Storage violation

Known as: STORAGE VIOLATIONS, Violation 
In computing a storage violation is a hardware or software fault that occurs when a task attempts to access an area of computer storage which it is… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
We discuss the relevance of information contained in cross correlations among different degrees of freedom, which is crucial in… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?
2008
2008
This paper introduces two different algorithms for passivity enforcement of transmission-line macromodels based on the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
class Polygon implements Shape { Point getVertex(index i) {...} void draw() {...} String toString() {...} } class Triangle… (More)
  • figure 1
  • figure 2
Is this relevant?
2007
2007
Built-in event diagnosis and assessment modules are the key to the power quality (PQ) monitoring systems. Discrete wavelet… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
• PoMo Principles – strict separation of concerns – include mechanisms supporting all foreseeable policies • Novel… (More)
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
With the continually increasing operating frequencies, complex high-speed interconnect and package modules require… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper presents a new technique for the passivity enforcement of linear time-invariant multiport systems in state-space form… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
In this article, recently developed Bayesian spatial and ecological regression models are applied to analyse small-area variation… (More)
  • table 1
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
1997
1997
The Medium Access Control (MAC) protocol and the underlying traffic scheduling algorithm developed within project Magic WAND… (More)
  • figure 6
  • figure 9
  • figure 12
Is this relevant?
Highly Cited
1990
Highly Cited
1990
When exposed to a regular stimulus field, for instance generated by an artificial grammar, subjects unintentionally learn to… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • table 2
Is this relevant?