نتایج جستجو برای: information flow control
تعداد نتایج: 2748403 فیلتر نتایج به سال:
We introduce and analyze a model for decentralized control. The model is broad enough to include problems such as formation control, decentralization of the power grid and flocking. The objective of this paper is twofold. First, we show how the issue of decentralization goes beyond having agents know only part of the state of the system. In fact, we argue that a complete theory of decentralizat...
Recent advances in technologies involved in CNC manufacturing systems have provided industry with the capability to machine complex products. However, there is still no guarantee for these advanced systems to manufacture products to their required specification the first time. This results in large scrap rates of manufactured components and requires skilful resources (human/bespoke solutions) t...
Security in embedded systems such as smartphones requires protection of private data manipulated by third-party applications. Many mechanisms use dynamic taint analysis techniques for tracking information flow in software. But these techniques cannot detect control flows that use conditionals to implicitly transfer information from objects to other objects. In particular, malicious applications...
Secure information flow attempts to verify that programs do not leak information to unauthorized third parties. Previous approaches to secure information flow have considered classical sequential languages and concurrent languages based on channels. In this work, we demonstrate how techniques from secure information flow can be used to verify security properties of structured concurrent workflo...
I n the past decade, there has been an explosion of activity in what we commonly call control experimentation. Even without a definitive statement of what constitutes a control experiment, there can be little doubt that the implementation of control theory on control hardware can have only a positive impact on control engineering and control education. Since the ultimate goal of control theory ...
Preventing the writing of sensitive information to a “low” database variable is insufficient, since the use of locks to synchronize accesses to the database provide a covert channel. In this example, T1 signals to T2 by locking X but not Y. In multilevel databases, this leak is prevented by allowing the low transaction to implicitly pre-empt the high transaction when the latter holds a resource...
Quantitative program analysis involves computing numerical quantities about individual or collections of program executions. An example of such a computation is quantitative information flow analysis, where one estimates the amount of information leaked about secret data through a program’s output channels. Such information can be quantified in several ways, including channel capacity and (Shan...
translators are often recommended to highly observe the natural flow of the target language of the translated texts. the use and order of discoursal aspects of texts such as thematic information, topical elements, left-dislocation, and passive voice, among others, which constitute information structure may sometimes conflict with this viewpoint. it is argued that such discoursal elements are de...
managing the supply chain plays an important role in creating competitive advantages for companies. adequate information flow in supply chain is one of the most important issues in scm. therefore, using certain information systems can have a significant role in managing and integrating data and information within the supply chain. pharmaceutical supply chain is more complex than many other supp...
Quantitative program analysis involves computing numerical quantities about individual or collections of program executions. An example of such a computation is quantitative information flow analysis, where one estimates the amount of information leaked about secret data through a program’s output channels. Such information can be quantified in several ways, including channel capacity and (Shan...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید