Sciweavers

1995 search results - page 294 / 399
» Belief in Information Flow
Sort
View
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 11 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
GLOBECOM
2008
IEEE
13 years 10 months ago
Maximum-Lifetime Coding Subgraph for Multicast Traffic in Wireless Sensor Networks
It has been shown that network coding can lead to significant improvement in network capacity and reduction in power consumption for multicast traffic in wireless networks. In this...
Vahid Shah-Mansouri, Vincent W. S. Wong
CONCURRENCY
2010
114views more  CONCURRENCY 2010»
13 years 10 months ago
A step towards refining and translating B control annotations to Handel-C
Research augmenting B machines presented at B2007 has demonstrated how fragments of control flow expressed as annotations can be added to associated machine operations, and shown t...
Wilson Ifill, Steve A. Schneider
ENVSOFT
2010
161views more  ENVSOFT 2010»
13 years 10 months ago
Graphical user interface for rapid set-up of SHETRAN physically-based river catchment model
The SHETRAN physically-based distributed rainfall-runoff modelling system gives detailed simulations in time and space of water flow and sediment and solute transport in river cat...
Stephen J. Birkinshaw, Philip James, John Ewen
ENTCS
2006
90views more  ENTCS 2006»
13 years 10 months ago
A Framework for Engineering Interactions in Java-based Component Systems
This paper describes a Java-based framework for the development of componentbased software systems supporting the specification of the logic of component interactions as a first-c...
Antonio Natali, Enrico Oliva, Alessandro Ricci, Mi...