نتایج جستجو برای: information flow control

تعداد نتایج: 2748403  

Journal: :CoRR 2011
Mohamed-Ali Belabbas

We introduce and analyze a model for decentralized control. The model is broad enough to include problems such as formation control, decentralization of the power grid and flocking. The objective of this paper is twofold. First, we show how the issue of decentralization goes beyond having agents know only part of the state of the system. In fact, we argue that a complete theory of decentralizat...

2009
Sanjeev Kumar Stephen T. Newman Aydin Nassehi Parag Vichare Manoj Kumar Tiwari

Recent advances in technologies involved in CNC manufacturing systems have provided industry with the capability to machine complex products. However, there is still no guarantee for these advanced systems to manufacture products to their required specification the first time. This results in large scrap rates of manufactured components and requires skilful resources (human/bespoke solutions) t...

2014
Mariem Graa Nora Cuppens-Boulahia Frédéric Cuppens Ana R. Cavalli

Security in embedded systems such as smartphones requires protection of private data manipulated by third-party applications. Many mechanisms use dynamic taint analysis techniques for tracking information flow in software. But these techniques cannot detect control flows that use conditionals to implicitly transfer information from objects to other objects. In particular, malicious applications...

2009
Adrian Quark

Secure information flow attempts to verify that programs do not leak information to unauthorized third parties. Previous approaches to secure information flow have considered classical sequential languages and concurrent languages based on channels. In this work, we demonstrate how techniques from secure information flow can be used to verify security properties of structured concurrent workflo...

2001
Jacob Apkarian

I n the past decade, there has been an explosion of activity in what we commonly call control experimentation. Even without a definitive statement of what constitutes a control experiment, there can be little doubt that the implementation of control theory on control hardware can have only a positive impact on control engineering and control education. Since the ultimate goal of control theory ...

2011
Dominic Duggan Ye Wu

Preventing the writing of sensitive information to a “low” database variable is insufficient, since the use of locks to synchronize accesses to the database provide a covert channel. In this example, T1 signals to T2 by locking X but not Y. In multilevel databases, this leak is prevented by allowing the low transaction to implicitly pre-empt the high transaction when the latter holds a resource...

2014
Daniel J. Fremont Sanjit A. Seshia

Quantitative program analysis involves computing numerical quantities about individual or collections of program executions. An example of such a computation is quantitative information flow analysis, where one estimates the amount of information leaked about secret data through a program’s output channels. Such information can be quantified in several ways, including channel capacity and (Shan...

Journal: :پژوهش ادبیات معاصر جهان 0
حسین شکوهی

translators are often recommended to highly observe the natural flow of the target language of the translated texts. the use and order of discoursal aspects of texts such as thematic information, topical elements, left-dislocation, and passive voice, among others, which constitute information structure may sometimes conflict with this viewpoint. it is argued that such discoursal elements are de...

Journal: :iranian journal of pharmaceutical research 0
nazila yousefi shahid beheshti university of medical sciences ahmad alibabaei shahid beheshti university of medical sciences and health services

managing the supply chain plays an important role in creating competitive advantages for companies. adequate information flow in supply chain is one of the most important issues in scm. therefore, using certain information systems can have a significant role in managing and integrating data and information within the supply chain. pharmaceutical supply chain is more complex than many other supp...

2014
Philipp Rümmer Christoph M. Wintersteiger Daniel J. Fremont Sanjit A. Seshia

Quantitative program analysis involves computing numerical quantities about individual or collections of program executions. An example of such a computation is quantitative information flow analysis, where one estimates the amount of information leaked about secret data through a program’s output channels. Such information can be quantified in several ways, including channel capacity and (Shan...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید