To see the other types of publications on this topic, follow the link: Information flow.

Journal articles on the topic 'Information flow'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information flow.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mygal, Valeriy, and Galyna Mygal. "Problems of Digitized Information Flow Analysis: Cognitive Aspects." Information & Security: An International Journal 43, no. 2 (2019): 134–44. http://dx.doi.org/10.11610/isij.4312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gruska, Damas P. "Information Flow Testing." Fundamenta Informaticae 128, no. 1-2 (2013): 81–95. http://dx.doi.org/10.3233/fi-2013-934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahlswede, R., Ning Cai, S. Y. R. Li, and R. W. Yeung. "Network information flow." IEEE Transactions on Information Theory 46, no. 4 (2000): 1204–16. http://dx.doi.org/10.1109/18.850663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Carlowicz, Michael. "Flow of information." Eos, Transactions American Geophysical Union 77, no. 27 (1996): 254. http://dx.doi.org/10.1029/eo077i027p00254-02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Godlee, F. "Global information flow." BMJ 321, no. 7264 (2000): 776–77. http://dx.doi.org/10.1136/bmj.321.7264.776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Godlee, Fiona, Richard Horton, and Richard Smith. "Global information flow." Lancet 356, no. 9236 (2000): 1129–30. http://dx.doi.org/10.1016/s0140-6736(00)02752-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Beraia, M., and G. Beraia. "Energy/information dissipation and blood flow in human body." Cardiology Research and Reports 3, no. 2 (2021): 01–08. http://dx.doi.org/10.31579/2692-9759/017.

Full text
Abstract:
The amount of work done to displace blood in systemic arteries and capillaries exceeds the work done by the left ventricle. Besides, at the heartbeat, electromagnetic energy dissipates from the heart to the whole human body. For the problem study, the dielectric spectroscopy method was used. Ringer’s, amino acid solution, and heparinized venous blood were affected by the external electromagnetic oscillations (100-65000Hz, 1-8MHz.) in 17 healthy individuals. Correlations were noted between the initial and induced signal forms/frequencies according to the impedance of the system. The electric im
APA, Harvard, Vancouver, ISO, and other styles
8

Jimoh Ango, Rafiu, and Adeyemo Yusuf Temitope. "Information Flow Assessment for Rural Transformation in Developing Nations." International Journal of Science and Research (IJSR) 10, no. 6 (2021): 1085–89. https://doi.org/10.21275/sr21609214206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McCamant, Stephen, and Michael D. Ernst. "Quantitative information flow as network flow capacity." ACM SIGPLAN Notices 43, no. 6 (2008): 193–205. http://dx.doi.org/10.1145/1379022.1375606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hu, Wei, Armaiti Ardeshiricham, and Ryan Kastner. "Hardware Information Flow Tracking." ACM Computing Surveys 54, no. 4 (2021): 1–39. http://dx.doi.org/10.1145/3447867.

Full text
Abstract:
Information flow tracking (IFT) is a fundamental computer security technique used to understand how information moves through a computing system. Hardware IFT techniques specifically target security vulnerabilities related to the design, verification, testing, manufacturing, and deployment of hardware circuits. Hardware IFT can detect unintentional design flaws, malicious circuit modifications, timing side channels, access control violations, and other insecure hardware behaviors. This article surveys the area of hardware IFT. We start with a discussion on the basics of IFT, whose foundations
APA, Harvard, Vancouver, ISO, and other styles
11

Roberts, Franklin D. "Let the Information Flow." Journal of Intellectual Freedom and Privacy 1, no. 2-3 (2016): 4. http://dx.doi.org/10.5860/jifp.v1i2-3.6165.

Full text
Abstract:
About twenty years ago I became the library director at a small state college in a far-northern state, known mostly for liberal social stances even among its conservative electorate. So I was taken aback when the head of computing recommended I install the same filtering software used in the public school system to protect students from getting into “mischief” online. College students are taking their first steps into adulthood, I explained when declining his offer, and they should get into mischief. They should be testing their boundaries, finding out the world is much different than the dinn
APA, Harvard, Vancouver, ISO, and other styles
12

Bracher, Shane, and Padmanabhan Krishnan. "Supporting Secure Information Flow." International Journal of e-Collaboration 8, no. 1 (2012): 17–35. http://dx.doi.org/10.4018/jec.2012010102.

Full text
Abstract:
The authors describe a model to provide access control for information flow that crosses organisational boundaries. The model specifies a distributed access control enforcement approach for workflow objects (e.g., a document assigned to a pre-defined workflow) using software agents and data encryption techniques. Access to restricted content within the workflow object is based on the possession of encryption keys and role enactment. The model relies on trusted software agents to verify and ensure the validity of the workflow object. The authors construct a prototype and report on a case study
APA, Harvard, Vancouver, ISO, and other styles
13

Recanatesi, Stefano. "Untangling network information flow." Nature Computational Science 2, no. 8 (2022): 475–76. http://dx.doi.org/10.1038/s43588-022-00284-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Camlek, Victor. "Healthcare mobile information flow." Information Services & Use 31, no. 1-2 (2011): 23–30. http://dx.doi.org/10.3233/isu-2011-0626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kozyri, Elisavet, Stephen Chong, and Andrew C. Myers. "Expressing Information Flow Properties." Foundations and Trends® in Privacy and Security 3, no. 1 (2022): 1–102. http://dx.doi.org/10.1561/3300000008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Bhardwaj, Chandrika, and Sanjiva Prasad. "Secure information flow connections." Journal of Logical and Algebraic Methods in Programming 127 (June 2022): 100761. http://dx.doi.org/10.1016/j.jlamp.2022.100761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lowe, Gavin. "Defining information flow quantity." Journal of Computer Security 12, no. 3-4 (2004): 619–53. http://dx.doi.org/10.3233/jcs-2004-123-410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Guchenko, E., and E. Vasilev. "Flow simulation textual information." Актуальные направления научных исследований XXI века: теория и практика 3, no. 5 (2015): 196–99. http://dx.doi.org/10.12737/14487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ikuta, Masaki. "Information Flow in Asia." Media Asia 12, no. 3 (1985): 147–50. http://dx.doi.org/10.1080/01296612.1985.11726185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Sinebare, Musawe. "One-Way Information Flow." Media Asia 24, no. 1 (1997): 33–39. http://dx.doi.org/10.1080/01296612.1997.11726520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Lourenço, Luísa, and Luís Caires. "Dependent Information Flow Types." ACM SIGPLAN Notices 50, no. 1 (2015): 317–28. http://dx.doi.org/10.1145/2775051.2676994.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Martin, Vivien. "Managing an information flow." Nursing Management 8, no. 5 (2001): 34–37. http://dx.doi.org/10.7748/nm2001.09.8.5.34.c2082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Cotton-Nessler, Natalie C. "Information Flow in Interactions." Academy of Management Proceedings 2014, no. 1 (2014): 16253. http://dx.doi.org/10.5465/ambpp.2014.16253abstract.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Batty, Michael. "The flow of information." Environment and Planning B: Urban Analytics and City Science 51, no. 8 (2024): 1721–24. http://dx.doi.org/10.1177/23998083241288000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

ШВЕЦОВА, Е. В. "ENTERPRISE INFORMATION FLOW DESIGN." Экономика и предпринимательство, no. 1(150) (May 27, 2023): 1267–71. http://dx.doi.org/10.34925/eip.2023.150.1.258.

Full text
Abstract:
Информационная логистика является важнейшим связующим звеном всей логистики в целом. Чтобы эффективно управлять любыми логистическими процессами, необходимо провести анализ существующих информационных потоков, выявить плюсы и минусы существующей информационной системы, и внести поправки. На сегодняшний день имеются современные приемы и методы для проектирования информационных потоков с целью эффективного управления деятельностью предприятия. Статья посвящена одному из методов проектирования информационных потоков на примере кредитного отдела банка N. Information logistics is the most important
APA, Harvard, Vancouver, ISO, and other styles
26

Gruska, Damas P. "Probabilistic Information Flow Security." Fundamenta Informaticae 85, no. 1-4 (2008): 173–87. https://doi.org/10.3233/fun-2008-851-413.

Full text
Abstract:
A formal model for description of probabilistic timing attacks is presented and studied. It is based on a probabilistic timed process algebra, on observations (mappings which make visible only a part of system behavior) and on an information flow. The resulting security properties are studied and compared with other security concepts.
APA, Harvard, Vancouver, ISO, and other styles
27

BITITCI, UMIT S., and ALLAN S. CARRIE. "INFORMATION MATERIAL FLOW MAPPING." Logistics Information Management 3, no. 1 (1990): 31–36. http://dx.doi.org/10.1108/eb007494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Chiu, Kuang-Hui. "Information flow over process." Journal of Information and Optimization Sciences 27, no. 1 (2006): 167–92. http://dx.doi.org/10.1080/02522667.2006.10699685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Phan, Quoc-Sang, Pasquale Malacaria, Oksana Tkachuk, and Corina S. Păsăreanu. "Symbolic quantitative information flow." ACM SIGSOFT Software Engineering Notes 37, no. 6 (2012): 1–5. http://dx.doi.org/10.1145/2382756.2382791.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Humphrey, Curtis M., and Julie A. Adams. "Cognitive information flow analysis." Cognition, Technology & Work 15, no. 2 (2011): 133–52. http://dx.doi.org/10.1007/s10111-011-0198-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Han, Sang Hun, Aziz Nasridinov, and Keun Ho Ryu. "Information Flow Monitoring System." IEEE Access 6 (2018): 23820–27. http://dx.doi.org/10.1109/access.2018.2829495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Rosinberg, Martin Luc, and Jordan M. Horowitz. "Continuous information flow fluctuations." EPL (Europhysics Letters) 116, no. 1 (2016): 10007. http://dx.doi.org/10.1209/0295-5075/116/10007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Georgatos, K. "Logic and Information Flow." Computer Journal 38, no. 3 (1995): 259–60. http://dx.doi.org/10.1093/comjnl/38.3.259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Polikarpova, Nadia, Deian Stefan, Jean Yang, Shachar Itzhaky, Travis Hance, and Armando Solar-Lezama. "Liquid information flow control." Proceedings of the ACM on Programming Languages 4, ICFP (2020): 1–30. http://dx.doi.org/10.1145/3408987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Peres, Yuval, and Elchanan Mossel. "Information flow on trees." Annals of Applied Probability 13, no. 3 (2003): 817–44. http://dx.doi.org/10.1214/aoap/1060202828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kane, Jeffrey, and Pavel Naumov. "Symmetry in information flow." Annals of Pure and Applied Logic 165, no. 1 (2014): 253–65. http://dx.doi.org/10.1016/j.apal.2013.07.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Russell, Lucian, Ouri Wolfson, and Clement Yu. "Information flow in the DAMA project beyond database managers: information flow managers." Distributed Systems Engineering 3, no. 4 (1996): 263–75. http://dx.doi.org/10.1088/0967-1846/3/4/006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hongladarom, Soraj. "Information Divide, Information Flow and Global Justice." International Review of Information Ethics 7 (September 1, 2007): 77–81. http://dx.doi.org/10.29173/irie8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Lee, Sang-Chun, and Yong-Seok Seo. "An Evaluation of Agricultural Product Supply Chain Information flow Efficiency." Korea Association for International Commerce and Information 27, no. 2 (2025): 177–97. https://doi.org/10.15798/kaici.2025.27.2.177.

Full text
Abstract:
This study aims to evaluate the efficiency of agricultural supply chain using data envelopment analysis (DEA) model. This is because the supply chain of agricultural products is not regular and contains various members, which has been a limitation for analysis, but to overcome this, this study aims to systematically analyze it using the data envelopment analysis (DEA) model. The purpose of this study is to identify factors that hinder the development of the agricultural supply chain and propose strategies to improve the efficiency of the system. This study aims to verify the effectiveness of t
APA, Harvard, Vancouver, ISO, and other styles
40

Kassir, Abdallah, Robert Fitch, and Salah Sukkarieh. "Communication-aware information gathering with dynamic information flow." International Journal of Robotics Research 34, no. 2 (2014): 173–200. http://dx.doi.org/10.1177/0278364914556911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ling, Bin, Colin Allison, J. Ross Nicholl, Luke Moodley, and Dave Roberts. "Disabilities Information Flow: a disabilities information management system." British Journal of Educational Technology 37, no. 2 (2006): 289–94. http://dx.doi.org/10.1111/j.1467-8535.2006.00535.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Matsumoto, K., and I. Tsuda. "Calculation of information flow rate from mutual information." Journal of Physics A: Mathematical and General 21, no. 6 (1988): 1405–14. http://dx.doi.org/10.1088/0305-4470/21/6/016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Phan, Khoa Tran, Mihaela van der Schaar, and William R. Zame. "Congestion, Information, and Secret Information in Flow Networks." IEEE Journal of Selected Topics in Signal Processing 6, no. 2 (2012): 117–26. http://dx.doi.org/10.1109/jstsp.2011.2182496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Jiang, Di. "Watching information flow inside cells." Science 370, no. 6514 (2020): 306.2–307. http://dx.doi.org/10.1126/science.370.6514.306-b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Reinitzer, Sigrid. "Free flow of bibliographic information." Organizacija znanja 16, no. 4 (2011): 156–58. http://dx.doi.org/10.3359/oz1104156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

KAKUDA, Yuzuru. "Information Flow and Design Systems." Annals of the Japan Association for Philosophy of Science 15, no. 1 (2006): 1–24. http://dx.doi.org/10.4288/jafpos1956.15.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Chandra, Akhilesh, Balaji Rajagopalan, and Ravindra Krovi. "Flow Turbulence And Information Quality." Review of Business Information Systems (RBIS) 8, no. 1 (2004): 83–96. http://dx.doi.org/10.19030/rbis.v8i1.4507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Azevedo de Amorim, Arthur, Nathan Collins, André DeHon, et al. "A verified information-flow architecture." Journal of Computer Security 24, no. 6 (2016): 689–734. http://dx.doi.org/10.3233/jcs-15784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Kozyri, Elisavet, and Fred B. Schneider. "RIF: Reactive information flow labels." Journal of Computer Security 28, no. 2 (2020): 191–228. http://dx.doi.org/10.3233/jcs-191316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Bossi, Annalisa, Damiano Macedonio, Carla Piazza, and Sabina Rossi. "Information flow in secure contexts." Journal of Computer Security 13, no. 3 (2005): 391–422. http://dx.doi.org/10.3233/jcs-2005-13303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!