Sciweavers

2259 search results - page 130 / 452
» Separation and information hiding
Sort
View
PLDI
2006
ACM
14 years 4 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
ICIP
2005
IEEE
14 years 11 months ago
Correlation estimation for distributed source coding under information exchange constraints
Distributed source coding (DSC) depends strongly on accurate knowledge of correlation between sources. Previous works have reported capacity-approaching code constructions when ex...
Ngai-Man Cheung, Huisheng Wang, Antonio Ortega
KDD
2009
ACM
172views Data Mining» more  KDD 2009»
14 years 10 months ago
Towards combining web classification and web information extraction: a case study
: ? Towards Combining Web Classification and Web Information Extraction: a Case Study Ping Luo, Fen Lin, Yuhong Xiong, Yong Zhao, Zhongzhi Shi HP Laboratories HPL-2009-86 Classific...
Ping Luo, Fen Lin, Yuhong Xiong, Yong Zhao, Zhongz...
SIGADA
2004
Springer
14 years 3 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
MSS
2000
IEEE
182views Hardware» more  MSS 2000»
14 years 2 months ago
A Blueprint for Representation Information in the OAIS Model
The CEDARS∗ project within UK academia seeks to develop a demonstrator system to recommend techniques for long-term storage of digital data primarily within the research library...
David Holdsworth, Derek M. Sergeant