Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,613,900 papers from all fields of science
Search
Sign In
Create Free Account
Storage violation
Known as:
STORAGE VIOLATIONS
, Violation
In computing a storage violation is a hardware or software fault that occurs when a task attempts to access an area of computer storage which it is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Bounds checking
Call stack
Customer Information Control System (CICS)
Debugger
Expand
Broader (2)
Computer memory
Memory management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Complementary test of the dark matter self-interaction in dark U(1) model by direct and indirect dark matter detection
Chian-Shu Chen
,
G. Lin
,
Yen-Hsun Lin
2015
Corpus ID: 118743047
The halo dark matter (DM) can be captured by the Sun if its final velocity after the collision with a nucleus in the Sun is less…
Expand
2012
2012
Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures
M. Maurer
,
I. Brandić
,
R. Sakellariou
IEEE Fifth International Conference on Cloud…
2012
Corpus ID: 7805020
Cloud providers aim at guaranteeing Service Level Agreements (SLAs) in a resource-efficient way. This, amongst others, means that…
Expand
Highly Cited
2012
Highly Cited
2012
Cyber attacks on power system state estimation through topology errors
A. Ashok
,
M. Govindarasu
IEEE Power & Energy Society General Meeting
2012
Corpus ID: 27337185
The exposure of SCADA network infrastructure to cyber threats has increased enormously due to increased interconnectivity of…
Expand
2012
2012
Robust Passive Macro-Model Generation With Local Compensation
Tianshi Wang
,
Zuochang Ye
IEEE transactions on microwave theory and…
2012
Corpus ID: 15067073
This paper presents a new passivity enforcement technique for linear time-invariant multiport systems generated from tabulated…
Expand
2009
2009
Private Antitrust Enforcement in the Presence of Pre-Trial Bargaining
Sylvain Bourjade
,
P. Rey
,
P. Seabright
2009
Corpus ID: 28191312
We study the effect of encouraging private actions for breaches of competition law. We develop a model in which a plaintiff, who…
Expand
2007
2007
Aspect-Oriented Design Principles : Lessons from Object-Oriented Design
D. Wampler
2007
Corpus ID: 17321981
class Polygon implements Shape { Point getVertex(index i) {...} void draw() {...} String toString() {...} } class Triangle…
Expand
2007
2007
Non-CKM induced flavor violation in "minimal" SUSY SU(5) models
F. Borzumati
,
S. Mishima
,
T. Yamashita
2007
Corpus ID: 116138280
Patterns of flavor violation induced by neutrino Yukawa couplings are discussed in realistic ``minimal'' SUSY SU(5) models…
Expand
Highly Cited
1997
Highly Cited
1997
Quality-of-service-oriented medium access control for wireless ATM networks
N. Passas
,
S. Paskalis
,
D. Vali
,
L. Merakos
IEEE Communications Magazine
1997
Corpus ID: 2200121
The medium access control (MAC) protocol and the underlying traffic scheduling algorithm developed within project Magic WAND…
Expand
Highly Cited
1992
Highly Cited
1992
Island constraints : theory, acquisition and processing
H. Goodluck
,
M. Rochemont
1992
Corpus ID: 60367237
Island Constraints: An Introduction H. Goodluck, M. Rochemont. No Variable is an Island: Complexity and Island Constraints R…
Expand
1992
1992
Subjacency Violations and Empty Categories in Second Language Acquisition
Lydia White
1992
Corpus ID: 61912973
Research on first language (L1) acquisition or on language processing that is conducted within the framework of Government…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE