Sciweavers

519 search results - page 72 / 104
» Control flow obfuscation with information flow tracking
Sort
View
CODES
2007
IEEE
14 years 3 months ago
Secure FPGA circuits using controlled placement and routing
In current Field-Programmable-Logic Architecture (FPGA) design flows, it is very hard to control the routing of submodules. It is thus very hard to make an identical copy of an ex...
Pengyuan Yu, Patrick Schaumont
HUMAN
2003
Springer
14 years 2 months ago
Admission Control for TCP Connections in QoS IP Network
The paper describes a new admission control (AC) algorithm for greedy TCP connections. The algorithm has passed positive tests in preproduction QoS IP network [2], developed inside...
Wojciech Burakowski, Halina Tarasiuk
CSFW
2008
IEEE
13 years 10 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
EKNOW
2009
13 years 6 months ago
Process Diagnostics: A Method Based on Process Mining
As organizations change, their information systems can evolve from simple systems to complex systems, which are hard to understand, and therefore hard to maintain or extend. Proces...
Melike Bozkaya, Joost Gabriels, Jan Martijn E. M. ...
IJRR
2002
96views more  IJRR 2002»
13 years 8 months ago
Phase Regulation of Decentralized Cyclic Robotic Systems
We address the problem of coupling cyclic robotic tasks to produce a specified coordinated behavior. Such coordination tasks are common in robotics, appearing in applications like...
Eric Klavins, Daniel E. Koditschek