Sciweavers

533 search results - page 52 / 107
» Control flow based obfuscation
Sort
View
163
Voted
BPSC
2009
190views Business» more  BPSC 2009»
15 years 3 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
LCN
2000
IEEE
15 years 6 months ago
Efficient Congestion Avoidance Mechanism
The nowadays Internet architecture is mainly based on unicast communications and best-effort service. However, the development of the Internet encouraged emerging services that ar...
Anca Dracinschi Sailer, Serge Fdida
EMMCVPR
2009
Springer
15 years 6 months ago
Reconstructing Optical Flow Fields by Motion Inpainting
An edge-sensitive variational approach for the restoration of optical flow fields is presented. Real world optical flow fields are frequently corrupted by noise, reflection artifac...
Benjamin Berkels, Claudia Kondermann, Christoph S....
TII
2010
146views Education» more  TII 2010»
14 years 9 months ago
A Flexible Design Flow for Software IP Binding in FPGA
Software intellectual property (SWIP) is a critical component of increasingly complex field programmable gate arrays (FPGA)-based system-on-chip (SOC) designs. As a result, develop...
Michael A. Gora, Abhranil Maiti, Patrick Schaumont
143
Voted
INFOCOM
2003
IEEE
15 years 7 months ago
Flow Level Simulation of Large IP Networks
— The aim of this paper is to simulate the interaction of a large number of TCP controlled flows and UDP flows sharing many routers/links, from the knowledge of the network par...
François Baccelli, Dohy Hong