Sciweavers

1795 search results - page 95 / 359
» Security Models and Information Flow
Sort
View
DAC
2006
ACM
16 years 4 months ago
Prediction-based flow control for network-on-chip traffic
Networks-on-Chip (NoC) architectures provide a scalable solution to on-chip communication problem but the bandwidth offered by NoCs can be utilized efficiently only in presence of...
Ümit Y. Ogras, Radu Marculescu
144
Voted
EMMCVPR
2009
Springer
15 years 7 months ago
Reconstructing Optical Flow Fields by Motion Inpainting
An edge-sensitive variational approach for the restoration of optical flow fields is presented. Real world optical flow fields are frequently corrupted by noise, reflection artifac...
Benjamin Berkels, Claudia Kondermann, Christoph S....
122
Voted
NDJFL
2000
79views more  NDJFL 2000»
15 years 3 months ago
An Information-Based Theory of Conditionals
We present an approach to combining three areas of research which we claim are all based on information theory: knowledge representation in Artificial Intelligence and Cognitive Sc...
Wayne Wobcke
108
Voted
CAISE
2006
Springer
15 years 7 months ago
Modeling Airport Security Regulations in Focal
We describe the formal models of two standards related to airport security: one at the international level and the other at the European level. These models are expressed using the...
David Delahaye, Jean-Frédéric &Eacut...
ISW
2007
Springer
15 years 9 months ago
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
Abstract. The concept of timed-released encryption with pre-open capability (TRE-PC) was introduced by Hwang, Yum and Lee. In a TREPC scheme, a message is encrypted in such a way t...
Alexander W. Dent, Qiang Tang