Sciweavers

6812 search results - page 93 / 1363
» Detection of Information Flows
Sort
View
CADE
2008
Springer
16 years 1 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
CC
2006
Springer
108views System Software» more  CC 2006»
15 years 5 months ago
Efficient Flow-Sensitive Interprocedural Data-Flow Analysis in the Presence of Pointers
This paper presents a new worklist algorithm that significantly speeds up a large class of flow-sensitive data-flow analyses, including typestate error checking and pointer analysi...
Teck Bok Tok, Samuel Z. Guyer, Calvin Lin
ICCV
1995
IEEE
15 years 5 months ago
Real-Time Obstacle Avoidance Using Central Flow Divergence and Peripheral Flow
The lure of using motion vision as a fundamental element in the perception of space drives this effort to use flow features as the sole cues for robot mobility. Real-time estimat...
David Coombs, Martin Herman, Tsai-Hong Hong, Maril...
ICASSP
2011
IEEE
14 years 5 months ago
Towards improving network flow watermarks using the repeat-accumulate codes
Network intruders try to hide their identity by relaying their traf c through a number of intermediate hosts, called stepping stones. Network ow watermarks have been used to detec...
Amir Houmansadr, Nikita Borisov
DIAGRAMS
2006
Springer
15 years 5 months ago
Flow Diagrams: Rise and Fall of the First Software Engineering Notation
Drawings of water are the earliest, least abstract forms of flow diagram. Representations of ideal or generalised sequences for manufacturing or actual paths for materials between ...
Stephen J. Morris, O. C. Z. Gotel