Sciweavers

6527 search results - page 16 / 1306
» On Typing Information Flow
Sort
View
SAS
1997
Springer
13 years 11 months ago
Type-Directed Flow Analysis for Typed Intermediate Languages
Suresh Jagannathan, Stephen Weeks, Andrew K. Wrigh...
CSFW
2007
IEEE
13 years 11 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
BIRTHDAY
2006
Springer
13 years 11 months ago
Optimal Flow Distribution Among Multiple Channels with Unknown Capacities
Consider a simple network flow problem in which there are n channels directed from a source to a sink. The channel capacities are unknown and we wish to determine a feasible netwo...
Richard M. Karp, Till Nierhoff, Till Tantau
ICIP
2009
IEEE
14 years 8 months ago
Estimation And Analysis Of Urban Traffic Flow
This paper describes methods for extracting traffic flow information from urban traffic scenes. The ultimate goal is to collect a macroscopic view of traffic flow information in a...