Sciweavers

1995 search results - page 145 / 399
» Belief in Information Flow
Sort
View
KBSE
2007
IEEE
14 years 4 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
VISUALIZATION
2003
IEEE
14 years 3 months ago
Effectively Visualizing Multi-Valued Flow Data Using Color and Texture
In this paper we offer several new insights and techniques for effectively using color and texture to simultaneously convey information about multiple 2D scalar and vector distrib...
Timothy Urness, Victoria Interrante, Ivan Marusic,...
GRAPHICSINTERFACE
2008
13 years 11 months ago
Context-controlled flow visualization in augmented reality
A major challenge of novel scientific visualization using Augmented Reality is the accuracy of the user/camera position tracking. Many alternative techniques have been proposed, b...
Mike Eissele, Matthias Kreiser, Thomas Ertl
JSAC
2008
121views more  JSAC 2008»
13 years 10 months ago
Network Coding Games with Unicast Flows
Abstract--To implement network coding, users need to coordinate and cooperate with respect to their strategies in terms of duplicating and transmitting side information across spec...
Jennifer Price, Tara Javidi
TAPSOFT
1995
Springer
14 years 1 months ago
Comparing Flow-Based Binding-Time Analyses
Abstract. Binding-time analyses based on flow analysis have been presented by Bondorf, Consel, Bondorf and Jørgensen, and Schwartzbach and the present author. The analyses are fo...
Jens Palsberg