Sciweavers

389 search results - page 13 / 78
» Information Flow in the Peer-Reviewing Process
Sort
View
CCS
2007
ACM
15 years 3 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
FPL
2004
Springer
117views Hardware» more  FPL 2004»
15 years 3 months ago
Flow Monitoring in High-Speed Networks with 2D Hash Tables
Abstract. Flow monitoring is a required task for a variety of networking applications including fair scheduling and intrusion/anomaly detection. Existing flow monitoring techniques...
David Nguyen, Joseph Zambreno, Gokhan Memik
CSFW
2004
IEEE
15 years 1 months ago
Modelling Downgrading in Information Flow Security
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
DIAGRAMS
2006
Springer
15 years 1 months ago
Flow Diagrams: Rise and Fall of the First Software Engineering Notation
Drawings of water are the earliest, least abstract forms of flow diagram. Representations of ideal or generalised sequences for manufacturing or actual paths for materials between ...
Stephen J. Morris, O. C. Z. Gotel
EH
2004
IEEE
149views Hardware» more  EH 2004»
15 years 1 months ago
Organization of the Information Flow in the Perception-Action Loop of Evolved Agents
Sensor evolution in nature aims at improving the acquisition of information from the environment and is intimately related with selection pressure towards adaptivity and robustnes...
Alexander S. Klyubin, Daniel Polani, Chrystopher L...