Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Overflow(computer arithmetics)")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 550

  • Page / 22
Export

Selection :

  • and

Improved implementation of FFT algorithm on a high-performance processorSAID, S. M; DIMOND, K. R.Electronics Letters. 1984, Vol 20, Num 8, pp 347-349, issn 0013-5194Article

Combined unsigned and two's complement saturating multipliersSCHULTE, Michael J; GOK, Mustafa; BALZOLA, Pablo I et al.SPIE proceedings series. 2000, pp 185-196, isbn 0-8194-3761-1Conference Paper

A proof of simple insensitive bounds for a pure overflow systemVAN DIJK, N. M.Journal of applied probability. 1989, Vol 26, Num 1, pp 113-120, issn 0021-9002, 8 p.Article

The robust implementation of sequence-controlled iterationNEWEY, M. C; WAITE, W. M.Software, practice & experience. 1985, Vol 15, Num 7, pp 655-668, issn 0038-0644Article

Defending against Buffer-Overflow VulnerabilitiesBINDU MADHAVI PADMANABHUNI; HEE BENG KUAN TAN.Computer (Long Beach, CA). 2011, Vol 44, Num 11, pp 53-60, issn 0018-9162, 8 p.Article

Protection Structure Building for Malicious Traffic Protecting in Intranet SystemsNOH, Sichoon; EUN JEE SONG; DONG CHUN LEE et al.Lecture notes in computer science. 2006, pp 1051-1059, issn 0302-9743, isbn 3-540-34070-X, 9 p.Conference Paper

Transcending the limitsELMS, D.Civil engineering systems (Print). 1995, Vol 12, Num 3, pp 185-189, issn 0263-0257Article

Hashing with overflow indexingTORN, A. A.BIT (Nordisk Tidskrift for Informationsbehandling). 1984, Vol 24, Num 3, pp 317-332, issn 0006-3835Article

Truncation of Markov chains with applications to queueingVAN DIJK, N. M.Operations research. 1991, Vol 39, Num 6, pp 1018-1026, issn 0030-364XArticle

Beyond floating pointCLENSHAW, C. W; OLVER, F. W. J.Journal of the Association for Computing Machinery. 1984, Vol 31, Num 2, pp 319-328, issn 0004-5411Article

Dual-stack return address predictorCAIXIA SUN; MINXUAN ZHANG.Lecture notes in computer science. 2005, pp 172-179, issn 0302-9743, isbn 3-540-28128-2, 1Vol, 8 p.Conference Paper

A concurrent Blink-tree algorithm using a cooperative locking protocolLIM, Sung-Chae; AHN, Joonseon; MYOUNG HO KIM et al.Lecture notes in computer science. 2003, pp 253-260, issn 0302-9743, isbn 3-540-40536-4, 8 p.Conference Paper

Effect of traffic variability on statistical multiplexing gain in a bufferless continuous traffic modelSOFMAN, Lev B; EL-BAWAB, Tarek S; AGRAWAL, Anshul et al.SPIE proceedings series. 2003, pp 122-130, isbn 0-8194-5127-4, 9 p.Conference Paper

A separation theorem for finite precision digital filtersJOHNSON, K. K; SANDBERG, I. W.IEEE transactions on circuits and systems. 1, Fundamental theory and applications. 1995, Vol 42, Num 9, pp 541-545, issn 1057-7122Article

Overflow stability of N-order state space digital filtersBROWN, D. P.Journal of the Franklin Institute. 1990, Vol 327, Num 6, pp 877-891, issn 0016-0032Article

Handling memory overflow in connected component labeling applicationsDINSTEIN, I; YEN, D. W. L; FLICKNER, M. D et al.IEEE transactions on pattern analysis and machine intelligence. 1985, Vol 7, Num 1, pp 116-121, issn 0162-8828Article

The average time until bucket overflowCOOPER, R. B; SOLOMON, M. K.ACM transactions on database systems. 1984, Vol 9, Num 3, pp 392-408, issn 0362-5915Article

HackSim: an automation of penetration testing for remote buffer overflow vulnerabilitiesKWON, O-Hoon; SEUNG MIN LEE; LEE, Heejo et al.Lecture notes in computer science. 2005, pp 652-661, issn 0302-9743, isbn 3-540-24467-0, 10 p.Conference Paper

A new stack buffer overflow hacking defense technique with memory address confirmationCHOI, Yang-Seo; SEO, Dong-Il; SOHN, Sung-Won et al.Lecture notes in computer science. 2002, pp 146-159, issn 0302-9743, isbn 3-540-43319-8Conference Paper

Overflow underflow, and severe loss of significance in floatting-point addition and subtractionFELDSTEIN, A; TURNER(P.).IMA journal of numerical analysis. 1986, Vol 6, Num 2, pp 241-251, issn 0272-4979Article

Copying garbage collection for the WAM: To mark or not to mark?DEMOEN, Bart; NGUYEN, Phuong-Lan; VANDEGINSTE, Ruben et al.Lecture notes in computer science. 2002, pp 194-208, issn 0302-9743, isbn 3-540-43930-7, 15 p.Conference Paper

Tandem behavior of a telecommunication system with repeated calls. II: A general case without buffersPOURBABAI, B.European journal of operational research. 1993, Vol 65, Num 2, pp 247-258, issn 0377-2217Article

Effects of input-scaling on the asymptotic overflow-stability properties of second-order recursive digital filtersPUAY KIA SIM; PANG, K. K.IEEE transactions on circuits and systems. 1985, Vol 32, Num 10, pp 1008-1015, issn 0098-4094Article

On converting character strings ot integersPARKER, J. R.Information processing letters. 1984, Vol 19, Num 1, pp 17-19, issn 0020-0190Article

Enhanced buffer management policy that utilises message properties for delay-tolerant networksSHIN, K; KIM, S.IET communications (Print). 2011, Vol 5, Num 6, pp 753-759, issn 1751-8628, 7 p.Article

  • Page / 22