Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Rebasamiento capacidad")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 524

  • Page / 21
Export

Selection :

  • and

Combined unsigned and two's complement saturating multipliersSCHULTE, Michael J; GOK, Mustafa; BALZOLA, Pablo I et al.SPIE proceedings series. 2000, pp 185-196, isbn 0-8194-3761-1Conference Paper

A proof of simple insensitive bounds for a pure overflow systemVAN DIJK, N. M.Journal of applied probability. 1989, Vol 26, Num 1, pp 113-120, issn 0021-9002, 8 p.Article

Defending against Buffer-Overflow VulnerabilitiesBINDU MADHAVI PADMANABHUNI; HEE BENG KUAN TAN.Computer (Long Beach, CA). 2011, Vol 44, Num 11, pp 53-60, issn 0018-9162, 8 p.Article

Truncation of Markov chains with applications to queueingVAN DIJK, N. M.Operations research. 1991, Vol 39, Num 6, pp 1018-1026, issn 0030-364XArticle

Dual-stack return address predictorCAIXIA SUN; MINXUAN ZHANG.Lecture notes in computer science. 2005, pp 172-179, issn 0302-9743, isbn 3-540-28128-2, 1Vol, 8 p.Conference Paper

A concurrent Blink-tree algorithm using a cooperative locking protocolLIM, Sung-Chae; AHN, Joonseon; MYOUNG HO KIM et al.Lecture notes in computer science. 2003, pp 253-260, issn 0302-9743, isbn 3-540-40536-4, 8 p.Conference Paper

Effect of traffic variability on statistical multiplexing gain in a bufferless continuous traffic modelSOFMAN, Lev B; EL-BAWAB, Tarek S; AGRAWAL, Anshul et al.SPIE proceedings series. 2003, pp 122-130, isbn 0-8194-5127-4, 9 p.Conference Paper

A separation theorem for finite precision digital filtersJOHNSON, K. K; SANDBERG, I. W.IEEE transactions on circuits and systems. 1, Fundamental theory and applications. 1995, Vol 42, Num 9, pp 541-545, issn 1057-7122Article

Overflow stability of N-order state space digital filtersBROWN, D. P.Journal of the Franklin Institute. 1990, Vol 327, Num 6, pp 877-891, issn 0016-0032Article

HackSim: an automation of penetration testing for remote buffer overflow vulnerabilitiesKWON, O-Hoon; SEUNG MIN LEE; LEE, Heejo et al.Lecture notes in computer science. 2005, pp 652-661, issn 0302-9743, isbn 3-540-24467-0, 10 p.Conference Paper

A new stack buffer overflow hacking defense technique with memory address confirmationCHOI, Yang-Seo; SEO, Dong-Il; SOHN, Sung-Won et al.Lecture notes in computer science. 2002, pp 146-159, issn 0302-9743, isbn 3-540-43319-8Conference Paper

Overflow underflow, and severe loss of significance in floatting-point addition and subtractionFELDSTEIN, A; TURNER(P.).IMA journal of numerical analysis. 1986, Vol 6, Num 2, pp 241-251, issn 0272-4979Article

Protection Structure Building for Malicious Traffic Protecting in Intranet SystemsNOH, Sichoon; EUN JEE SONG; DONG CHUN LEE et al.Lecture notes in computer science. 2006, pp 1051-1059, issn 0302-9743, isbn 3-540-34070-X, 9 p.Conference Paper

Transcending the limitsELMS, D.Civil engineering systems (Print). 1995, Vol 12, Num 3, pp 185-189, issn 0263-0257Article

Copying garbage collection for the WAM: To mark or not to mark?DEMOEN, Bart; NGUYEN, Phuong-Lan; VANDEGINSTE, Ruben et al.Lecture notes in computer science. 2002, pp 194-208, issn 0302-9743, isbn 3-540-43930-7, 15 p.Conference Paper

Tandem behavior of a telecommunication system with repeated calls. II: A general case without buffersPOURBABAI, B.European journal of operational research. 1993, Vol 65, Num 2, pp 247-258, issn 0377-2217Article

Pitfalls of a full floating-point proof : Example on the formal proof of the veltkamp/dekker algorithmsBOLDO, Sylvie.Lecture notes in computer science. 2006, pp 52-66, issn 0302-9743, isbn 3-540-37187-7, 1Vol, 15 p.Conference Paper

Register windows vs. register allocationWALL, David W.ACM SIGPLAN notices. 2004, Vol 39, Num 4, pp 271-282, issn 1523-2867, 12 p.Article

Convexity properties of loss and overflow functionsKUMARAN, Krishnan; MANDJES, Michel; STOLYAR, Alexander et al.Report - Probability, networks and algorithms. 2002, Num 7, pp 1-8, issn 1386-3711Article

Introducing reference flow control for detecting intrusion symptoms at the OS levelZIMMERMANN, Jacob; ME, Ludovic; BIDAN, Christophe et al.Lecture notes in computer science. 2002, pp 292-306, issn 0302-9743, isbn 3-540-00020-8, 15 p.Conference Paper

Libsafe: Transparent system-wide protection against buffer overflow attacksTSAI, Timothy; SINGH, Navjot.International conference on dependable systems and networks. 2002, isbn 0-7695-1597-5, p. 541Conference Paper

Complex behavior in digital filters with overflow nonlinearity : Analytical resultsKOCAREV, L; WU, C. W; CHUA, L. O et al.IEEE transactions on circuits and systems. 2, Analog and digital signal processing. 1996, Vol 43, Num 3, pp 234-246, issn 1057-7130Article

Traffic modeling of integrated terrestrial-satellite systems for mobile communicationsRUGGIERI, M; VATALARO, F; SANTUCCI, F et al.Space communications. 1995, Vol 13, Num 3, pp 239-247, issn 0924-8625Article

Optimally efficient estimation of the statistics of rare events in queueing networksFRATER, M. R; LENNON, T. M; ANDERSON, B. D. O et al.IEEE transactions on automatic control. 1991, Vol 36, Num 12, pp 1395-1405, issn 0018-9286Article

Circulant and skew-circulant matrices as new normal-form realization of IIR digital filtersLIU, V. C; VAIDYANATHAN, P. P.IEEE transactions on circuits and systems. 1988, Vol 35, Num 6, pp 625-635, issn 0098-4094Article

  • Page / 21