Results 31 to 40 of about 5,907,803 (347)
Embedding covert information flow [PDF]
The problem of embedding a covert information flow in independent renewal cover traffic is considered. Such embedding provides maximum anonymity against traffic analysis. The maximum embedding efficiency is characterized, and an accurate approximation is obtained by formulating the problem as a Riemann-Hilbert boundary value problem.
MARANO, Stefano +2 more
openaire +2 more sources
Secure information flow connections
Denning's lattice model provided secure information flow analyses with an intuitive mathematical foundation: the lattice ordering determines permitted flows. We examine how this framework may be extended to support the flow of information between autonomous organisations, each employing possibly quite different security lattices and information flow ...
Chandrika Bhardwaj, Sanjiva Prasad
openaire +2 more sources
Characteristics of a nanosecond pulsed sliding discharge plasma actuator at low pressure
The behavior of a nanosecond pulsed sliding discharge plasma actuator with the ambient pressure from 27 to 101 kPa is experimentally investigated. The electric characteristics, discharge morphologies, and surface temperature distribution of the actuator ...
Qijie Sun +5 more
doaj +1 more source
A Methodology for Information Flow Experiments [PDF]
Information flow analysis has largely ignored the setting where the analyst has neither control over nor a complete model of the analyzed system. We formalize such limited information flow analyses and study an instance of it: detecting the usage of data
Datta, Amit +3 more
core +1 more source
Aerodynamic Sensitivity Analysis for a Wind Turbine Airfoil in an Air-Particle Two-Phase Flow
In this paper, the Navier-Stokes equations coupled with a Lagrangian discrete phase model are described to simulate the air-particle flows over the S809 airfoil of the Phase VI blade, the NH6MW25 airfoil of a 6 MW wind turbine blade and the NACA0012 ...
Tongqing Guo +4 more
doaj +1 more source
Directed Flow of Information in Chimera States [PDF]
We investigated interactions within chimera states in a phase oscillator network with two coupled subpopulations. To quantify interactions within and between these subpopulations, we estimated the corresponding (delayed) mutual information that -- in ...
Battaglia, Demian +3 more
core +6 more sources
Liquid information flow control
We present Lifty, a domain-specific language for data-centric applications that manipulate sensitive data. A Lifty programmer annotates the sources of sensitive data with declarative security policies, and the language statically and automatically verifies that the application handles the data according to the policies. Moreover, if verification fails,
Polikarpova, Nadia +5 more
openaire +4 more sources
Network Information Flow in Small World Networks [PDF]
Recent results from statistical physics show that large classes of complex networks, both man-made and of natural origin, are characterized by high clustering properties yet strikingly short path lengths between pairs of nodes. This class of networks are
Barros, Joao, Costa, Rui A.
core +2 more sources
Modular information flow through ownership
Statically analyzing information flow, or how data influences other data within a program, is a challenging task in imperative languages. Analyzing pointers and mutations requires access to a program's complete source. However, programs often use pre-compiled dependencies where only type signatures are available. We demonstrate that ownership types can
Crichton, Will +3 more
openaire +2 more sources
Employees are critical stakeholders for an organization because they directly deal with the end-users and represent the entire firm. To recognize the strategic importance of the employees, organizations create communication programs to keep employees ...
Yan Ma
doaj +1 more source

