Analysis Of A Rumor Routing Protocol With Limited Packet Lifetimes,
2010
Air Force Institute of Technology
Analysis Of A Rumor Routing Protocol With Limited Packet Lifetimes, Peter R. Francik
Theses and Dissertations
Wireless sensor networks require specialized protocols that conserve power and minimize network traffic. Therefore, it is vitally important to analyze how the parameters of a protocol affect these metrics. In doing so, a more efficient protocol can be developed. This research evaluates how the number of nodes in a network, time between generated agents, lifetime of agents, number of agent transmissions, time between generated queries, lifetime of queries, and node transmission time affect a modified rumor routing protocol for a large-scale, wireless sensor network. Furthermore, it analyzes how the probability distribution of certain protocol parameters affects the network performance. The …
Component Hiding Using Identification And Boundary Blurring Techniques,
2010
Air Force Institute of Technology
Component Hiding Using Identification And Boundary Blurring Techniques, James D. Parham Jr.
Theses and Dissertations
Protecting software from adversarial attacks is extremely important for DoD technologies. When systems are compromised, the possibility exists for recovery costing millions of dollars and countless labor hours. Circuits implemented on embedded systems utilizing FPGA technology are the result of downloading software for instantiating circuits with specific functions or components. We consider the problem of component hiding a form of software protection. Component identification is a well studied problem. However, we use component identification as a metric for driving the cost of reverse engineering to an unreasonable level. We contribute to protection of software and circuitry by implementing a Java …
Service-Differentiated And Reliable Communication In Event-Based Wireless Sensor Networks,
2010
University of Nebraska at Lincoln
Service-Differentiated And Reliable Communication In Event-Based Wireless Sensor Networks, Yuyan Xue
Computer Science and Engineering: Theses, Dissertations, and Student Research
Wireless Sensor Networks (WSNs) consist of low-power embedded devices with integrated sensing, computing and wireless communication capabilities. These devices, called sensor nodes or motes, are often battery-powered and deployed in a distributed manner to provide observations on the physical world. Reliably and promptly collecting the sensing data to convey the features of a surveillance area, especially the events of interest, to the sink is one of the most critical requirements of WSN design. However, dynamic wireless channel conditions and the constrained energy resources make it a challenging task to provide the end-to-end performance guarantees in multi-hop WSNs.
The objective of …
Study Of Physical Layer Security In Wireless Communications,
2010
University of Nebraska at Lincoln
Study Of Physical Layer Security In Wireless Communications, Mustafa Duruturk
Theses, Dissertations, & Student Research in Computer Electronics & Engineering
This thesis has investigated security in wireless communications at physical layer. Security is an important issue for wireless communications and poses many challenges. Most security schemes have been applied to the upper layers of communications networks. Since in a typical wireless communication, transmission of data is over the air, third party receiver(s) may have easy access to the transmitted data. This work discusses a new security technique at the physical layer for the MIMO (802.11n) transmitters. For this project, the wireless medium is secured by transmitting a noise signal that is only recoverable by the receiver. This report includes an …
Global Positioning Logger,
2010
California Polytechnic State University - San Luis Obispo
Global Positioning Logger, Matthew Hall
Computer Engineering
The Global Positioning Logger (GPL) is a mobile embedded device that utilizes GPS technology. The GPS data is used to display current speed and past global locations.
Reverberation-Chamber Test Environment For Outdoor Urban Wireless Propagation Studies,
2010
University of South Carolina - Columbia
Reverberation-Chamber Test Environment For Outdoor Urban Wireless Propagation Studies, Helge Fielitz, Kate A. Remley, Christopher L. Holloway, Qian Zhang, Qiong Wu, David W. Matolak
Faculty Publications
We introduce a test environment to replicate the well-known clustering of reflections in power delay profiles arising from late-time delays and reflections. Urban wireless propagation environments are known to exhibit such clustering. The test setup combines discrete reflections generated by a fading simulator with the continuous distribution of reflections created in a reverberation chamber. We describe measurements made in an urban environment in Denver, CO, that illustrate these multiple distributions of reflections. Our comparison of measurements made in the urban environment to those made in the new test environment shows good agreement.
A Graduate Education In Software Management And The Software Business For Mid-Career Professionals,
2010
Carnegie Mellon University
A Graduate Education In Software Management And The Software Business For Mid-Career Professionals, Ray Bareiss, Gladys Mercier
Ray Bareiss
Given the unique nature of the software business, the faculty of Carnegie Mellon University’s Silicon Valley campus concluded that mid-career software professionals would be better served by a tailored master’s degree focusing on software management and more broadly on the business of software than by a typical MBA. Our software management master’s program integrates business, technical, and soft skills to prepare our students for technical leadership in their current companies or in entrepreneurial ventures. Our initial program built on the strengths of Carnegie Mellon’s world-class software engineering education. We targeted students working in large companies, engaged in large-scale enterprise software …
Coaching Via Cognitive Apprenticeship,
2010
Carnegie Mellon University
Coaching Via Cognitive Apprenticeship, Ray Bareiss, Martin Radley
Ray Bareiss
At Carnegie Mellon’s Silicon Valley campus we employ a learn by- doing educational approach in which nearly all student learning, and thus instruction, is in the context of realistic, team based projects. Consequently, we have adopted coaching as our predominant teaching model. In this paper we reflect on our experience with the nature of teaching by coaching using a framework derived from Cognitive Apprenticeship, and explain how we employ the techniques it suggests in our teaching. We also discuss a range of instructional tensions that arise in teaching by coaching and present a survey of student attitudes regarding the effectiveness …
Networking And Computing Infrastructure In Nevada: Current Status And Future Developments,
2010
University of Nevada, Reno
Networking And Computing Infrastructure In Nevada: Current Status And Future Developments, Frederick C. Harris
2010 Annual Nevada NSF EPSCoR Climate Change Conference
12 PowerPoint slides Session 2: Infrastructure Convener: Sergiu Dascalu, UNR
Architecture And Usability Aspects Of Environmental Data Portals,
2010
University of Nevada Reno
Architecture And Usability Aspects Of Environmental Data Portals, Michael Mcmahon, Jr.
2010 Annual Nevada NSF EPSCoR Climate Change Conference
12 PowerPoint slides Session 2: Infrastructure Convener: Sergiu Dascalu, UNR Abstract: -Web Portal: A web site that acts as a starting point or gateway to Internet content, services, and information. Portals expose this information via a consistent set of visual elements and organizational constructs that improve the user experience and may relate, unify, or otherwise enhance the content. -Data Portal: A web site that acts as a starting point or gateway to Internet content, web/data services, and related information. Portals expose this information via a consistent set of visual elements and organizational constructs that improve the user experience and relate, …
Survey Of Environmental Data Portals: Features, Characteristics, And Reliability Issues,
2010
University of Nevada, Las Vegas
Survey Of Environmental Data Portals: Features, Characteristics, And Reliability Issues, Shahram Latifi, David Walker
2010 Annual Nevada NSF EPSCoR Climate Change Conference
24 PowerPoint slides Session 2: Infrastructure Convener: Sergiu Dascalu, UNR Abstract: -What is a Data Portal? -Presents information from diverse sources in a unified way -Enables instant, reliable and secure exchange of information over the Web -The "portal" concept is to offer a single web page that aggregates content from several systems or servers.
Goals, Plans, And Strategies Of The Cyberinfrastructure Project Component,
2010
University of Nevada Reno
Goals, Plans, And Strategies Of The Cyberinfrastructure Project Component, Sergiu Dascalu
2010 Annual Nevada NSF EPSCoR Climate Change Conference
15 PowerPoint slides Session 2: Infrastructure Convener: Sergiu Dascalu, UNR Abstract: -Team -Goal and Targets -Strategies and Activities -Progress: Activities & Milestones -Plans
Research Poster: Software Frameworks For Improved Productivity In Climate Change Research,
2010
University of Nevada Reno
Research Poster: Software Frameworks For Improved Productivity In Climate Change Research, Sohei Okamoto
2010 Annual Nevada NSF EPSCoR Climate Change Conference
Research poster
Research Poster: Architecture And Usability Aspects Of Environmental Data Portals,
2010
University of Nevada Reno
Research Poster: Architecture And Usability Aspects Of Environmental Data Portals, Victor Ivanov
2010 Annual Nevada NSF EPSCoR Climate Change Conference
Research poster
Research Poster: Htsma: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme In Heterogeneous Wireless Mesh Networks,
2010
University of Nevada, Las Vegas
Research Poster: Htsma: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme In Heterogeneous Wireless Mesh Networks, Yan Jin, Ju-Yeon Jo, Mei Yang, Yoohwan Kim, Yingtao Jiang, John Gowens
2010 Annual Nevada NSF EPSCoR Climate Change Conference
Research poster
Research Poster: Survey Of Environmental Data Portals: Features And Characteristics,
2010
University of Nevada, Las Vegas
Research Poster: Survey Of Environmental Data Portals: Features And Characteristics, David Walker
2010 Annual Nevada NSF EPSCoR Climate Change Conference
Research poster
Some Skepticism About Search Neutrality,
2010
University of Maryland Francis King Carey School of Law
Some Skepticism About Search Neutrality, James Grimmelmann
Faculty Scholarship
In the last few years, some search-engine critics have suggested that dominant search engines (i.e. Google) should be subject to “search neutrality” regulations. By analogy to network neutrality, search neutrality would require even-handed treatment in search results: It would prevent search engines from playing favorites among websites. Academics, Google competitors, and public-interest groups have all embraced search neutrality.
Despite this sudden interest, the case for search neutrality is too muddled to be convincing. While “neutrality” is an appealing-sounding principle, it lacks a clear definition. This essay explores no fewer than eight different meanings that search-neutrality advocates have given the term. …
Web-Dinar: Web Based Diagnosis Of Network And Application Resources In Disaster Response Systems,
2010
University of Massachusetts Amherst
Web-Dinar: Web Based Diagnosis Of Network And Application Resources In Disaster Response Systems, Kartik Deshpande
Masters Theses 1911 - February 2014
Disaster management and emergency response mechanisms are coming of age post 9/11. Paper based triaging and evacuation is slowly being replaced with much advanced mechanisms using remote clients (Laptops, Thin clients, PDAs), RFiDs etc. This reflects a modern trend to deploy Information Technology (IT) in disaster management. IT elements provide a great a deal of flexibility and seamlessness in the communication of information. The information flowing is so critical that, loss of data is not at all acceptable. Loss of data would mean loss of critical medical information portraying the disaster scenario. This would amount to a wrong picture being …
E-Fraud Prevention Based On The Self-Authentication Of E-Documents,
2010
Technological University Dublin
E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle
Conference papers
We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …
Innovations In The Internet’S Architecture That Challenge The Status Quo,
2010
University of Pennsylvania Carey Law School
Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo
Faculty Scholarship at Penn Carey Law
The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others, such …