Sciweavers

241 search results - page 21 / 49
» The Effectiveness of Flow Analysis for Inlining
Sort
View
COMPSAC
2009
IEEE
15 years 4 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
SIGMETRICS
2000
ACM
107views Hardware» more  SIGMETRICS 2000»
15 years 1 months ago
Detecting shared congestion of flows via end-to-end measurement
Current Internet congestion control protocols operate independently on a per-flow basis. Recent work has demonstrated that cooperative congestion control strategies between flow...
Dan Rubenstein, James F. Kurose, Donald F. Towsley
TKDE
2010
160views more  TKDE 2010»
14 years 7 months ago
Using Proximity Search to Estimate Authority Flow
—Authority flow and proximity search have been used extensively in measuring the association between entities in data graphs, ranging from the Web to relational and XML database...
Vagelis Hristidis, Yannis Papakonstantinou, Ramakr...
IJBIS
2010
82views more  IJBIS 2010»
14 years 6 months ago
Simulation discounted cash flow valuation for internet companies
Discounted cash flow (DCF) is the most accepted approach for company valuation. It is well grounded in theory and practice. However, the DCF approach, which is commonly used for t...
Maged Ali, Ramzi El-Haddadeh, Tillal Eldabi, Ebrah...
82
Voted
ICCAD
2001
IEEE
201views Hardware» more  ICCAD 2001»
15 years 6 months ago
An Integrated Data Path Optimization for Low Power Based on Network Flow Method
Abstract: We propose an effective algorithm for power optimization in behavioral synthesis. In previous work, it has been shown that several hardware allocation/binding problems fo...
Chun-Gi Lyuh, Taewhan Kim, Chien-Liang Liu