Sciweavers

533 search results - page 48 / 107
» Control flow based obfuscation
Sort
View
152
Voted
TASE
2010
IEEE
14 years 9 months ago
Automated Selection and Placement of Single Cells Using Vision-Based Feedback Control
Abstract--We present a robotic manipulation system for automated selection and transfer of individual living cells to analysis locations. We begin with a commonly used cell transfe...
Y. H. Anis, Mark Holl, Deirdre R. Meldrum
108
Voted
TCS
2010
15 years 27 days ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
TON
2010
93views more  TON 2010»
14 years 9 months ago
Equilibrium of Heterogeneous Congestion Control: Optimality and Stability
When heterogeneous congestion control protocols that react to different pricing signals share the same network, the current theory based on utility maximization fails to predict th...
Ao Tang, X. Wei, Stephen H. Low, Mung Chiang
CSFW
2007
IEEE
15 years 6 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
AAAI
2008
15 years 4 months ago
Adaptive Management of Air Traffic Flow: A Multiagent Coordination Approach
This paper summarizes recent advances in the application of multiagent coordination algorithms to air traffic flow management. Indeed, air traffic flow management is one of the fu...
Kagan Tumer, Adrian K. Agogino