Sciweavers

6812 search results - page 31 / 1363
» Detection of Information Flows
Sort
View
CHI
2011
ACM
14 years 8 months ago
Feedlack detects missing feedback in web applications
While usability methods such as user studies and inspections can reveal a wide range of problems, they do so for only a subset of an application’s features and states. We presen...
Andrew J. Ko, Xing Zhang
ACMSE
2006
ACM
15 years 10 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
SFM
2010
Springer
202views Formal Methods» more  SFM 2010»
15 years 8 months ago
Information Theory and Security: Quantitative Information Flow
Pasquale Malacaria, Jonathan Heusser
MASCOTS
2008
15 years 6 months ago
Network Information Flow in Network of Queues
Two classic categories of models exist for computer networks: network information flow and network of queues. The network information flow model appropriately captures the multi-ho...
Phillipa Gill, Zongpeng Li, Anirban Mahanti, Jingx...
ECCV
2008
Springer
16 years 6 months ago
Finding Actions Using Shape Flows
Abstract. We propose a novel method for action detection based on a new action descriptor called a shape flow that represents both the shape and movement of an object in a holistic...
Hao Jiang, David R. Martin