Sciweavers

739 search results - page 40 / 148
» Information Flow in Credential Systems
Sort
View
BILDMED
2008
212views Algorithms» more  BILDMED 2008»
13 years 9 months ago
3D Blood Flow Reconstruction from 2D Angiograms
A method for 3-d blood flow reconstruction is presented. Given a 3-d volume of a vessel tree and a 2-d sequence of angiograms, the propagation information can be back-projected int...
Esther-Sabrina Platzer, Frank Deinzer, Dietrich Pa...
DSN
2006
IEEE
14 years 1 months ago
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems
Embedded control systems consist of multiple components with different criticality levels interacting with each other. For example, in a passenger jet, the navigation system inter...
Sumant Kowshik, Grigore Rosu, Lui Sha
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 7 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
INTELLCOMM
2004
Springer
14 years 1 months ago
Inferring Presence in a Context-Aware Instant Messaging System
Abstract. The increasing volume of digital communication is raising new challenges in the management of the information flow. We discuss the usage of context to infer presence info...
Mikko Perttunen, Jukka Riekki
ENTCS
2006
145views more  ENTCS 2006»
13 years 7 months ago
A Classification of Time and/or Probability Dependent Security Properties
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial studnformation ...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...