Sciweavers

6293 search results - page 34 / 1259
» Information Flow Testing
Sort
View
ICFEM
1997
Springer
13 years 11 months ago
Refinement of Information Flow Architectures
A calculus is presented for the stepwise refinement of abstract information flow architectures. We give a mathematical model for information flow components based on relations bet...
Jan Philipps, Bernhard Rumpe
FGR
2002
IEEE
175views Biometrics» more  FGR 2002»
14 years 17 days ago
On Modeling Variations for Face Authentication
In this paper, we present a scheme for face authentication in the presence of variations. To deal with variations, such as facial expressions and registration errors, with which t...
Xiaoming Liu 0002, Tsuhan Chen, B. V. K. Vijaya Ku...
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 1 months ago
Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks
Abstract - The RoQ (Reduction-of-Quality) attacks are lowrate DDoS attacks that degrade the QoS to end systems stealthily but not to deny the services completely. These attacks are...
Yu Chen, Kai Hwang
ICIS
2003
13 years 9 months ago
Leveraging Information Sharing to Increase Supply Chain Configurability
As supply chains evolve beyond the confines of individual organizations, collaboration has become the Holy Grail in supply chain technology. It plays a key role in achieving flexi...
Emily "Rong" Liu, Akhil Kumar
ESOP
2007
Springer
13 years 11 months ago
A Certified Lightweight Non-interference Java Bytecode Verifier
Non-interference is a semantical condition on programs that guarantees the absence of illicit information flow throughout their execution, and that can be enforced by appropriate i...
Gilles Barthe, David Pichardie, Tamara Rezk