Sciweavers

1995 search results - page 118 / 399
» Belief in Information Flow
Sort
View
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
14 years 1 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
ERSHOV
2006
Springer
14 years 2 days ago
Security for Multithreaded Programs Under Cooperative Scheduling
Abstract. Information flow exhibited by multithreaded programs is subtle because the attacker may exploit scheduler properties when deducing secret information from publicly observ...
Alejandro Russo, Andrei Sabelfeld
SIGIR
2008
ACM
13 years 10 months ago
Separate and inequal: preserving heterogeneity in topical authority flows
Web pages, like people, are often known by others in a variety of contexts. When those contexts are sufficiently distinct, a page's importance may be better represented by mu...
Lan Nie, Brian D. Davison
ENDM
2010
118views more  ENDM 2010»
13 years 5 months ago
On the Vehicle Routing Problem with lower bound capacities
In this paper we show and discuss a family of inequalities for solving a variant of the classical vehicle routing problem where also a lower bound is considered. The inequalities ...
Luís Gouveia, Juan José Salazar Gonz...
BIRTHDAY
2008
Springer
14 years 4 days ago
Secure Data Flow in a Calculus for Context Awareness
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...
Doina Bucur, Mogens Nielsen