Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Mobile computing (7)
- Network (5)
- Magnetic field (4)
- Plasma physics (4)
- Ubicomp (4)
-
- Wireless (4)
- Dynamics (3)
- Lifetime (3)
- MHD instability (3)
- MHD wave (3)
- Magnetosphere (3)
- Supernova remnants (3)
- Atomic and molecular physics (2)
- Boundary layer (2)
- CRRES satellite (2)
- Distributed computing (2)
- Electrostatic wave (2)
- Emission line (2)
- Galaxies (2)
- Gamma radiation (2)
- Instability (2)
- Ionic current (2)
- Kinematics (2)
- Magnetopause (2)
- Magnetospheric physics (MHD waves and instabilities; magnetospheric configuration and dynamics) (2)
- Onde électrostatique (2)
- Orbit (2)
- Oscillation modes (2)
- Pc 5 micropulsation (2)
- Physique plasma (2)
- Publication
- Publication Type
Articles 1 - 30 of 82
Full-Text Articles in Entire DC Network
Secure Context-Sensitive Authorization, Kazuhiro Minami, David Kotz
Secure Context-Sensitive Authorization, Kazuhiro Minami, David Kotz
Computer Science Technical Reports
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to define context-sensitive rules, such as ``allow database access only to staff who are currently located in the main office.'' However, these rules, or the facts that are needed to verify authority, often involve sensitive context information. This paper presents a secure context-sensitive authorization system that protects confidential information in facts or rules. Furthermore, our system allows multiple hosts in a distributed environment to perform the evaluation of an authorization query in a collaborative way; we …
Structural Properties Of Discs And Bulges Of Early-Type Galaxies, Roelof S. De Jong, Luc Simard, Roger L. Davies, R. P. Saglia, David Burstein, Matthew Colless, Robert Mcmahan, Gary Wegner
Structural Properties Of Discs And Bulges Of Early-Type Galaxies, Roelof S. De Jong, Luc Simard, Roger L. Davies, R. P. Saglia, David Burstein, Matthew Colless, Robert Mcmahan, Gary Wegner
Dartmouth Scholarship
We have used the EFAR sample of galaxies to investigate the light distributions of early-type galaxies. We decompose the two-dimensional light distribution of the galaxies in a flattened spheroidal component with a Sérsic radial light profile and an inclined disc component with an exponential light profile. We show that if we assume that all galaxies can have a spheroidal and a disc component, then the brightest, bulge-dominated elliptical galaxies have a fairly broad distribution in the Sérsic profile shape parameter nB, with a median of approximately 3.7 and with σ∼ 0.9. Other galaxies have smaller nB values. …
Signature Of Electron Capture In Iron‐Rich Ejecta Of Sn 2003du, Peter Hoflich, Christopher L. Gerardy, Ken-Ichi Nomoto, Kentaro Motohara, Robert A. Fesen
Signature Of Electron Capture In Iron‐Rich Ejecta Of Sn 2003du, Peter Hoflich, Christopher L. Gerardy, Ken-Ichi Nomoto, Kentaro Motohara, Robert A. Fesen
Dartmouth Scholarship
Late-time near-infrared and optical spectra of the normal-bright Type Ia supernova 2003du about 300 days after the explosion are presented. At this late epoch, the emission profiles of well-isolated [Fe II] lines (in particular that of the strong 1.644 μm feature) trace out the global kinematic distribution of radioactive material in the expanding supernova ejecta. In SN 2003du, the 1.644 μm [Fe II] line seems to show a flat-topped profile, indicative of a thick but hollow-centered expanding shell, rather than a strongly peaked profile that would be expected from a "center-filled" distribution. Based on detailed models for exploding Chandrasekhar-mass white …
Optimal Cooling Strategies For Magnetically Trapped Atomic Fermi-Bose Mixtures, Michael Brown-Hayes, Roberto Onofrio
Optimal Cooling Strategies For Magnetically Trapped Atomic Fermi-Bose Mixtures, Michael Brown-Hayes, Roberto Onofrio
Dartmouth Scholarship
We discuss cooling efficiency for different-species Fermi-Bose mixtures in magnetic traps. A better heat capacity matching between the two atomic species is achieved by a proper choice of the Bose cooler and the magnetically trappable hyperfine states of the mixture. When a partial spatial overlap between the two species is also taken into account, the deepest Fermi degeneracy is obtained for an optimal value of the trapping frequency ratio between the two species. This can be achieved by assisting the magnetic trap with a deconfining light beam, as shown in the case of fermionic 6Li mixed with 23Na, 87Rb, and …
The Strange Physics Of Low Frequency Mirror Mode Turbulence In The High Temperature Plasma Of The Magnetosheath, R. A. Treumann, C. H. Jaroschek, O. D. Constantinescu, R. Nakamura
The Strange Physics Of Low Frequency Mirror Mode Turbulence In The High Temperature Plasma Of The Magnetosheath, R. A. Treumann, C. H. Jaroschek, O. D. Constantinescu, R. Nakamura
Dartmouth Scholarship
Mirror mode turbulence is the lowest frequency perpendicular magnetic excitation in magnetized plasma proposed already about half a century ago by Rudakov and Sagdeev (1958) and Chandrasekhar et al. (1958) from fluid theory. Its experimental verification required a relatively long time. It was early recognized that mirror modes for being excited require a transverse pressure (or temperature) anisotropy. In principle mirror modes are some version of slow mode waves. Fluid theory, however, does not give a correct physical picture of the mirror mode. The linear infinitesimally small amplitude physics is described correctly only by including the full kinetic theory and …
Statistical Tools For Digital Image Forensics, Alin C. Popescu
Statistical Tools For Digital Image Forensics, Alin C. Popescu
Dartmouth College Ph.D Dissertations
A digitally altered image, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic image. The tampering, however, may disturb some underlying statistical properties of the image. Under this assumption, we propose five techniques that quantify and detect statistical perturbations found in different forms of tampered images: (1) re-sampled images (e.g., scaled or rotated); (2) manipulated color filter array interpolated images; (3) double JPEG compressed images; (4) images with duplicated regions; and (5) images with inconsistent noise patterns. These techniques work in the absence of any embedded watermarks or signatures. For each technique we …
Discrete-Time Fractional Differentiation From Integer Derivatives, Hany Farid
Discrete-Time Fractional Differentiation From Integer Derivatives, Hany Farid
Computer Science Technical Reports
Discrete-time fractional derivative filters (1-D and 2-D) are shown to be well approximated from a small set of integer derivatives. A fractional derivative of arbitrary order (and, in 2-D, of arbitrary orientation) can therefore be efficiently computed from a linear combination of integer derivatives of the underlying signal or image.
Self‐Consistent Diffusive Lifetimes Of Weibel Magnetic Fields In Gamma‐Ray Bursts, C. H. Jaroschek, H. Lesch, R. A. Treumann
Self‐Consistent Diffusive Lifetimes Of Weibel Magnetic Fields In Gamma‐Ray Bursts, C. H. Jaroschek, H. Lesch, R. A. Treumann
Dartmouth Scholarship
Weibel filamentation in relativistic plasma shell collisions has been demonstrated as an efficient and fast mechanism for the generation of near-equipartition magnetic fields in self-consistent particle-in-cell (PIC) simulations. In generic γ-ray burst (GRB) models with kinetically dominated plasma outflow, sufficient strength and lifetime of magnetic fields are essential to validate synchrotron emission as the source of radiative outbursts. In this article we report on self-consistent PIC simulations of pair-plasma shell collisions in the highly relativistic regime with particle ensembles up to 5 × 108. Energy dependence of magnetic field generation in the Weibel process is discussed, and for …
Secure Hardware Enhanced Myproxy: A Ph.D. Thesis Proposal, John Marchesini, David Kotz
Secure Hardware Enhanced Myproxy: A Ph.D. Thesis Proposal, John Marchesini, David Kotz
Computer Science Technical Reports
In 1976, Whitfield Diffie and Martin Hellman demonstrated how "New Directions In Cryptography" could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed environments, we need an infrastructure for finding and trusting other parties' public keys (i.e., a PKI). A number of useful applications become possible with PKI. While the applications differ in how they use keys (e.g., S/MIME uses the key for message encryption and signing, while client-side SSL uses the key for authentication), all applications share one assumption: users have keypairs. In previous work, we …
A Million Secondchandraview Of Cassiopeia A, Una Hwang, J. Martin Laming, Carles Badenes, Fred Berendse, John Blondin, Denis Cioffi, Tracey Delaney, Daniel Dewey, Robert Fesen
A Million Secondchandraview Of Cassiopeia A, Una Hwang, J. Martin Laming, Carles Badenes, Fred Berendse, John Blondin, Denis Cioffi, Tracey Delaney, Daniel Dewey, Robert Fesen
Dartmouth Scholarship
We introduce a million second observation of the supernova remnant Cassiopeia A with the Chandra X-Ray Observatory. The bipolar structure of the Si-rich ejecta (northeast jet and southwest counterpart) is clearly evident in the new images, and their chemical similarity is confirmed by their spectra. These are most likely due to jets of ejecta as opposed to cavities in the circumstellar medium, since we can reject simple models for the latter. The properties of these jets and the Fe-rich ejecta will provide clues to the explosion of Cas A.
A Survey Of Wpa And 802.11i Rsn Authentication Protocols, Kwang-Hyun Baek, Sean W. Smith, David Kotz
A Survey Of Wpa And 802.11i Rsn Authentication Protocols, Kwang-Hyun Baek, Sean W. Smith, David Kotz
Computer Science Technical Reports
In the new standards for WLAN security, many choices exist for the authentication process. In this paper, we list eight desired properties of WLAN authentication protocols, survey eight recent authentication protocols, and analyze the protocols according to the desired properties.
Problems With The Dartmouth Wireless Snmp Data Collection, Tristan Henderson, David Kotz
Problems With The Dartmouth Wireless Snmp Data Collection, Tristan Henderson, David Kotz
Computer Science Technical Reports
The original Dartmouth wireless network study used SNMP to query the college's Cisco 802.11b access points. The perl scripts that performed the SNMP queries suffered from some problems, in that they queried inappropriate SNMP values, or misunderstood the meaning of other values. This data was also used in a subsequent analysis. The same scripts were used to collect data for a subsequent study of another wireless network. This document outlines these problems and indicates which of the data collected by the original scripts may be invalid.
Composing A Well-Typed Region, Chris Hawblitzel, Heng Huang, Lea Wittie
Composing A Well-Typed Region, Chris Hawblitzel, Heng Huang, Lea Wittie
Computer Science Technical Reports
Efficient low-level systems need more control over memory than safe high-level languages usually provide. In particular, safe languages usually prohibit explicit deallocation, in order to prevent dangling pointers. Regions provide one safe deallocation mechanism; indeed, many region calculi have appeared recently, each with its own set of operations and often complex rules. This paper encodes regions from lower-level typed primitives (linear memory, coercions, and delayed types), so that programmers can design their own region operations and rules.
Location Of The Optical Reverse Shock In The Cassiopeia A Supernova Remnant, Jon A. Morse, Robert A. Fesen, Roger A. Chevalier, Kazimierz J. Borkowski
Location Of The Optical Reverse Shock In The Cassiopeia A Supernova Remnant, Jon A. Morse, Robert A. Fesen, Roger A. Chevalier, Kazimierz J. Borkowski
Dartmouth Scholarship
We use two epochs of Hubble Space Telescope WFPC2 images separated by 2 yr to determine the location and propagation of the reverse shock (RS) in the young supernova remnant Cassiopeia A (Cas A). The images trace optical line emission from fast-moving knots and filaments of highly processed ejecta as they cross the RS, become heated and compressed, and radiatively cool. At numerous positions around the optical shell, new emission features are seen in the 2002 images that were not yet visible in the 2000 exposures. In a few instances emission features seen in the first epoch have completely disappeared …
Dark-Matter Electric And Magnetic Dipole Moments, Kris Sigurdson, Michael Doran, Andriy Kurylov, Robert R. Caldwell, Marc Kamionkowski
Dark-Matter Electric And Magnetic Dipole Moments, Kris Sigurdson, Michael Doran, Andriy Kurylov, Robert R. Caldwell, Marc Kamionkowski
Dartmouth Scholarship
We consider the consequences of a neutral dark-matter particle with a nonzero electric and/or magnetic dipole moment. Theoretical constraints, as well as constraints from direct searches, precision tests of the standard-model, the cosmic microwave background and matter power spectra, and cosmic gamma rays, are included. We find that a relatively light particle with mass between an MeV and a few GeV and an electric or magnetic dipole as large as ∼3×10−16e cm (roughly 1.6×10−5μB) satisfies all experimental and observational bounds. Some of the remaining parameter space may be probed with forthcoming more sensitive direct searches and with the Gamma-Ray Large …
Performance Evaluation Of A Resource Discovery Service, Jue Wang
Performance Evaluation Of A Resource Discovery Service, Jue Wang
Dartmouth College Master’s Theses
In a pervasive computing environment, the number and variety of resources (services, devices, and contextual information resources) make it necessary for applications to accurately discover the best ones quickly. Thus a resource-discovery service, which locates specific resources and establishes network connections as better resources become available, is necessary for those applications. The performance of the resource-discovery service is important when the applications are in a dynamic and mobile environment. In this thesis, however, we do not focus on the resource- discovery technology itself, but the evaluation of the scalability and mobility of the resource discovery module in Solar, a context …
Mercer Kernels For Object Recognition With Local Features, Siwei Lyu
Mercer Kernels For Object Recognition With Local Features, Siwei Lyu
Computer Science Technical Reports
In this paper, we propose a new class of kernels for object recognition based on local image feature representations. Formal proofs are given to show that these kernels satisfy the Mercer condition and reflect similarities between sets of local features. In addition, multiple types of local features and semilocal constraints are incorporated to reduce mismatches between local features, thus further improve the classification performance. Experimental results of SVM classifiers coupled with the proposed kernels are reported on ecognition tasks with the standard COIL-100 database and compared with existing methods. The proposed kernels achieved satisfactory performance and were robust to changes …
Efficient Wait-Free Implementation Of Multiword Ll/Sc Variables, Prasad Jayanti, Srdjan Petrovic
Efficient Wait-Free Implementation Of Multiword Ll/Sc Variables, Prasad Jayanti, Srdjan Petrovic
Computer Science Technical Reports
Since the design of lock-free data structures often poses a formidable intellectual challenge, researchers are constantly in search of abstractions and primitives that simplify this design. The multiword LL/SC object is such a primitive: many existing algorithms are based on this primitive, including the nonblocking and wait-free universal constructions of Anderson and Moir (1995), the closed objects construction of Chandra et al.(1998) and the snapshot algorithms of Jayanti (2002, 2004). In this paper, we consider the problem of implementing a W-word LL/SC object shared by N processes. The previous best algorithm, due to Anderson and Moir (1995), is time optimal …
Automatic Image Orientation Determination With Natural Image Statistics, Siwei Lyu
Automatic Image Orientation Determination With Natural Image Statistics, Siwei Lyu
Computer Science Technical Reports
In this paper, we propose a new method for automatically determining image orientations. This method is based on a set of natural image statistics collected from a multi-scale multi-orientation image decomposition (e.g., wavelets). From these statistics, a two-stage hierarchal classification with multiple binary SVM classifiers is employed to de- termine image orientation. The proposed method is evaluated and compared to existing methods with experiments performed on 18040 natural images, where it showed promising performance.
Experimental Evaluation Of Wireless Simulation Assumptions, David Kotz, Calvin Newport, Robert S. Gray, Jason Liu, Yougu Yuan, Chip Elliot
Experimental Evaluation Of Wireless Simulation Assumptions, David Kotz, Calvin Newport, Robert S. Gray, Jason Liu, Yougu Yuan, Chip Elliot
Dartmouth Scholarship
All analytical and simulation research on ad hoc wireless networks must necessarily model radio propagation using simplifying assumptions. We provide a comprehensive review of six assumptions that are still part of many ad hoc network simulation studies, despite increasing awareness of the need to represent more realistic features, including hills, obstacles, link asymmetries, and unpredictable fading. We use an extensive set of measurements from a large outdoor routing experiment to demonstrate the weakness of these assumptions, and show how these assumptions cause simulation results to differ significantly from experimental results. We close with a series of recommendations for researchers, whether …
Noao Fundamental Plane Survey. I. Survey Design, Redshifts, And Velocity Dispersion Data, Russell J. Smith, Michael J. Hudson, Jenica E. Nelan, Stephen A. W Moore, Stephen J. Quinney, Gary A. Wegner, John R. Lucey, Roger L. Davies, Justin J. Malecki, David Schade, Nicholas B. Suntzeff
Noao Fundamental Plane Survey. I. Survey Design, Redshifts, And Velocity Dispersion Data, Russell J. Smith, Michael J. Hudson, Jenica E. Nelan, Stephen A. W Moore, Stephen J. Quinney, Gary A. Wegner, John R. Lucey, Roger L. Davies, Justin J. Malecki, David Schade, Nicholas B. Suntzeff
Dartmouth Scholarship
We introduce the NOAO Fundamental Plane Survey (NFPS), a wide-field imaging/spectroscopic study of rich, low-redshift galaxy clusters. The survey targets X-ray–selected clusters at 0.010 < z < 0.067, distributed over the whole sky, with imaging and spectroscopic observations obtained for 93 clusters. This data set will be used in investigations of galaxy properties in the cluster environment and of large-scale velocity fields through the fundamental plane. In this paper, we present details of the cluster sample construction and the strategies employed to select early-type galaxy samples for spectroscopy. Details of the spectroscopic observations are reported. From observations of 5479 red galaxies, we present redshift measurements for 5388 objects and internal velocity dispersions for 4131. The velocity dispersions have a median estimated error ~7%. The NFPS has ~15% overlap with previously published velocity dispersion data sets. Comparisons to these external catalogs are presented and indicate typical external errors of ~8%.
Kinematics Of X‐Ray–Emitting Components In Cassiopeia A, Tracey Delaney, Lawrence Rudnick, Robert A. Fesen, T. W. Jones
Kinematics Of X‐Ray–Emitting Components In Cassiopeia A, Tracey Delaney, Lawrence Rudnick, Robert A. Fesen, T. W. Jones
Dartmouth Scholarship
We present high-resolution X-ray proper-motion measurements of Cassiopeia A using Chandra X-Ray Observatory observations from 2000 and 2002. We separate the emission into four spectrally distinct classes: Si-dominated, Fe-dominated, low-energy-enhanced, and continuum-dominated. These classes also represent distinct spatial and kinematic components. The Si- and Fe-dominated classes are ejecta and have a mean expansion rate of 0.2% yr-1. This is the same as for the forward shock filaments but less than the 0.3% yr-1 characteristic of optical ejecta. The low-energy-enhanced spectral class possibly illuminates a clumpy circumstellar component and has a mean expansion rate of 0.05% yr-1. The continuum-dominated emission likely …
Oscillator Damped By A Constant-Magnitude Friction Force, Avi Marchewka, David S. Abbott, Robert J. Beichner
Oscillator Damped By A Constant-Magnitude Friction Force, Avi Marchewka, David S. Abbott, Robert J. Beichner
Dartmouth Scholarship
Although a simple spring/mass system damped by a friction force of constant magnitude shares many of the characteristics of the simple and damped harmonic oscillators, its solution is not presented in most texts. Closed form solutions for the turning and stopping points can be found using an energy-based approach. A dynamical approach leads to a closed form solution for the position of the mass as a function of time. The main result is that the amplitude of the oscillator damped by a constant magnitude friction force decreases by a constant amount each swing and the motion dies out after a …
Simulations Of Resonant Alfvén Waves Generated By Artificial Hf Heating Of The Auroral Ionosphere, D Pokhotelov, W Lotko, A V. Streltsov
Simulations Of Resonant Alfvén Waves Generated By Artificial Hf Heating Of The Auroral Ionosphere, D Pokhotelov, W Lotko, A V. Streltsov
Dartmouth Scholarship
Numerical two-dimensional two-fluid MHD sim- ulations of dynamic magnetosphere-ionosphere (MI) cou- pling have been performed to model the effects imposed on the auroral ionosphere by a powerful HF radio wave trans- mitter. The simulations demonstrate that modifications of the ionospheric plasma temperature and recombination due to artificial heating may trigger the ionospheric feedback in- stability when the coupled MI system is close to the state of marginal stability. The linear dispersion analysis of MI coupling has been performed to find the favorable conditions for marginal stability of the system. The development of the ionospheric feedback instability leads to the generation …
Creating And Detecting Doctored And Virtual Images: Implications To The Child Pornography Prevention Act, Hany Farid
Creating And Detecting Doctored And Virtual Images: Implications To The Child Pornography Prevention Act, Hany Farid
Computer Science Technical Reports
The 1996 Child Pornography Prevention Act (CPPA) extended the existing federal criminal laws against child pornography to include certain types of "virtual porn". In 2002, the United States Supreme Court found that portions of the CPPA, being overly broad and restrictive, violated First Amendment rights. The Court ruled that images containing an actual minor or portions of a minor are not protected, while computer generated images depicting a fictitious "computer generated" minor are constitutionally protected. In this report I outline various forms of digital tampering, placing them in the context of this recent ruling. I also review computational techniques for …
The Changing Usage Of A Mature Campus-Wide Wireless Network, Tristan Henderson, David Kotz, Ilya Abyzov
The Changing Usage Of A Mature Campus-Wide Wireless Network, Tristan Henderson, David Kotz, Ilya Abyzov
Dartmouth Scholarship
Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As “Wi-Fi” technology becomes ubiquitous, it is increasingly important to understand trends in the usage of these networks. \par This paper analyzes an extensive network trace from a mature 802.11 WLAN, including more than 550 access points and 7000 users over seventeen weeks. We employ several measurement techniques, including syslogs, telephone records, SNMP polling and tcpdump packet sniffing. This is the largest WLAN study to date, and the first to look at a large, mature WLAN and consider geographic mobility. We compare this trace to a …
Heterogeneous Self-Reconfiguring Robotics, Robert Charles Fitch
Heterogeneous Self-Reconfiguring Robotics, Robert Charles Fitch
Dartmouth College Ph.D Dissertations
Self-reconfiguring (SR) robots are modular systems that can autonomously change shape, or reconfigure, for increased versatility and adaptability in unknown environments. In this thesis, we investigate planning and control for systems of non-identical modules, known as heterogeneous SR robots. Although previous approaches rely on module homogeneity as a critical property, we show that the planning complexity of fundamental algorithmic problems in the heterogeneous case is equivalent to that of systems with identical modules. Primarily, we study the problem of how to plan shape changes while considering the placement of specific modules within the structure. We characterize this key challenge in …
The Oxford-Dartmouth Thirty Degree Survey - I. Observations And Calibration Of A Wide-Field Multiband Survey, Emily C. Macdonald, Paul Allen, Gavin Dalton, Leonidas A. Moustakas, Catherine Heymans, Edward Edmondso N, Chris Blake, Lee Clewley, Molly C. Hammell, Ed Olding, Lance Miller, Steve Rawlings, Jasper Wall, Gary Wegner, Christian Wolf
The Oxford-Dartmouth Thirty Degree Survey - I. Observations And Calibration Of A Wide-Field Multiband Survey, Emily C. Macdonald, Paul Allen, Gavin Dalton, Leonidas A. Moustakas, Catherine Heymans, Edward Edmondso N, Chris Blake, Lee Clewley, Molly C. Hammell, Ed Olding, Lance Miller, Steve Rawlings, Jasper Wall, Gary Wegner, Christian Wolf
Dartmouth Scholarship
The Oxford–Dartmouth Thirty Degree Survey (ODTS) is a deep, wide, multiband imaging survey designed to cover a total of 30 deg2 in BV Ri′Z, with a subset of U- and K-band data, in four separate fields of 5–10 deg2 centred at 00:18:24 +34:52, 09:09:45 +40:50, 13:40:00 +02:30 and 16:39:30 +45:24. Observations have been made using the Wide Field Camera on the 2.5-m Isaac Newton Telescope (INT) in La Palma to average limiting depths (5σ Vega, aperture magnitudes) of U= 24.8, B= 25.6, V= 25.0, R= 24.6 and i′= …
Casimir Force Between Eccentric Cylinders, D. A. R. Dalvit, F. C. Lombardo, F. D D. Mazzitelli, R Onofrio
Casimir Force Between Eccentric Cylinders, D. A. R. Dalvit, F. C. Lombardo, F. D D. Mazzitelli, R Onofrio
Dartmouth Scholarship
We consider the Casimir interaction between a cylinder and a hollow cylinder, both conducting, with parallel axis and slightly different radii. The Casimir force, which vanishes in the coaxial situation, is evaluated for both small and large eccentricities using the proximity approximation. The cylindrical configuration offers various experimental advantages with respect to the parallel planes or the plane-sphere geometries, leading to favourable conditions for the search of extra-gravitational forces in the micrometer range and for the observation of finite-temperature corrections.
Solar: Building A Context Fusion Network For Pervasive Computing, Guanling Chen
Solar: Building A Context Fusion Network For Pervasive Computing, Guanling Chen
Dartmouth College Ph.D Dissertations
The complexity of developing context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. In this dissertation, we present a Context Fusion Network (CFN), called Solar, which is built with a scalable and self-organized service overlay. Solar is flexible and allows applications to select distributed data sources and compose them with customized data-fusion operators into a directed acyclic information flow graph. Such a graph represents how an application computes high-level understandings of its execution context from low-level sensory data. To manage application-specified operators on a set of overlay nodes called Planets, Solar …