Sciweavers

945 search results - page 62 / 189
» Working the Flow
Sort
View
ECSCW
1997
14 years 11 months ago
Supporting the Flow of Information Through Constellations of Interaction
Abstract: In field studies designed to uncover opportunities for computationallyintensive business applications, we observed an interaction pattern we term "constellations&quo...
Tony Salvador, Sara A. Bly
ICASSP
2010
IEEE
14 years 10 months ago
Tracking encrypted VoIP calls via robust hashing of network flows
In this work we propose a Voice over IP (VoIP) call tracking scheme based on robust hashing of VoIP flows. In the proposed scheme the audio content of a possibly encrypted VoIP ...
Baris Coskun, Nasir D. Memon
IJISEC
2007
149views more  IJISEC 2007»
14 years 9 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
JCS
2007
80views more  JCS 2007»
14 years 9 months ago
Secure information flow for a concurrent language with scheduling
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have specified an information flow ty...
Gilles Barthe, Leonor Prensa Nieto
JWSR
2008
162views more  JWSR 2008»
14 years 8 months ago
Business Process Control-Flow Complexity: Metric, Evaluation, and Validation
Organizations are increasingly faced with the challenge of managing business processes, workflows, and recently, Web processes. One important aspect of business processes that has...
Jorge Cardoso