Sciweavers

6527 search results - page 177 / 1306
» On Typing Information Flow
Sort
View
KBSE
2007
IEEE
14 years 3 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
VISUALIZATION
2003
IEEE
14 years 2 months ago
Effectively Visualizing Multi-Valued Flow Data Using Color and Texture
In this paper we offer several new insights and techniques for effectively using color and texture to simultaneously convey information about multiple 2D scalar and vector distrib...
Timothy Urness, Victoria Interrante, Ivan Marusic,...
GRAPHICSINTERFACE
2008
13 years 10 months ago
Context-controlled flow visualization in augmented reality
A major challenge of novel scientific visualization using Augmented Reality is the accuracy of the user/camera position tracking. Many alternative techniques have been proposed, b...
Mike Eissele, Matthias Kreiser, Thomas Ertl
JSAC
2008
121views more  JSAC 2008»
13 years 9 months ago
Network Coding Games with Unicast Flows
Abstract--To implement network coding, users need to coordinate and cooperate with respect to their strategies in terms of duplicating and transmitting side information across spec...
Jennifer Price, Tara Javidi
PLDI
2005
ACM
14 years 2 months ago
Permission-based ownership: encapsulating state in higher-order typed languages
Today’s module systems do not effectively support information hiding in the presence of shared mutable objects, causing serious problems in the development and evolution of larg...
Neelakantan R. Krishnaswami, Jonathan Aldrich