Sciweavers

945 search results - page 62 / 189
» Working the Flow
Sort
View
ECSCW
1997
13 years 11 months ago
Supporting the Flow of Information Through Constellations of Interaction
Abstract: In field studies designed to uncover opportunities for computationallyintensive business applications, we observed an interaction pattern we term "constellations&quo...
Tony Salvador, Sara A. Bly
ICASSP
2010
IEEE
13 years 10 months ago
Tracking encrypted VoIP calls via robust hashing of network flows
In this work we propose a Voice over IP (VoIP) call tracking scheme based on robust hashing of VoIP flows. In the proposed scheme the audio content of a possibly encrypted VoIP ...
Baris Coskun, Nasir D. Memon
IJISEC
2007
149views more  IJISEC 2007»
13 years 10 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
JCS
2007
80views more  JCS 2007»
13 years 10 months ago
Secure information flow for a concurrent language with scheduling
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have specified an information flow ty...
Gilles Barthe, Leonor Prensa Nieto
JWSR
2008
162views more  JWSR 2008»
13 years 8 months ago
Business Process Control-Flow Complexity: Metric, Evaluation, and Validation
Organizations are increasingly faced with the challenge of managing business processes, workflows, and recently, Web processes. One important aspect of business processes that has...
Jorge Cardoso