Information flow in graphs
نویسندگان
چکیده
منابع مشابه
Enriching Query Flow Graphs with Click Information
The increased availability of large amounts of data about user search behaviour in search engines has triggered a lot of research in recent years. This includes developing machine learning methods to build knowledge structures that could be exploited for a number of tasks such as query recommendation. Query flow graphs are a successful example of these structures, they are generated from the se...
متن کاملInformation Flow on Directed Acyclic Graphs
The paper considers a multi-argument independence relation between messages sent over the edges of a directed acyclic graph. This relation is a generalization of a relation known in information flow as nondeducibility. A logical system that describes the properties of this relation for an arbitrary fixed directed acyclic graph is introduced and proven to be complete and decidable.
متن کاملInformation flow in the pharmaceutical supply chain
Managing the supply chain plays an important role in creating competitive advantages for companies. Adequate information flow in supply chain is one of the most important issues in SCM. Therefore, using certain Information Systems can have a significant role in managing and integrating data and information within the supply chain. Pharmaceutical supply chain is more complex than many other supp...
متن کاملInformation flow in the pharmaceutical supply chain
Managing the supply chain plays an important role in creating competitive advantages for companies. Adequate information flow in supply chain is one of the most important issues in SCM. Therefore, using certain Information Systems can have a significant role in managing and integrating data and information within the supply chain. Pharmaceutical supply chain is more complex than many other supp...
متن کاملInformation Flow Control and Taint Analysis with Dependence Graphs
• For critical system, formal approaches are needed. One is (static) information flow control which analyzes the software to check if it conforms to some security policy. An example is noninterference: secret information does not influence the publicly observable behavior of a system. • Many informal approaches can be subsumed under bug detection. A violation of some security policy can be rega...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Stochastic Processes and their Applications
سال: 1975
ISSN: 0304-4149
DOI: 10.1016/0304-4149(75)90012-5