Sciweavers

6812 search results - page 31 / 1363
» Detection of Information Flows
Sort
View
CHI
2011
ACM
14 years 1 months ago
Feedlack detects missing feedback in web applications
While usability methods such as user studies and inspections can reveal a wide range of problems, they do so for only a subset of an application’s features and states. We presen...
Andrew J. Ko, Xing Zhang
ACMSE
2006
ACM
15 years 3 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
SFM
2010
Springer
202views Formal Methods» more  SFM 2010»
15 years 1 months ago
Information Theory and Security: Quantitative Information Flow
Pasquale Malacaria, Jonathan Heusser
MASCOTS
2008
14 years 11 months ago
Network Information Flow in Network of Queues
Two classic categories of models exist for computer networks: network information flow and network of queues. The network information flow model appropriately captures the multi-ho...
Phillipa Gill, Zongpeng Li, Anirban Mahanti, Jingx...
ECCV
2008
Springer
15 years 11 months ago
Finding Actions Using Shape Flows
Abstract. We propose a novel method for action detection based on a new action descriptor called a shape flow that represents both the shape and movement of an object in a holistic...
Hao Jiang, David R. Martin