Sciweavers

1995 search results - page 160 / 399
» Belief in Information Flow
Sort
View
ISCC
2003
IEEE
14 years 3 months ago
Controlling Bursts in Best-effort Routers for Flow Isolation
In today’s Internet a user can be adversely affected by other users that overload the router. To address this problem, routers need to provide flow isolation. In this paper, we...
Miguel A. Ruiz-Sánchez, Walid Dabbous
ISESE
2003
IEEE
14 years 3 months ago
Analogy Based Prediction of Work Item Flow in Software Projects: a Case Study
A software development project coordinates work by using work items that represent customer, tester, and developer found defects, enhancements, and new features. We set out to fac...
Audris Mockus
ESORICS
2003
Springer
14 years 3 months ago
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
RTCSA
2000
IEEE
14 years 2 months ago
Extracting safe and precise control flow from binaries
As a starting point for static program analysis a control flow graph (CFG) is needed. If only the binary executable is available, this CFG has to be reconstructed from sequences ...
Henrik Theiling
VISUALIZATION
1997
IEEE
14 years 2 months ago
The motion map: efficient computation of steady flow animations
This paper presents a new approach for animating 2D steady flow fields. It is based on an original data structure called the Motion Map. The Motion Map contains not only a dense...
Bruno Jobard, Wilfrid Lefer