Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,084,873 papers from all fields of science
Search
Sign In
Create Free Account
Buffer overflow
Known as:
Buffer overruns
, Overflow
, Buffer overflows
Expand
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
Aliasing (computing)
Application security
Attack patterns
Bitstream
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
QPRD: QoS-aware Peering Routing Protocol for Delay Sensitive Data in Hospital Body Area Network Communication
Z. Khan
,
S. Sivakumar
,
W. Phillips
,
B. Robertson
Seventh International Conference on Broadband…
2012
Corpus ID: 14793901
The consistent performance, energy efficiency, and reliability are important factors for real-time monitoring of a patient's data…
Expand
Review
2012
Review
2012
Energy efficiency in the extended-reach fiber-wireless access networks
B. Kantarci
,
H. Mouftah
IEEE Network
2012
Corpus ID: 17581184
Telecommunication networks call for novel energy-efficient design and management schemes as a result of the increasing…
Expand
2010
2010
A System-on-a-Chip Platform for Mixed-Criticality Applications
Armin Wasicek
,
C. E. Salloum
,
H. Kopetz
IEEE International Symposium on Object/Component…
2010
Corpus ID: 8152373
High–integrity systems are deployed in order to realize safety–critical applications. To meet the rigorous requirements in this…
Expand
2007
2007
PABC: Power-Aware Buffer Cache Management for Low Power Consumption
Min Lee
,
Euiseong Seo
,
Joonwon Lee
,
Jinsoo Kim
IEEE transactions on computers
2007
Corpus ID: 7242878
Power consumed by memory systems becomes a serious issue as the size of the memory installed increases. With various low power…
Expand
Highly Cited
2004
Highly Cited
2004
Entrainment in bottom gravity currents over complex topography from three‐dimensional nonhydrostatic simulations
T. Özgökmen
,
P. Fischer
,
Jinqiao Duan
,
T. Iliescu
2004
Corpus ID: 1279822
By recognizing that oceanic overflows follow the seafloor morphology, which shows a self‐similar structure at spatial scales…
Expand
1996
1996
Deterministic Admission Control Strategies in Video Servers with Variable Bit Rate Streams
J. Dengler
,
C. Bernhardt
,
E. Biersack
International Workshop on Interactive Distributed…
1996
Corpus ID: 17761011
Video servers are a key component in multimedia systems. Due to the real-time requirements and high resource demand of digital…
Expand
1996
1996
Video-on-demand services: Efficient transportation and decompression of variable bit rate video
W. Feng
1996
Corpus ID: 60996502
Digital video compression techniques, such as the Motion-JPEG and MPEG compression standards, greatly reduce the network and…
Expand
Highly Cited
1992
Highly Cited
1992
An Intermedia Skew Control System for Multimedia Data Presentation
T. Little
,
Frank Kao
International Workshop on Network and Operating…
1992
Corpus ID: 39795447
Delivery of multimedia traffic from distributed sources to a single destination relies on an accurate characterization or…
Expand
Highly Cited
1991
Highly Cited
1991
Statistically based buffer control policies for constant rate transmission of compressed digital video
J. Zdepski
,
D. Raychaudhuri
,
K. Joseph
IEEE Transactions on Communications
1991
Corpus ID: 5270075
An investigation of statistically based approaches to the design of buffer control algorithms for interfacing a compressed…
Expand
Highly Cited
1991
Highly Cited
1991
Buffer layers for high-quality epitaxial YBCO films on Si
D. Fork
,
D. Fenner
,
+4 authors
J. Boyce
IEEE transactions on applied superconductivity
1991
Corpus ID: 36200340
Efforts aimed at producing device-quality YBa/sub 2/Cu/sub 3/O/sub 7- delta / (YBCO) films on Si, which have resulted in films…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE