We present a method that flattens a curved surface and its neighborhood to create effective, uncluttered visualizations by applying standard flow visualization techniques in the d...
Christoph Petz, Steffen Prohaska, Leonid Goubergri...
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
An analysis method for specialization of imperative programs is described in this paper. This analysis is an inter-procedural data flow method operating on control flow graphs and...
Robert Thomas has shown, using simulations of experimental results, that the power flow on any line in an electric network is linearly proportional to the total system load when t...
Nodir Adilov, Thomas Light, Richard E. Schuler, Wi...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...