Sciweavers

519 search results - page 50 / 104
» Control flow obfuscation with information flow tracking
Sort
View
FAST
2009
13 years 6 months ago
Application of Named Graphs Towards Custom Provenance Views
Provenance capture as applied to execution oriented and interactive workflows is designed to record minute detail needed to support a "modify and restart" paradigm as we...
Tara Gibson, Karen Schuchardt, Eric G. Stephan
KES
2008
Springer
13 years 8 months ago
Information Coordination Using Meta-agents in Information Logistics Processes
In order to coordinate and deliver information in the right time and to the right place, theories from multi-agent systems and information logistics are combined. We use agents to ...
Mats Apelkrans, Anne Håkansson
WORM
2004
13 years 10 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
CDC
2010
IEEE
147views Control Systems» more  CDC 2010»
13 years 3 months ago
Asymmetric information diffusion via gossiping on static and dynamic networks
In this paper we consider the problem of gossiping in a network to diffuse the average of a sub-set of nodes, called sources, and directing it to another sub-set of nodes in the ne...
Mehmet Ercan Yildiz, Anna Scaglione, Asuman E. Ozd...
ISBI
2006
IEEE
14 years 2 months ago
Comparing optical-flow based methods for quantification of myocardial deformations on RT3D ultrasound
Quantitative analysis of cardiac motion is of great clinical interest in assessing ventricular function. Real-time 3-D (RT3D) ultrasound transducers provide valuable threedimensio...
Qi Duan, Elsa D. Angelini, Olivier Gérard, ...