Sciweavers

519 search results - page 38 / 104
» Control flow obfuscation with information flow tracking
Sort
View
MICCAI
2010
Springer
13 years 7 months ago
Model-Based Multi-view Fusion of Cinematic Flow and Optical Imaging
Bioluminescence imaging (BLI) offers the possibility to study and image biology at molecular scale in small animals with applications in oncology or gene expression studies. Here ...
Mickael Savinaud, Martin de La Gorce, Serge Maitre...
DAGM
2010
Springer
13 years 10 months ago
Probabilistic Multi-class Scene Flow Segmentation for Traffic Scenes
A multi-class traffic scene segmentation approach based on scene flow data is presented. Opposed to many other approaches using color or texture features, our approach is purely ba...
Alexander Barth, Jan Siegemund, Annemarie Mei&szli...
DAGSTUHL
1996
13 years 10 months ago
Specialization of Imperative Programs Through Analysis of Relational Expressions
An analysis method for specialization of imperative programs is described in this paper. This analysis is an inter-procedural data flow method operating on control flow graphs and...
Alexander Sakharov
SACMAT
2011
ACM
12 years 11 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
IFIP
2010
Springer
13 years 3 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton