Sciweavers

823 search results - page 21 / 165
» A Graph-Theoretic Analysis of Information Value
Sort
View
POPL
1998
ACM
15 years 4 months ago
Secure Information Flow in a Multi-Threaded Imperative Language
Previously, we developed a type system to ensure secure information flow in a sequential, imperative programming language [VSI96]. Program variables are classified as either hig...
Geoffrey Smith, Dennis M. Volpano
CSFW
2004
IEEE
15 years 3 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
GLOBECOM
2010
IEEE
14 years 9 months ago
The Information Propagation Speed Upper Bound in Cognitive Radio Networks
Abstract--The information propagation speed (IPS) of a network specifies how fast the information can be transmitted in a network. In this paper, we derive an IPS upper bound in co...
Chuan Han, Yaling Yang
WWW
2007
ACM
16 years 11 days ago
Sliding window technique for the web log analysis
The results of the Web query log analysis may be significantly shifted depending on the fraction of agents (non-human clients), which are not excluded from the log. To detect and ...
Nikolai Buzikashvili
WSC
2008
15 years 2 months ago
The APIOBPCS Deziel and Eilon parameter configuration in supply chain under progressive information sharing strategies
The aim of this paper is to investigate how different smoothing parameter levels of the Automatic Pipeline Inventory and Order Based Production Control System smoothing replenishm...
Salvatore Cannella, Elena Ciancimino