Sciweavers

1795 search results - page 234 / 359
» Security Models and Information Flow
Sort
View
ITRUST
2004
Springer
14 years 3 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
CCS
1993
ACM
14 years 2 months ago
Why Cryptosystems Fail
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
Ross J. Anderson
ICCV
1999
IEEE
15 years 3 days ago
Fluid Motion Recovery by Coupling Dense and Parametric Vector Fields
In this paper we address the problem of estimating and analyzing the motion in image sequences that involve fluid phenomena. In this context standard motion estimation techniques ...
Étienne Mémin, Patrick Pérez
ISN
1999
Springer
159views Communications» more  ISN 1999»
14 years 2 months ago
Accounting Management in a TINA-Based Service and Network Environment
The ACTS FlowThru project aims to build a management system which supports the flow of management information across organisational and technological domains by reusing components ...
Patrick Hellemans, Cliff Redmond, Koen Daenen, Dav...
WSC
2007
14 years 15 days ago
A test implementation of the core manufacturing simulation data specification
This paper describes an effort of testing the Core Manufacturing Simulation Data (CMSD) information model as a neutral data interface for a discrete event simulation model develop...
Marcus Johansson, Björn Johansson, Anders Sko...