Sciweavers

2486 search results - page 68 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
APLAS
2009
ACM
14 years 3 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue
IPSN
2007
Springer
14 years 2 months ago
NIST smart data flow system II: speaker localization
Multimodal applications require the acquisition and processing of massive amounts of information from multiple sensors. Because this process is beyond the capabilities of a single...
Antoine Fillinger, Lukas Diduch, Imad Hamchi, St&e...
ECSA
2010
Springer
13 years 9 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
CSCW
2012
ACM
12 years 4 months ago
CrowdWeaver: visually managing complex crowd work
Though toolkits exist to create complex crowdsourced workflows, there is limited support for management of those workflows. Managing crowd workers and tasks requires significant i...
Aniket Kittur, Susheel Khamkar, Paul André,...
ATC
2008
Springer
13 years 10 months ago
Concepts for Autonomous Control Flow Checking for Embedded CPUs
In this paper, we introduce new concepts and methods for checking the correctness of control flow instructions during the execution of programs in embedded CPUs. Detecting and avoi...
Daniel Ziener, Jürgen Teich