Sciweavers

2079 search results - page 348 / 416
» Quantifying Information Flow
Sort
View
WISA
2007
Springer
14 years 1 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
DATE
2006
IEEE
110views Hardware» more  DATE 2006»
14 years 1 months ago
Layout driven data communication optimization for high level synthesis
High level synthesis transformations play a major part in shaping the properties of the final circuit. However, most optimizations are performed without much knowledge of the fina...
Ryan Kastner, Wenrui Gong, Xin Hao, Forrest Brewer...
ICRA
2005
IEEE
97views Robotics» more  ICRA 2005»
14 years 1 months ago
Cognitive Based Neural Prosthetics
– Intense activity in neural prosthetic research has recently demonstrated the possibility of robotic interfaces that respond directly to the nervous system. The question remains...
Richard A. Andersen, Sam Musallam, Joel W. Burdick...
WETICE
2005
IEEE
14 years 1 months ago
Host Behaviour Based Early Detection of Worm Outbreaks in Internet Backbones
We propose a novel near real-time method for early detection of worm outbreaks in high-speed Internet backbones. Our method attributes several behavioural properties to individual...
Thomas Dübendorfer, Bernhard Plattner
GROUP
2005
ACM
14 years 1 months ago
Negotiated rhythms of mobile work: time, place, and work schedules
This study investigates the role of rhythms in the collaborative coordination of mobile work as well as in the individual actors’ comprehension and command of their work. Drawin...
Magnus Nilsson, Morten Hertzum