Sciweavers

6812 search results - page 92 / 1363
» Detection of Information Flows
Sort
View
ISCC
2006
IEEE
128views Communications» more  ISCC 2006»
15 years 7 months ago
Adjacent 2-Route Flow Approach for Restorable Dynamic Routing in MPLS Networks
In this paper we focus on issues of restorable dynamic routing in MPLS networks. We assume that the considered MPLS network must provide reliable service including restorable rout...
Krzysztof Walkowiak
ICFP
1997
ACM
15 years 5 months ago
The Effectiveness of Flow Analysis for Inlining
An interprocedural flow analysis can justify inlining in higher-order languages. In principle, more inlining can be performed as analysis accuracy improves. This paper compares fo...
J. Michael Ashley
CEAS
2008
Springer
15 years 3 months ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
CVPR
2006
IEEE
16 years 3 months ago
Multi-Camera Scene Flow by Tracking 3-D Points and Surfels
Scene flow represents the 3-D motion of points in the scene, just as optical flow is related to their 2-D motion in the images. As opposed to classical methods which compute scene...
Frederic Devernay, Diana Mateus, Matthieu Guilbert
EUROSYS
2009
ACM
15 years 10 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos