Sciweavers

1995 search results - page 145 / 399
» Belief in Information Flow
Sort
View
92
Voted
KBSE
2007
IEEE
15 years 7 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
124
Voted
VISUALIZATION
2003
IEEE
15 years 6 months ago
Effectively Visualizing Multi-Valued Flow Data Using Color and Texture
In this paper we offer several new insights and techniques for effectively using color and texture to simultaneously convey information about multiple 2D scalar and vector distrib...
Timothy Urness, Victoria Interrante, Ivan Marusic,...
86
Voted
GRAPHICSINTERFACE
2008
15 years 2 months ago
Context-controlled flow visualization in augmented reality
A major challenge of novel scientific visualization using Augmented Reality is the accuracy of the user/camera position tracking. Many alternative techniques have been proposed, b...
Mike Eissele, Matthias Kreiser, Thomas Ertl
97
Voted
JSAC
2008
121views more  JSAC 2008»
15 years 24 days ago
Network Coding Games with Unicast Flows
Abstract--To implement network coding, users need to coordinate and cooperate with respect to their strategies in terms of duplicating and transmitting side information across spec...
Jennifer Price, Tara Javidi
110
Voted
TAPSOFT
1995
Springer
15 years 4 months ago
Comparing Flow-Based Binding-Time Analyses
Abstract. Binding-time analyses based on flow analysis have been presented by Bondorf, Consel, Bondorf and Jørgensen, and Schwartzbach and the present author. The analyses are fo...
Jens Palsberg