Sciweavers

58 search results - page 6 / 12
» Secure Information Flow via Linear Continuations
Sort
View
ASIAN
2006
Springer
104views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Closing Internal Timing Channels by Transformation
Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the internal timing covert channel. Information is leaked via this channel when secre...
Alejandro Russo, John Hughes, David A. Naumann, An...
ISCAS
2006
IEEE
93views Hardware» more  ISCAS 2006»
14 years 1 months ago
Radial distribution power flow studies in a remotely distributed environment
—With the continued push toward dispersed generation and distributed intelligent devices throughout the distribution system, a proper analysis method for understanding the operat...
Michael Kleinberg, Karen Miu, Chika O. Nwankpa
AUTOMATICA
2010
167views more  AUTOMATICA 2010»
13 years 7 months ago
A new kernel-based approach for linear system identification
This paper describes a new kernel-based approach for linear system identification of stable systems. We model the impulse response as the realization of a Gaussian process whose s...
Gianluigi Pillonetto, Giuseppe De Nicolao
IJISEC
2008
119views more  IJISEC 2008»
13 years 7 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
SAS
2004
Springer
134views Formal Methods» more  SAS 2004»
14 years 25 days ago
Towards Declarative Programming for Web Services
ness Refinement in Abstract Symbolic Trajectory Evaluation . . . . 38 Mila Dalla Preda Constraint-Based Linear-Relations Analysis . . . . . . . . . . . . . . . . . . . . . . . . ....
Sheila A. McIlraith