Sciweavers

1995 search results - page 139 / 399
» Belief in Information Flow
Sort
View
107
Voted
CORR
2010
Springer
96views Education» more  CORR 2010»
14 years 7 months ago
Quantifying Information Leakage in Finite Order Deterministic Programs
Information flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. While past work has proposed information...
Ji Zhu, Mudhakar Srivatsa
IADIS
2004
15 years 2 months ago
Future of Traffic Information: Online-Simulation of a Large Scale Freeway Network
Detailed and reliable information about the current traffic state is hardly obtainable by the road user. Therefore, we propose a web based visualization of the current and future ...
Florian Mazur, Roland Chrobok, Sigurdur F. Hafstei...
109
Voted
ICISS
2010
Springer
14 years 10 months ago
Unifying Facets of Information Integrity
Abstract. Information integrity is a vital security property in a variety of applications. However, there is more than one facet to integrity: interpretations of integrity in diffe...
Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld
IJISEC
2008
119views more  IJISEC 2008»
15 years 26 days ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
104
Voted
ICIP
2002
IEEE
16 years 2 months ago
Recovering height information from SAR images of terrain
In this paper we suggest a new approach for recovering 3-D depth from a field of surface normals. The surface normals are extracted from Synthetic Aperture Radar (SAR) images usin...
Adrian G. Bors, Edwin R. Hancock