Write buffer

Results: 57



#Item
41C++ / Write / C file input/output / Circular buffer / Main function / Standard streams / Wc / Printf format string / Seekg / Computing / C Standard Library / C POSIX library

PDF Document

Add to Reading List

Source URL: tex.loria.fr

Language: English - Date: 2001-04-26 17:59:31
42Software engineering / Circular buffer / Write / Open / Computer file / Pointer / Stat / Constant / C / Computing / Computer programming / C POSIX library

Learning to Program with Haiku Lesson 21 Written by DarkWyrm All material © 2010 DarkWyrm

Add to Reading List

Source URL: darkwyrm.beemulated.net

Language: English - Date: 2010-06-11 13:58:38
43Flash memory / Cache / Solid-state drive / Write buffer / Computer data storage / IOPS / Dynamic random-access memory / Computer memory / Computer hardware / Computing

30th International Conference on Massive Storage Systems and Technology (MSST[removed]CBM: A Cooperative Buffer Management for SSD Qingsong Wei, Cheng Chen, Jun Yang

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:52:41
44Virtual memory / Cache / Central processing unit / Cache algorithms / Adaptive replacement cache / Page replacement algorithm / Page cache / Least frequently used / Write buffer / Memory management / Computer memory / Computer hardware

H-ARC: A Non-Volatile Memory Based Cache Policy for Solid State Drives Ziqi Fan, and David H.C. Du Doug Voigt

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:49:48
45Flash memory / Solid-state drive / Cache / Write buffer / Circular buffer / Data buffer / Disk buffer / Computer data storage / Dynamic random-access memory / Computer memory / Computer hardware / Computing

CBM: A Cooperative Buffer Management for SSD Qingsong Wei Data Storage Institute, A-STAR Singapore [removed]

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:49:26
46C programming language / C++ / Sizeof / ATS / Write / Lis / Circular buffer / Pointer / Library / Computing / Computer programming / Software engineering

Proposal and Prototype for an in-memory representation of ADF trees /ELSA/NI[removed]Marc Poinot [removed] These pages are a proposal for in-memory representation of ADF trees. The ADF trees are the underlaying

Add to Reading List

Source URL: cgns.sourceforge.net

Language: English - Date: 2002-03-07 21:00:00
47Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-05-19 16:48:47
48Copyright law of the United States / Circular buffer / Write-in candidate

ISTEP+ Spring 2014 Indiana Statewide Testing for Educational Progress Plus Mathematics • English/Language Arts Grade 8

Add to Reading List

Source URL: www.doe.in.gov

Language: English - Date: 2014-06-10 15:53:43
49Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2010-12-28 00:16:40
50Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: vreugdenhilresearch.nl

Language: English - Date: 2010-03-24 14:09:15
UPDATE