Sciweavers

277 search results - page 24 / 56
» Timing-Sensitive Information Flow Analysis for Synchronous S...
Sort
View
315
Voted
AINA
2010
IEEE
15 years 7 months ago
Mnesic Evocation: An Isochron-Based Analysis
—Mnesic evocation occurs under the action of a stimulus. A successful evocation is observed as the overrun of a certain threshold of the neuronal activity followed by a medical i...
Hedi Ben Amor, Jacques Demongeot, Nicolas Glade
147
Voted
HICSS
2007
IEEE
151views Biometrics» more  HICSS 2007»
15 years 10 months ago
The Impact of Information Technology on the Temporal Optimization of Supply Chain Performance
The objective of this paper is to suggest a systematic means by which the timing and focus of information technology policies can be used to optimize supply chain performance and ...
Ken Dozier, David Chang
139
Voted
TISSEC
2010
142views more  TISSEC 2010»
14 years 10 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
121
Voted
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
119
Voted
IQIS
2004
ACM
15 years 9 months ago
A Framework for Analysis of Data Freshness
Data freshness has been identified as one of the most important data quality attributes in information systems. This importance increases particularly in the context of distribute...
Mokrane Bouzeghoub, Verónika Peralta