Sciweavers

722 search results - page 33 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
CORR
2004
Springer
133views Education» more  CORR 2004»
13 years 9 months ago
Information theory, multivariate dependence, and genetic network inference
We define the concept of dependence among multiple variables using maximum entropy techniques and introduce a graphical notation to denote the dependencies. Direct inference of in...
Ilya Nemenman
CJ
2010
150views more  CJ 2010»
13 years 7 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
ICYCS
2008
IEEE
14 years 4 months ago
The Practice of Remote Education on Information Security
With the rapid development of computer science, its education mode also changes a lot. Teaching and learning are not restricted by the physical distance with the help of the netwo...
Wei Hu, Gang Wang, Qingsong Shi, Tianzhou Chen
JCIT
2007
62views more  JCIT 2007»
13 years 9 months ago
Identification of Economic Cluster with Information Gain Method, based on Input-Output Tables
In this paper, we propose a more flexible “economic cluster identification” approach to analyzing the domestic I/O flows of intermediary goods and service that is based on inf...
Bae Sangbin, Moon Kyungil
CONCUR
2010
Springer
13 years 11 months ago
Information Flow in Interactive Systems
Abstract. We consider the problem of defining the information leakage in interactive systems where secrets and observables can alternate during the computation. We show that the in...
Mário S. Alvim, Miguel E. Andrés, Ca...