Sciweavers

945 search results - page 29 / 189
» Working the Flow
Sort
View
KBSE
2007
IEEE
14 years 2 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
VISUALIZATION
1998
IEEE
13 years 12 months ago
Selective visualization of vortices in hydrodynamic flows
Vortices are important features in many research and engineering fields. Visualization is an important step in gaining more understanding and control of vortices. Vortex detection...
I. Ari Sadarjoen, Frits H. Post, Bing Ma, David C....
ECOOP
2008
Springer
13 years 9 months ago
Flow Analysis of Code Customizations
Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files,...
Anders Hessellund, Peter Sestoft
PRL
2008
356views more  PRL 2008»
13 years 7 months ago
Improving image segmentation by gradient vector flow and mean shift
The classical gradient vector flow (GVF) method suffers from deficiency in the presence of other significant edges adjacent to the real boundary. In this paper, we propose an impr...
Tangwei Liu, Huiyu Zhou, Faquan Lin, Yusheng Pang,...
ISSS
2000
IEEE
144views Hardware» more  ISSS 2000»
14 years 2 days ago
Efficient Hardware Controller Synthesis for Synchronous Dataflow Graph in System Level Design
This paper concerns automatic hardware synthesis from data flow graph (DFG) specification in system level design. In the presented design methodology, each node of a data flow gra...
Hyunuk Jung, Kangnyoung Lee, Soonhoi Ha