Sciweavers

4616 search results - page 232 / 924
» Extreme Components Analysis
Sort
View
BPSC
2010
139views Business» more  BPSC 2010»
15 years 2 months ago
Static Information Flow Analysis of Workflow Models
: This paper proposes a framework for the detection of information leaks in workflow descriptions based on static information flow analysis. Despite the correct deployment of acces...
Rafael Accorsi, Claus Wonnemann
IWPC
2009
IEEE
15 years 11 months ago
Vector space analysis of software clones
In this paper, we introduce a technique for applying Independent Component Analysis to vector space representations of software code fragments such as methods or blocks. The dista...
Scott Grant, James R. Cordy
ISI
2005
Springer
15 years 10 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
155
Voted
ATAL
2004
Springer
15 years 9 months ago
About Engineering Complex Systems: Multiscale Analysis and Evolutionary Engineering
Abstract. We describe an analytic approach, multiscale analysis, that can demonstrate the fundamental limitations of decomposition based engineering for the development of highly c...
Yaneer Bar-Yam
FSE
2003
Springer
99views Cryptology» more  FSE 2003»
15 years 9 months ago
Analysis of Involutional Ciphers: Khazad and Anubis
In this paper we study structural properties of SPN ciphers in which both the S-boxes and the affine layers are involutions. We apply our observations to the recently designed Rijn...
Alex Biryukov