Sciweavers

407 search results - page 31 / 82
» Thermal-aware data flow analysis
Sort
View
TMA
2012
Springer
268views Management» more  TMA 2012»
13 years 5 months ago
Identifying Skype Nodes in the Network Exploiting Mutual Contacts
Abstract. In this paper we present an algorithm that is able to progressively discover nodes of a Skype overlay P2P network. Most notably, super nodes in the network core. Starting...
Jan Jusko, Martin Rehák
CORR
2008
Springer
89views Education» more  CORR 2008»
14 years 9 months ago
One MEMS Design Tool with Maximal Six Design Flows
This paper presents one MEMS design tool with total six design flows, which makes it possible that the MEMS designers are able to choose the most suitable design flow for their sp...
Honglong Chang, Jinghui Xu, Jianbing Xie, Chenglia...
IJMI
2007
140views more  IJMI 2007»
14 years 9 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
73
Voted
TIT
2008
73views more  TIT 2008»
14 years 9 months ago
Detection of Information Flows
Abstract-- Distributed detection of information flows by timing analysis is considered. Timing measurements are subject to perturbations and the insertion of chaff noise. Moreover,...
Ting He, Lang Tong
CSFW
2004
IEEE
15 years 1 months ago
Enforcing Robust Declassification
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic