Search

Your search keyword '"Information flow"' showing total 145 results

Search Constraints

Start Over You searched for: Descriptor "Information flow" Remove constraint Descriptor: "Information flow" Publisher ieee Remove constraint Publisher: ieee
145 results on '"Information flow"'

Search Results

1. Upper Limb Cortical-Muscular Coupling Analysis Based on Time-Delayed Back Maximum Information Coefficient Model

2. Execution Recording and Reconstruction for Detecting Information Flows in Android Apps

3. Quantifying Information Leakage for Security Verification of Compiler Optimizations.

4. Residual Information Flow for Neural Machine Translation

5. Secure Register Allocation for Trusted Code Generation.

6. Panel Data Causal Inference Using a Rigorous Information Flow Analysis for Homogeneous, Independent and Identically Distributed Datasets

7. Repair Strategy of Military Communication Network Based on Discrete Artificial Bee Colony Algorithm

8. Information Flow Modeling and Performance Evaluation of Communication Networks Serving Power Grids

9. InfoFlow: Mining Information Flow Based on User Community in Social Networking Services

10. Information Flow in Software Testing – An Interview Study With Embedded Software Engineering Practitioners

11. Causality-Based Attribute Weighting via Information Flow and Genetic Algorithm for Naive Bayes Classifier

12. Identification of Early Vascular Dementia Patients With EEG Signal

13. DIMDRP: A Double Iteration Method for Drug Response Prediction

14. Deep Radiomic Analysis Based on Modeling Information Flow in Convolutional Neural Networks

15. Information Flow Monitoring System

16. EEG-Based Detection of Epileptic Seizures Through the Use of a Directed Transfer Function Method

17. Correlation Analysis for Exploring Multivariate Data Sets

18. Robust Routing Optimization for Smart Grids Considering Cyber-Physical Interdependence.

19. Optimal Accuracy-Privacy Trade-Off for Secure Computations.

20. Building a Secure Scheme for a Trusted Hardware Sharing Environment

21. Bottleneck Analysis to Reduce Primary Care to Specialty Care Referral Delay.

22. Quantitative Analysis of Timing Channel Security in Cryptographic Hardware Design.

23. A Simplified Co-Simulation Model for Investigating Impacts of Cyber-Contingency on Power System Operations.

24. A New System Development Framework Driven by a Model-Based Testing Approach Bridged by Information Flow.

25. A Reduction Approach to the Multiple-Unicast Conjecture in Network Coding.

26. Efficient Information Flow Maximization in Probabilistic Graphs.

27. Directed EEG Functional Connectivity Features to Reveal Different Attention Indexes Using Hierarchical Clustering

28. Epileptic Seizure Detection Based on Partial Directed Coherence Analysis.

29. Variability of Complex Networks Parameters on Effective Connectivity Analysis: An Absence Epilepsy Case

30. Repair Strategy of Military Communication Network Based on Discrete Artificial Bee Colony Algorithm

31. EssentialFP : Exposing the Essence of Browser Fingerprinting

32. Identifying Physical Interactions from Climate Data: Challenges and Opportunities.

33. A Time-Varying Method for Brain Effective Connectivity Analysis of Emotional EEG Data

34. An information flow security model for home area network of smart grid.

35. Control and prediction of beliefs on social network.

36. Vulnerability analysis of the global navigation satellite systems from the information flow perspective.

37. Design of information flow in Collaborative-VMM.

38. Memory-assisted universal compression of network flows.

39. Secure Information Flow for Concurrent Programs under Total Store Order.

40. Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies.

41. Securing Interactive Programs.

42. Scene understanding using DSO Cognitive Architecture.

43. Towards an Implementation of Information Flow Security Using Semantic Web Technologies.

44. Analysis of cloud service transaction in cloud manufacturing.

45. Research on order tracking based on multilevel bill of lots.

46. Verification and Protection of Confidentiality in an Advanced Smart Grid.

47. Effective information flow over mobile adaptive networks.

48. Information flow integrated optimization model of projects construction process.

49. Dealing with Disappearance of an Actor Set in Social Networks.

50. Sharing Mobile Code Securely with Information Flow Control.

Catalog

Books, media, physical & digital resources