Sciweavers

2079 search results - page 311 / 416
» Quantifying Information Flow
Sort
View
160
Voted
ICFP
2010
ACM
15 years 3 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
138
Voted
CORR
2008
Springer
129views Education» more  CORR 2008»
15 years 2 months ago
Multi Site Coordination using a Multi-Agent System
A new approach of coordination of decisions in a multi site system is proposed. It is based this approach on a multi-agent concept and on the principle of distributed network of e...
Thibaud Monteiro, Daniel Roy, Didier Anciaux
130
Voted
CCR
2005
129views more  CCR 2005»
15 years 2 months ago
The problem of synthetically generating IP traffic matrices: initial recommendations
There exist a wide variety of network design problems that require a traffic matrix as input in order to carry out performance evaluation. The research community has not had at it...
Antonio Nucci, Ashwin Sridharan, Nina Taft
126
Voted
EMNLP
2010
15 years 17 days ago
What a Parser Can Learn from a Semantic Role Labeler and Vice Versa
In many NLP systems, there is a unidirectional flow of information in which a parser supplies input to a semantic role labeler. In this paper, we build a system that allows inform...
Stephen A. Boxwell, Dennis Mehay, Chris Brew
TISSEC
2010
142views more  TISSEC 2010»
14 years 9 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...