English Deutsch Français 简体中文 繁體中文
Book123, Download eBooks for Free - Anytime! Submit your article
Buffer



 
 
 
 

Buffer


Results Buffer Ebook : 1 to 9 of 9
 
Buffer

Free Download, Unlimited Speed. Download now at an incredible speed!

Sponsored links


Apply MDP to Class-Based Packet Buffer Management: Markov Decision Process (MDP), Quality of service, Packet buffer management, Packet scheduling, Packet admission control Web/HTML/CSS/Ajax Apply MDP to Class-Based Packet Buffer Management: Markov Decision Process (MDP), Quality of service, Packet Buffer management, Packet scheduling, Packet admission control
With the development of Internet and rapid growths of the network bandwidth, the quality of network transmission has a significant improvement. However, in the pluralistic network applications, the dramatic network bandwidth may be occupied ...  
Tags : Packet   scheduling   admission   Decision   , Posted on 2010-03-17
 
Buffer Overflow Attacks Technical Buffer Overflow Attacks
Author: James C. Foster, Vitaly Osipov, Nish BhallaPublisher: SyngressPublish Date: 01 December, 2004ISBN: 1932266674  
Tags : Overflow   Buffer   Attacks   , Posted on 2010-03-15
 
Buffer.Overflow.Attacks Buffer.Overflow.Attacks
  
Tags : None, Posted on 2010-03-15
 
Buffer Overflow Attacks - Detect, Exploit, Prevent EBook Torrents Buffer Overflow Attacks - Detect, Exploit, Prevent
  
Tags : Overflow   Buffer   Attacks   Detect   Exploit   , Posted on 2010-03-15
 
Buffer Overflow Attacks: Detect, Exploit, Prevent Security/Hacking Buffer Overflow Attacks: Detect, Exploit, Prevent
  
Tags : Overflow   Buffer   Attacks   Detect   Exploit   , Posted on 2010-03-15
 
Download Buffer Overflow Attacks Detect, Exploit, Prevent Security/Hacking Download Buffer Overflow Attacks Detect, Exploit, Prevent
  
Tags : Overflow   Buffer   Attacks   Detect   Exploit   , Posted on 2010-03-16
 
Buffer Overflow Attacks. Detect, Exploit, Prevent (repost) Technical Buffer Overflow Attacks. Detect, Exploit, Prevent (repost)
Buffer Overflow Attacks. Detect, Exploit, PreventSyngress Media; 2005; ISBN-10: 1932266674; 512 Pages; PDF; 2.95 MbThe SANS Institute maintains a list of the 'Top 10 Software Vulnerabilities.' At the current time, over half of these vu ...  
Tags : repost   Overflow   Buffer   Attacks   Detect   , Posted on 2010-09-09
 
Value-Range Analysis of C Programs: Towards Proving the Absence of Buffer Overflow Vulnerabilities Programming Value-Range Analysis of C Programs: Towards Proving the Absence of Buffer Overflow Vulnerabilities
Axel Simon, "Value-Range Analysis of C Programs: Towards Proving the Absence of Buffer Overflow Vulnerabilities" Springer; 2008; ISBN: 1848000162; 300 pages; PDF; 2,7 MB Value-Range Analysis of C Programs describes a static analysi ...  
Tags : Proving   Absence   Overflow   Towards   Buffer   , Posted on 2010-05-13
 
Job-shop scheduling with limited buffer capacities - Models, solution representations, heuristics Technical Job-shop scheduling with limited Buffer capacities - Models, solution representations, heuristics
Author: Silvia HeitmannPublisher: VDM Verlag Dr. Mueller e.K.Publish Date: November 9, 2007ISBN: 3836447452Pages: 120Recent developments in manufacturing processes have increased the role of just-in-time production systems. Just-in-time pro ...  
Tags : scheduling   solution   buffer   Models   capacities   , Posted on 2010-03-16
 



Sign In | Not yet a member?