Overflow flag

In computer processors, the overflow flag (sometimes called V flag) is usually a single bit in a system status register used to indicate when an… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1936-2017
010020019362016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
For difference-expansion (DE)-based reversible data hiding, the embedded bit-stream mainly consists of two parts: one part that… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
  • Derong Liu
  • IEEE Transactions on Automatic Control
  • 2005
Computer networks have experienced an explosive growth over the past years and with that growth have come severe congestion… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Despite previous efforts in auditing software manually and automatically, buffer overruns are still being discovered in programs… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Buffer overflow attack is the most common and arguably the most dangerous attack method used in Internet security breach… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The size and complexity of software systems is growing, increasing the number of bugs. Many of these bugs constitute security… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Buffer overflow attacks may be today’s single most important security threat. This paper presents a new approach to mitigating… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We describe a new active queue management scheme, Random Exponential Marking (REM), that aims to achieve both high utilization… (More)
  • figure 3
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attacks gained… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
1978
Highly Cited
1978
This work was supported by C.N.R.S. under grant ATP-Informatique 03119. A certain number of classical data flow analysis… (More)
Is this relevant?