Information flow

Results: 2315



#Item
241Software engineering / Computing / Computer programming / Concurrent programming languages / Dependence analysis / Static program analysis / Information flow / Program slicing / Scope / ALGOL 68 / Variable / XC

A Security Domain Model to Assess Software for Exploitable Covert Channels Alan B. Shaffer Mikhail Auguston

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2008-08-18 13:40:59
242Graph theory / Information theory / Telecommunications / Multi-user MIMO / Radio resource management / Kautz graph / Computer network / Routing / Flow network / Node

cluster_fault_overlay.eps

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2014-07-02 17:37:24
243Broadband / MBI / Broadband universal service / Internet access / Flow / Technology / Public policy / Politics

Last Mile Broadband Expansion in Massachusetts Information for Municipalities March 31, 2015  Project Overview, Roles, and Responsibilities

Add to Reading List

Source URL: broadband.masstech.org

Language: English - Date: 2015-04-03 14:48:59
244

Published in ACSAC’09: Proceedings of the 25th Annual Computer Security Applications Conference, Honolulu, Hawaii, DecemberAnalyzing Information Flow in JavaScript-based Browser Extensions Mohan Dhawan and Vinod

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2010-09-26 13:44:04
    245Accounting / Professional studies / Economy / Asset / Financial statements / Cash flow / Auditing / Cash flow statement / Financial accounting / Fund accounting / Cash and cash equivalents / Net asset value

    FOOTHILL-DE ANZA COMMUNITY COLLEGE DISTRICT COUNTY OF SANTA CLARA LOS ALTOS HILLS, CALIFORNIA FINANCIAL STATEMENTS WITH SUPPLEMENTAL INFORMATION FOR THE YEAR ENDED JUNE 30, 2010

    Add to Reading List

    Source URL: business.fhda.edu

    Language: English - Date: 2015-02-06 17:27:20
    246

    Collaborative Verification of Information Flow for a High-Assurance App Store Michael D. Ernst, René Just, Suzanne Millstein, Werner Dietl*, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros, Ravi Bhoras

    Add to Reading List

    Source URL: homes.cs.washington.edu

    Language: English - Date: 2015-11-15 10:28:43
      247

      On High-Assurance Information-Flow-Secure Programming Languages (Extended Abstract) Toby Murray NICTA and the University of New South Wales, Sydney, Australia Email:

      Add to Reading List

      Source URL: software.imdea.org

      Language: English - Date: 2015-07-09 06:40:16
        248

        What Would Jesus Tweet? Social media is a constant flow of information and opinion. We have immediate access to almost any subject matter, and we can share our thoughts with a push of a button. And we all know that once

        Add to Reading List

        Source URL: web001.rbc.org

        Language: English - Date: 2015-10-05 12:02:48
          249Network theory / Decentralization / Network topology / Flow network / Wireless networking / Mathematics / Distributed data storage / Computing / Applied mathematics

          Pro-Diluvian: Understanding Scoped-Flooding for Content Discovery in Information-Centric Networking Liang Wang, Suzan Bayhan, Jörg Ott, Jussi Kangasharju, Arjuna Sathiaseelan, Jon Crowcroft University of Cambridge, UK

          Add to Reading List

          Source URL: conferences2.sigcomm.org

          Language: English - Date: 2015-10-02 15:11:18
          UPDATE