in

Language: English - Date: 2015-05-27 08:45:13
47Haryana / Punjab / Santosh Trophy / South Asia / Asia / Punjabi people / Ranjit Singh / Sikh Empire

file://D:se Listhtm

Add to Reading List

Source URL: highcourtchd.gov.in

Language: English - Date: 2015-05-23 07:26:13
48Data types / Primitive types / Memory management / Software bugs / Pointer / Memory safety / Type safety / C / Garbage collection / Computing / Software engineering / Computer programming

PRACTICAL LOW-OVERHEAD ENFORCEMENT OF MEMORY SAFETY FOR C PROGRAMS Santosh Ganapati Nagarakatte A DISSERTATION in Computer and Information Science

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2012-11-19 16:52:36
49Vyjayanthimala filmography / Kumar / Santosh Trophy / Arjuna Award

F.No.AS0(PER-EC) Government of India Ministry of Finance Department of Revenue Central Board of Excise and Customs North Block, New Delhi

Add to Reading List

Source URL: www.cbec.gov.in

Language: English - Date: 2012-10-17 03:18:59
50Santosh Trophy

AS ONJUDGES OF THE SUPREME COURT OF INDIA (List of Judges arranged according to date of initial appointment)

Add to Reading List

Source URL: doj.gov.in

Language: English - Date: 2015-04-08 00:14:20
    UPDATE