Gotowa bibliografia na temat „Information flow”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Information flow”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Information flow"

1

Mygal, Valeriy, i Galyna Mygal. "Problems of Digitized Information Flow Analysis: Cognitive Aspects". Information & Security: An International Journal 43, nr 2 (2019): 134–44. http://dx.doi.org/10.11610/isij.4312.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Gruska, Damas P. "Information Flow Testing". Fundamenta Informaticae 128, nr 1-2 (2013): 81–95. http://dx.doi.org/10.3233/fi-2013-934.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ahlswede, R., Ning Cai, S. Y. R. Li i R. W. Yeung. "Network information flow". IEEE Transactions on Information Theory 46, nr 4 (lipiec 2000): 1204–16. http://dx.doi.org/10.1109/18.850663.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Carlowicz, Michael. "Flow of information". Eos, Transactions American Geophysical Union 77, nr 27 (2.07.1996): 254. http://dx.doi.org/10.1029/eo077i027p00254-02.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Godlee, F. "Global information flow". BMJ 321, nr 7264 (30.09.2000): 776–77. http://dx.doi.org/10.1136/bmj.321.7264.776.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Godlee, Fiona, Richard Horton i Richard Smith. "Global information flow". Lancet 356, nr 9236 (wrzesień 2000): 1129–30. http://dx.doi.org/10.1016/s0140-6736(00)02752-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Beraia, M., i G. Beraia. "Energy/information dissipation and blood flow in human body". Cardiology Research and Reports 3, nr 2 (10.05.2021): 01–08. http://dx.doi.org/10.31579/2692-9759/017.

Pełny tekst źródła
Streszczenie:
The amount of work done to displace blood in systemic arteries and capillaries exceeds the work done by the left ventricle. Besides, at the heartbeat, electromagnetic energy dissipates from the heart to the whole human body. For the problem study, the dielectric spectroscopy method was used. Ringer’s, amino acid solution, and heparinized venous blood were affected by the external electromagnetic oscillations (100-65000Hz, 1-8MHz.) in 17 healthy individuals. Correlations were noted between the initial and induced signal forms/frequencies according to the impedance of the system. The electric impulse from the heart initiates an oscillating electric field around the charged cells/particles and an emerging repulsing electromagnetic force, based on the electroacoustic phenomena, promotes the blood flow, in addition to the pulse pressure from the myocardial contraction. Blood conduces mechanical, electromagnetic waves of different frequencies and transmits energy/information to implement the spontaneous chemical processes in the human body.
Style APA, Harvard, Vancouver, ISO itp.
8

McCamant, Stephen, i Michael D. Ernst. "Quantitative information flow as network flow capacity". ACM SIGPLAN Notices 43, nr 6 (30.05.2008): 193–205. http://dx.doi.org/10.1145/1379022.1375606.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Hongladarom, Soraj. "Information Divide, Information Flow and Global Justice". International Review of Information Ethics 7 (1.09.2007): 77–81. http://dx.doi.org/10.29173/irie8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Hu, Wei, Armaiti Ardeshiricham i Ryan Kastner. "Hardware Information Flow Tracking". ACM Computing Surveys 54, nr 4 (maj 2021): 1–39. http://dx.doi.org/10.1145/3447867.

Pełny tekst źródła
Streszczenie:
Information flow tracking (IFT) is a fundamental computer security technique used to understand how information moves through a computing system. Hardware IFT techniques specifically target security vulnerabilities related to the design, verification, testing, manufacturing, and deployment of hardware circuits. Hardware IFT can detect unintentional design flaws, malicious circuit modifications, timing side channels, access control violations, and other insecure hardware behaviors. This article surveys the area of hardware IFT. We start with a discussion on the basics of IFT, whose foundations were introduced by Denning in the 1970s. Building upon this, we develop a taxonomy for hardware IFT. We use this to classify and differentiate hardware IFT tools and techniques. Finally, we discuss the challenges yet to be resolved. The survey shows that hardware IFT provides a powerful technique for identifying hardware security vulnerabilities, as well as verifying and enforcing hardware security properties.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Information flow"

1

Heusser, Jonathan. "Automating quantitative information flow". Thesis, Queen Mary, University of London, 2011. http://qmro.qmul.ac.uk/xmlui/handle/123456789/1260.

Pełny tekst źródła
Streszczenie:
Unprecedented quantities of personal and business data are collected, stored, shared, and processed by countless institutions all over the world. Prominent examples include sharing personal data on social networking sites, storing credit card details in every store, tracking customer preferences of supermarket chains, and storing key personal data on biometric passports. Confidentiality issues naturally arise from this global data growth. There are continously reports about how private data is leaked from confidential sources where the implications of the leaks range from embarrassment to serious personal privacy and business damages. This dissertation addresses the problem of automatically quantifying the amount of leaked information in programs. It presents multiple program analysis techniques of different degrees of automation and scalability. The contributions of this thesis are two fold: a theoretical result and two different methods for inferring and checking quantitative information flows are presented. The theoretical result relates the amount of possible leakage under any probability distribution back to the order relation in Landauer and Redmond’s lattice of partitions [35]. The practical results are split in two analyses: a first analysis precisely infers the information leakage using SAT solving and model counting; a second analysis defines quantitative policies which are reduced to checking a k-safety problem. A novel feature allows reasoning independent of the secret space. The presented tools are applied to real, existing leakage vulnerabilities in operating system code. This has to be understood and weighted within the context of the information flow literature which suffers under an apparent lack of practical examples and applications. This thesis studies such “real leaks” which could influence future strategies for finding information leaks.
Style APA, Harvard, Vancouver, ISO itp.
2

Zhang, Xiang. "Efficiency in Emergency medical service system : An analysis on information flow". Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1620.

Pełny tekst źródła
Streszczenie:

In an information system which includes plenty of information services, we are always seeking a solution to enhance efficiency and reusability. Emergency medical service system is a classic information system using application integration in which the requirement of information flow transmissions is extremely necessary. We should always ensure this system is running in best condition with highest efficiency and reusability since the efficiency in the system directly affects human life.

The aim of this thesis is to analysis emergency medical system in both qualitative and quantitative ways. Another aim of this thesis is to suggest a method to judge the information flow through the analysis for the system efficiency and the correlations between information flow traffic and system applications.

The result is that system is a main platform integrated five information services. Each of them provides different unattached functions while they are all based on unified information resources. The system efficiency can be judged by a method called Performance Evaluation, the correlation can be judged by multi-factorial analysis of variance method.

Style APA, Harvard, Vancouver, ISO itp.
3

Aksakal, Baris. "Makeshift Information Constructions: Information Flow and Undercover Police". Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4823/.

Pełny tekst źródła
Streszczenie:
This dissertation presents the social virtual interface (SVI) model, which was born out of a need to develop a viable model of the complex interactions, information flow and information seeking behaviors among undercover officers. The SVI model was created from a combination of various philosophies and models in the literature of information seeking, communication and philosophy. The questions this research paper answers are as follows: 1. Can we make use of models and concepts familiar to or drawn from Information Science to construct a model of undercover police work that effectively represents the large number of entities and relationships? and 2. Will undercover police officers recognize this model as realistic? This study used a descriptive qualitative research method to examine the research questions. An online survey and hard copy survey were distributed to police officers who had worked in an undercover capacity. In addition groups of officers were interviewed about their opinion of the SVI model. The data gathered was analyzed and the model was validated by the results of the survey and interviews.
Style APA, Harvard, Vancouver, ISO itp.
4

Enescu, Mihai Adrian. "Precisely quantifying software information flow". Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/57379.

Pełny tekst źródła
Streszczenie:
A common attack point in a program is the input exposed to the user. The adversary crafts a malicious input that alters some internal state of the program, in order to acquire sensitive data, or gain control of the program's execution. One can say that the input exerts a degree of influence over specific program outputs. Although a low degree of influence does not guarantee the program's resistance to attacks, previous work has argued that a greater degree of influence tends to provide an adversary with an easier avenue of attack, indicating a potential security vulnerability. Quantitative information flow is a framework that has been used to detect a class of security flaws in programs, by measuring an attacker's influence. Programs may be considered as communication channels between program inputs and outputs, and information-theoretic definitions of information leakage may be used in order to measure the degree of influence which a program's inputs can have over its outputs, if the inputs are allowed to vary. Unfortunately, the precise information flow measured by this definition is difficult to compute, and prior work has sacrificed precision, scalability, and/or automation. In this thesis, I show how to compute this information flow (specifically, channel capacity) in a highly precise and automatic manner, and scale to much larger programs than previously possible. I present a tool, nsqflow, that is built on recent advances in symbolic execution and SAT solving. I use this tool to discover two previously-unknown buffer overflows. Experimentally, I demonstrate that this approach can scale to over 10K lines of real C code, including code that is typically difficult for program analysis tools to analyze, such as code using pointers.
Science, Faculty of
Computer Science, Department of
Graduate
Style APA, Harvard, Vancouver, ISO itp.
5

Zhu, Ping. "Quantifying information flow with constraints". Thesis, City University London, 2010. http://openaccess.city.ac.uk/12101/.

Pełny tekst źródła
Streszczenie:
Quantifying flow of information in a program involves calculating how much information (e.g. about secret inputs) can be leaked by observing the program's public outputs. Recently this field has attracted a lot of research interest, most of which makes use of Shannon's information theory, e.g. mutual information, conditional entropy, etc. Computability entails that any automated analysis of information is necessarily incomplete. Thus quantitative flow of analyses aim to compute upper bounds on the sizes of the flows in a program. Virtually all the current quantitative analyses treat program variables independently, which significantly limits the potential for deriving tight upper bounds. Our work is motivated by the intuition that knowledge of the dependencies between program variables should allow the derivation of more precise upper bounds on the size of flows, and that classical abstract interpretation provides an effective mechanism for determining such dependencies in the form of linear constraints. Our approach is then to view the problem as one of constrained optimization (maximum entropy), allowing us to apply the standard technique of Lagrange multiplier method. Application of this technique turns out to require development of some novel methods due to the essential use of non-linear (entropy) constraints, in conjunction with the linear dependency constraints. Using these methods we obtain more precise upper bounds on the size of information flows than is possible with existing analysis techniques.
Style APA, Harvard, Vancouver, ISO itp.
6

Moses, John. "Cohesion prediction using information flow". Thesis, University of Sunderland, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.387492.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Payne, Joshua. "Interaction Topologies and Information Flow". ScholarWorks @ UVM, 2009. http://scholarworks.uvm.edu/graddis/177.

Pełny tekst źródła
Streszczenie:
Networks are ubiquitous, underlying systems as diverse as the Internet, food webs, societal interactions, the cell, and the brain. Of crucial importance is the coupling of network structure with system dynamics, and much recent attention has focused on how information, such as pathogens, mutations, or ideas, ow through networks. In this dissertation, we advance the understanding of how network structure a ects information ow in two important classes of models. The rst is an independent interaction model, which is used to investigate the propagation of advantageous alleles in evolutionary algorithms. The second is a threshold model, which is used to study the dissemination of ideas, fads, and innovations throughout populations. This journal-format dissertation comprises three interrelated studies, in which we investigate the in uence of network structure on the dynamical properties of information ow. In the rst study, we develop an analytical technique to approximate system dynamics in arbitrarily structured regular interaction topologies. In the second study, we investigate the ow of advantageous alleles in degree-correlated scale-free population structures, and provide a simple topological metric for assessing the selective pressures induced by these networks. In the third study, we characterize the conditions in which global information cascades occur in threshold models of binary decisions with externalities, structured on degree-correlated Poisson-distributed random networks.
Style APA, Harvard, Vancouver, ISO itp.
8

Alhalalat, Saleh Ismail. "Information flow in virtual organisations". Thesis, Loughborough University, 2005. https://dspace.lboro.ac.uk/2134/7757.

Pełny tekst źródła
Streszczenie:
The main aim of the study is to investigate the flows of information and the impact and added value of Information and Communication Technologies (ICTs) on the integration of information flows. This concept is related to the optimal design of organisational (and other) systems that allow the right decision to be made by the right person at the right time in an appropriate location. Clearly, information that is often distributed needs to come together in an efficient way to allow the best use of resources to maximize the information value. The virtual organisation (VO) is a new style of working that allows completion of tasks across time and location. The use of ICTs is viewed as a facilitator of these tasks and their application provides good examples to extend their use. The most common types of VOs are home offices, teleworking centres, mobile offices and `hotelling'. Teleworkers still face several problems, such as managing their work, lack of appropriate communications to complete their work efficiently, and isolation. This study applied an information-driven approach to investigate the current problems in the teleworking environment, and solutions are proposed to improve the flow of information in the VOs. The data required were collected by questionnaire survey, semi-structured interviews, and document analysis. Members of the Telework Association (TCA) in the UK were invited to take part in this survey, and 153 out of 800 respondents came from this source. From subsequent analysis of the data collected, there is indeed an issue with the use and integration of information flows in VOs. An in depth study of six individual cases revealed a lack of information sharing, poor understanding of information needs, and low rates of access to online information. Soft solutions can be achieved through understanding information needs, developing information policy, and training. Hard solutions can be achieved through using online information, using workflow software, upgrading the speed of Internet connection, using information sharing systems, and arranging more open access to information. Some indicators of future research can be mentioned, particularly in conducting the second generation of information audit in teleworking practice, to study knowledge management (KM) practices in teleworking, to develop information policies to enhance teleworking practices, to focus on the information needs of teleworkers, to evaluate the impact of software applications (such as workflow software), to implement information sharing systems, and to study the impact of training on information retrieval and use.
Style APA, Harvard, Vancouver, ISO itp.
9

Salvini, Fabio <1992&gt. "Flow logic based information flow analysis of Android applications". Master's Degree Thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/12996.

Pełny tekst źródła
Streszczenie:
Android is the world's most popular mobile OS, with more than 2 billion monthly active devices. Static analysis is an essential tool to protect the sensitive data stored in the devices from malicious applications. In this thesis, we present the first flow logic for the information flow analysis of Dalvik bytecode that is specifically tailored to the peculiar lifecycle of Android applications. A prototype implementation based on a state-of-the-art SMT solver demonstrates the practicality of our approach.
Style APA, Harvard, Vancouver, ISO itp.
10

Bhatia, Shishir. "Structured Information Flow (SIF) Framework for Automating End-to-End Information Flow for Large Organizations". Thesis, Virginia Tech, 2006. http://hdl.handle.net/10919/31148.

Pełny tekst źródła
Streszczenie:
For almost five decades, since the advent of the first computers for commercial use, the dream of the Paperless Office, a.k.a. total Information flow automation, has eluded the industry. Now, with the emergence of Internet- and Web-based technologies, daily we see examples of organizations like eBay and Amazon that perform their business in a fully automated manner without the use of paper or pen. However, bigger and older organizations that have more complex functions, like government organizations, have not been very successful in harnessing the latest technological innovations to completely automate their Information flow. We propose a Structured Information Flow (SIF) framework that provides the conceptual infrastructure to automate small and big, new and old organizations alike. The ease of the transformation is due to three key features of SIF that set it apart from any other Information flow automation scheme. First, SIF utilizes the attributes of the organization, such as the existing reporting structure, to model the automated Information flow. The rules governing the flow of Information are based on the hierarchy already in place, for example: A senior can view any Information owned by any of his/her direct subordinates. Second, SIF characterizes external organization entities as a special case of internal organization entities, allowing for seamless integration of the Information flow to and from them. Third, the SIF framework is independent of platform, method, organization, or technology. This gives it a generic nature that makes it applicable as a platform to implement multiple types of automated e-systems such as e-commerce, e-education, e-training, e-governance, etc. In this body of work, we formally define the SIF framework using state transformation language and a visual representation scheme specifically developed for this purpose. We also define the Information Interfaces, which are the mechanism for implementing rules- and constraint-based Information flow in SIF.
Master of Science
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Information flow"

1

van, Eijck J., i Visser Albert, red. Logic and information flow. Cambridge, Mass: MIT Press, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Abramsky, Samson, i Michael Mislove, red. Mathematical Foundations of Information Flow. Providence, Rhode Island: American Mathematical Society, 2012. http://dx.doi.org/10.1090/psapm/071.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Wix, Jeffrey. Information flow in building services. Bracknell: Building Services Research and Information Association, 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Third World Cultural and Information Services Coop. International flow of cultural information. Paris: Division of Study and Planning of Development, Unesco, 1987.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Silva, Flávio Soares Corrêa da. i Agustí i. Cullell Jaume, red. Information flow and knowledge sharing. Amsterdam: Elsevier, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Freedom of information reform in China: Information flow analysis. Milton Park, Abingdon, Oxon: Routledge, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Alvim, Mário S., Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi i Geoffrey Smith. The Science of Quantitative Information Flow. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-96131-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Dretske, Fred I. Knowledge and the flow of information. Stanford, CA: CSLI Publications, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Hillairet, Caroline. Portfolio optimization with different information flow. London [England]: ISTE Press Ltd, 2017.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Zavou, Angeliki. Information Flow Auditing in the Cloud. [New York, N.Y.?]: [publisher not identified], 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Information flow"

1

Tranquillo, Joe. "Information Flow". W An Introduction to Complex Systems, 175–214. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02589-2_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Palamidessi, Catuscia, Mário S. Alvim i Miguel E. Andrés. "Interactive Information Flow". W Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 111. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Le Guernic, Gurvan. "Information Flow Testing". W Lecture Notes in Computer Science, 33–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-76929-3_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Scheben, Christoph, i Simon Greiner. "Information Flow Analysis". W Lecture Notes in Computer Science, 453–71. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49812-6_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Töws, Manuel, i Heike Wehrheim. "Information Flow Certificates". W Theoretical Aspects of Computing – ICTAC 2018, 435–54. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02508-3_23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Rabehaja, Tahiry, Annabelle McIver, Carroll Morgan i Georg Struth. "Categorical Information Flow". W The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, 329–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31175-9_19.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Weik, Martin H. "information flow control". W Computer Science and Communications Dictionary, 775. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8931.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Bangsow, Steffen. "Information Flow Objects". W Manufacturing Simulation with Plant Simulation and SimTalk, 183–221. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-05074-9_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Nielson, Flemming, i Hanne Riis Nielson. "Lightweight Information Flow". W Models, Languages, and Tools for Concurrent and Distributed Programming, 455–70. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21485-2_25.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Bangsow, Steffen. "Information Flow, Controls". W Tecnomatix Plant Simulation, 181–272. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41544-0_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Information flow"

1

Sekar, R. "Information Flow". W CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3411502.3418421.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Alvim, Mário S., Miguel E. Andrés i Catus Palamidessi. "Probabilistic Information Flow". W 2010 25th Annual IEEE Symposium on Logic in Computer Science (LICS 2010). IEEE, 2010. http://dx.doi.org/10.1109/lics.2010.53.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Pasquier, Thomas F. J. M., Jean Bacon i David Eyers. "FlowK: Information Flow Control for the Cloud". W 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2014. http://dx.doi.org/10.1109/cloudcom.2014.11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Colmenero, Gerardo, i David Goldstein. "Turbulent Boundary Layer Control Using Wall Information". W 2nd AIAA Flow Control Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2004. http://dx.doi.org/10.2514/6.2004-2116.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Chen, Haibo, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huang i Pen-chung Yew. "Control flow obfuscation with information flow tracking". W the 42nd Annual IEEE/ACM International Symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1669112.1669162.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

McCamant, Stephen, i Michael D. Ernst. "Quantitative information flow as network flow capacity". W the 2008 ACM SIGPLAN conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1375581.1375606.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

"Publisher's Information". W 2013 Data-Flow Execution Models for Extreme Scale Computing (DFM). IEEE, 2013. http://dx.doi.org/10.1109/dfm.2013.20.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

"Publisher's Information". W 2012 Data-Flow Execution Models for Extreme Scale Computing (DFM). IEEE, 2012. http://dx.doi.org/10.1109/dfm.2012.9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Li, Hanbing, Isabelle Puaut i Erven Rohou. "Traceability of Flow Information". W the 22nd International Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2659787.2659805.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Guttman, Joshua. "Information Flow and Invariance". W 1987 IEEE Symposium on Security and Privacy. IEEE, 1987. http://dx.doi.org/10.1109/sp.1987.10022.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Information flow"

1

Quittek, J., S. Bryant, B. Claise, P. Aitken i J. Meyer. Information Model for IP Flow Information Export. RFC Editor, styczeń 2008. http://dx.doi.org/10.17487/rfc5102.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Claise, B., i B. Trammell, red. Information Model for IP Flow Information Export (IPFIX). RFC Editor, wrzesień 2013. http://dx.doi.org/10.17487/rfc7012.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

McLean, John. Security Models and Information Flow. Fort Belvoir, VA: Defense Technical Information Center, styczeń 1990. http://dx.doi.org/10.21236/ada462529.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Boschi, E., B. Trammell, L. Mark i T. Zseby. Exporting Type Information for IP Flow Information Export (IPFIX) Information Elements. RFC Editor, lipiec 2009. http://dx.doi.org/10.17487/rfc5610.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Trammell, B., i E. Boschi. Bidirectional Flow Export Using IP Flow Information Export (IPFIX). RFC Editor, styczeń 2008. http://dx.doi.org/10.17487/rfc5103.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Aitken, P. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information. Redaktorzy B. Claise i B. Trammell. RFC Editor, wrzesień 2013. http://dx.doi.org/10.17487/rfc7011.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Sadasivan, G., N. Brownlee, B. Claise i J. Quittek. Architecture for IP Flow Information Export. RFC Editor, marzec 2009. http://dx.doi.org/10.17487/rfc5470.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Zseby, T., E. Boschi, N. Brownlee i B. Claise. IP Flow Information Export (IPFIX) Applicability. RFC Editor, marzec 2009. http://dx.doi.org/10.17487/rfc5472.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Trammell, B., A. Wagner i B. Claise. Flow Aggregation for the IP Flow Information Export (IPFIX) Protocol. RFC Editor, wrzesień 2013. http://dx.doi.org/10.17487/rfc7015.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Claise, B., red. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information. RFC Editor, styczeń 2008. http://dx.doi.org/10.17487/rfc5101.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii