نتایج جستجو برای: information flow control
تعداد نتایج: 2748403 فیلتر نتایج به سال:
The optimally designed control of quantum systems is playing an increasingly important role to engineer novel and more efficient technologies. Here, in the scenario represented by controlling arbitrary system via interaction with another initialized auxiliary system, we show that channel capacity sets scaling behaviour optimal error. Specifically, prove minimum error ensured maximizing mapping ...
The Workflow Patterns provide a conceptual foundation for the control-flow, data and resource perspectives of process-aware information systems (PAIS). In this paper we present newYAWL, a reference language for PAIS based on the workflow patterns. newYAWL radically extends previous work undertaken on the YAWL language and provides a comprehensive formal description of how the complete set of wo...
The Take Grant Protection Model is a theoretic model of access control that captures the notion of information flow throughout the modelled system. This paper analyzes the problem of sharing information in the context of paths along which information can flow, and presents the number of actors necessary and sufficient to share information, in this model. The results are applied to information f...
Distributed applications are realized by cooperation of multiple objects. Each object is manipulated through a method supported by the object and then the method may further invoke methods of other objects. Purpose-oriented access rules indicate what methods in objects can invoke methods of other objects. Information flow among the objects occurs if the requests and responses of the methods car...
abstractthis study examined information flow on minisett technology among yam farmers in delta state, nigeria. a sample size of 180 respondents was involved in the study. data were obtained from respondents of the study through the use of a validated interview schedule. percentage, frequency count and mean scores were used to summarize data, while line diagrams were used to develop maps of info...
In distributed applications, multiple objects cooperate to achieve some objectives. Each object is manipulated through an operation supported by the object and then the operation may further invoke operations of other objects, i.e. nested operations. Purpose-oriented access rules indicate what operation in each object can invoke operations of other objects. Information flow among the objects oc...
The security of software-intensive systems is frequently attacked. High fines or loss in reputation are potential consequences not maintaining confidentiality, which an important objective. Detecting confidentiality issues early software designs enables cost-efficient fixes. A Data Flow Diagram (DFD) a modeling notation, focuses on essential, functional aspects such designs. Existing analyses D...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید