Results 271 to 280 of about 2,992,402 (305)
Some of the next articles are maybe not open access.
Security and privacy of data flows
Proceedings of the May 19-22, 1980, national computer conference on - AFIPS '80, 1980The development of transnational computer-communication systems and the associated flows of computer data across international borders have created a number of issues and problems: privacy and security of personal data, non-tariff restrictions, concerns over potential erosion of national sovereignty, protectionism, and so forth.
openaire +1 more source
1991
This paper explains, by example, how to translate a data flow diagram into an outline Z [1] specification, and also how to generate a data flow diagram from a Z specification. Data flow diagrams are widely used by structured methods, including Structured Systems Analysis and Design Method (SSADM) [2].
openaire +1 more source
This paper explains, by example, how to translate a data flow diagram into an outline Z [1] specification, and also how to generate a data flow diagram from a Z specification. Data flow diagrams are widely used by structured methods, including Structured Systems Analysis and Design Method (SSADM) [2].
openaire +1 more source
Proceedings of the 16th annual Southeast regional conference on - ACM-SE 16, 1978
openaire +1 more source
openaire +1 more source
Why are My Flows Different? A Tutorial on Flow Exporters
IEEE Communications Surveys and Tutorials, 2020Gernot Vormayr, Tanja Zseby
exaly
Computational flow cytometry: helping to make sense of high-dimensional immunology data
Nature Reviews Immunology, 2016Yvan Saeys +2 more
exaly

