Sciweavers

1795 search results - page 39 / 359
» Security Models and Information Flow
Sort
View
ECCV
2008
Springer
14 years 9 months ago
A Segmentation Based Variational Model for Accurate Optical Flow Estimation
Segmentation has gained in popularity in stereo matching. However, it is not trivial to incorporate it in optical flow estimation due to the possible non-rigid motion problem. In t...
Li Xu, Jianing Chen, Jiaya Jia
LANMR
2004
13 years 9 months ago
Reasoning about Lava effusion: From Geographical Information Systems to Answer Set Programming
Abstract. This article describes our implementation in Answer Set Programming of a reasoning system that models the flow of lava in volcanic eruptions. Our system can be employed i...
Isabella Cattinelli, Maria Luisa Damiani, Andrea N...
CSFW
2004
IEEE
13 years 11 months ago
Enforcing Robust Declassification
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
IEEEARES
2009
IEEE
14 years 2 months ago
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory locations during program execution. Most implementat...
Hyung Chan Kim, Angelos D. Keromytis, Michael Covi...
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 7 months ago
Liberalizing Dependency
Abstract. The dependency core calculus (DCC), a simple extension of the computational lambda calculus, captures a common notion of dependency that arises in many programming langua...
Avik Chaudhuri