Results 41 to 50 of about 5,907,803 (347)

Information flow between resting state networks [PDF]

open access: yes, 2015
The resting brain dynamics self-organizes into a finite number of correlated patterns known as resting state networks (RSNs). It is well known that techniques like independent component analysis can separate the brain activity at rest to provide such ...
Alberto Cabrera   +9 more
core   +4 more sources

Monitoring Temporal Information Flow [PDF]

open access: yes, 2012
We present a framework for monitoring information flow in security-critical reactive systems, such as communication protocols, cell phone apps, document servers and web browsers. The secrecy requirements in such systems typically vary over time in response to the interaction with the environment.
Dimitrova, R.   +2 more
openaire   +2 more sources

Mass Media vs. the Mass of Media: A Study on the Human Nodes in a Social Network and their Chosen Messages [PDF]

open access: yesCyberspace Studies, 2019
In Internet-based social networks, the nodes have the most pivotal role in the processes and outcomes of the networks. Whether they pay attention to a message in the network or ignore it defines the fate of the message.
Shaho Sabbar, Donald Matheson
doaj   +1 more source

Architecture Design of Virtual Power Plant Based on “Three Flow Separation-Convergence”

open access: yes发电技术, 2023
With the increase of new energy penetration, the power balance and frequency stability problems brought by its randomness, intermittency and volatility has become increasingly serious.
CHEN Haoyong   +6 more
doaj   +1 more source

Information and Information Flow

open access: yes, 2004
This book is conceived as an introductory text into the theory of syntactic and semantic information, and information flow. Syntactic information theory is concerned with the information contained in the very fact that some signal has a non-random structure.
Bremer, Manuel, Cohnitz, Daniel
openaire   +4 more sources

Output-Sensitive Information Flow Analysis [PDF]

open access: yesLogical Methods in Computer Science, 2019
Constant-time programming is a countermeasure to prevent cache based attacks where programs should not perform memory accesses that depend on secrets. In some cases this policy can be safely relaxed if one can prove that the program does not leak more information than the public outputs of the computation.
Cristian Ene   +2 more
openaire   +6 more sources

Nonmalleable Information Flow: Technical Report

open access: yes, 2017
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen   +2 more
core   +1 more source

Real-time information flow analysis [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 2003
In previous work, we have studied some non-interference properties for information flow analysis in computer systems on classic (possibilistic) labeled transition systems. In this paper, some of these properties, notably BNDC, are reformulated in a real-time setting.
FOCARDI, Riccardo   +2 more
openaire   +4 more sources

Quantifying information flow

open access: yesProceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 2003
We extend definitions of information flow so as to quantify the amount of information passed; in other words, we give a formal definition of the capacity of covert channels. Our definition uses the process algebra CSP, and is based upon counting the number of different behaviours of a high level user that can be distinguished by a low level user.
openaire   +2 more sources

Fiscal Foresight and Information Flows [PDF]

open access: yesEconometrica, 2009
Summary: News -- or foresight -- about future economic fundamentals can create rational expectations equilibria with non-fundamental representations that pose substantial challenges to econometric efforts to recover the structural shocks to which economic agents react.
Eric M. Leeper   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy