Sciweavers

12101 search results - page 141 / 2421
» Mutual Information Analysis
Sort
View
IJNSEC
2007
142views more  IJNSEC 2007»
13 years 8 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
DEBU
2000
125views more  DEBU 2000»
13 years 8 months ago
Link Analysis in Web Information Retrieval
The analysis of the hyperlink structure of the web has led to significant improvements in web information retrieval. This survey describes two successful link analysis algorithms ...
Monika Rauch Henzinger
BPSC
2010
139views Business» more  BPSC 2010»
13 years 7 months ago
Static Information Flow Analysis of Workflow Models
: This paper proposes a framework for the detection of information leaks in workflow descriptions based on static information flow analysis. Despite the correct deployment of acces...
Rafael Accorsi, Claus Wonnemann
SIGMOD
2010
ACM
217views Database» more  SIGMOD 2010»
14 years 1 months ago
Mining knowledge from databases: an information network analysis approach
Most people consider a database is merely a data repository that supports data storage and retrieval. Actually, a database contains rich, inter-related, multi-typed data and infor...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu
ICCSA
2010
Springer
14 years 2 months ago
Geospatial Analysis of Cooperative Works on Asymmetric Information Environment
In the so-called Information-Explosion Era, astronomical amount of information is ubiquitously produced and digitally stored. It is getting more and more convenient for cooperative...
Tetsuya Kusuda, Tetsuro Ogi