Sciweavers

945 search results - page 26 / 189
» Working the Flow
Sort
View
ENTCS
2006
145views more  ENTCS 2006»
13 years 7 months ago
A Classification of Time and/or Probability Dependent Security Properties
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial studnformation ...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
RE
2008
Springer
13 years 7 months ago
Information Brokers in Requirement-Dependency Social Networks
Requirements interdependencies create technical dependencies among project members that generally belong to different functional groups in an organization, but who need to coordin...
Sabrina Marczak, Daniela Damian, Ulrike Stege, Adr...
CCGRID
2003
IEEE
14 years 1 months ago
GridFlow: Workflow Management for Grid Computing
Grid computing is becoming a mainstream technology for large-scale distributed resource sharing and system integration. Workflow management is emerging as one of the most importan...
Junwei Cao, Stephen A. Jarvis, Subhash Saini, Grah...
ACSAC
2007
IEEE
13 years 11 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon
ICCS
2009
Springer
13 years 5 months ago
Two-Dimensional Micro-Hartmann Gas Flows
Abstract. We analyze and simulate a near continuum MagnetoGasDynamic(MGD) flow inside a two-dimensional microchannel with a low magnetic Reynolds number assumption. Complex physics...
Chunpei Cai, Khaleel R. A. Khasawneh