Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 82

Full-Text Articles in Entire DC Network

Secure Context-Sensitive Authorization, Kazuhiro Minami, David Kotz Dec 2004

Secure Context-Sensitive Authorization, Kazuhiro Minami, David Kotz

Computer Science Technical Reports

There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to define context-sensitive rules, such as ``allow database access only to staff who are currently located in the main office.'' However, these rules, or the facts that are needed to verify authority, often involve sensitive context information. This paper presents a secure context-sensitive authorization system that protects confidential information in facts or rules. Furthermore, our system allows multiple hosts in a distributed environment to perform the evaluation of an authorization query in a collaborative way; we …


Structural Properties Of Discs And Bulges Of Early-Type Galaxies, Roelof S. De Jong, Luc Simard, Roger L. Davies, R. P. Saglia, David Burstein, Matthew Colless, Robert Mcmahan, Gary Wegner Dec 2004

Structural Properties Of Discs And Bulges Of Early-Type Galaxies, Roelof S. De Jong, Luc Simard, Roger L. Davies, R. P. Saglia, David Burstein, Matthew Colless, Robert Mcmahan, Gary Wegner

Dartmouth Scholarship

We have used the EFAR sample of galaxies to investigate the light distributions of early-type galaxies. We decompose the two-dimensional light distribution of the galaxies in a flattened spheroidal component with a Sérsic radial light profile and an inclined disc component with an exponential light profile. We show that if we assume that all galaxies can have a spheroidal and a disc component, then the brightest, bulge-dominated elliptical galaxies have a fairly broad distribution in the Sérsic profile shape parameter nB, with a median of approximately 3.7 and with σ∼ 0.9. Other galaxies have smaller nB values. …


Signature Of Electron Capture In Iron‐Rich Ejecta Of Sn 2003du, Peter Hoflich, Christopher L. Gerardy, Ken-Ichi Nomoto, Kentaro Motohara, Robert A. Fesen Dec 2004

Signature Of Electron Capture In Iron‐Rich Ejecta Of Sn 2003du, Peter Hoflich, Christopher L. Gerardy, Ken-Ichi Nomoto, Kentaro Motohara, Robert A. Fesen

Dartmouth Scholarship

Late-time near-infrared and optical spectra of the normal-bright Type Ia supernova 2003du about 300 days after the explosion are presented. At this late epoch, the emission profiles of well-isolated [Fe II] lines (in particular that of the strong 1.644 μm feature) trace out the global kinematic distribution of radioactive material in the expanding supernova ejecta. In SN 2003du, the 1.644 μm [Fe II] line seems to show a flat-topped profile, indicative of a thick but hollow-centered expanding shell, rather than a strongly peaked profile that would be expected from a "center-filled" distribution. Based on detailed models for exploding Chandrasekhar-mass white …


Optimal Cooling Strategies For Magnetically Trapped Atomic Fermi-Bose Mixtures, Michael Brown-Hayes, Roberto Onofrio Dec 2004

Optimal Cooling Strategies For Magnetically Trapped Atomic Fermi-Bose Mixtures, Michael Brown-Hayes, Roberto Onofrio

Dartmouth Scholarship

We discuss cooling efficiency for different-species Fermi-Bose mixtures in magnetic traps. A better heat capacity matching between the two atomic species is achieved by a proper choice of the Bose cooler and the magnetically trappable hyperfine states of the mixture. When a partial spatial overlap between the two species is also taken into account, the deepest Fermi degeneracy is obtained for an optimal value of the trapping frequency ratio between the two species. This can be achieved by assisting the magnetic trap with a deconfining light beam, as shown in the case of fermionic 6Li mixed with 23Na, 87Rb, and …


The Strange Physics Of Low Frequency Mirror Mode Turbulence In The High Temperature Plasma Of The Magnetosheath, R. A. Treumann, C. H. Jaroschek, O. D. Constantinescu, R. Nakamura Dec 2004

The Strange Physics Of Low Frequency Mirror Mode Turbulence In The High Temperature Plasma Of The Magnetosheath, R. A. Treumann, C. H. Jaroschek, O. D. Constantinescu, R. Nakamura

Dartmouth Scholarship

Mirror mode turbulence is the lowest frequency perpendicular magnetic excitation in magnetized plasma proposed already about half a century ago by Rudakov and Sagdeev (1958) and Chandrasekhar et al. (1958) from fluid theory. Its experimental verification required a relatively long time. It was early recognized that mirror modes for being excited require a transverse pressure (or temperature) anisotropy. In principle mirror modes are some version of slow mode waves. Fluid theory, however, does not give a correct physical picture of the mirror mode. The linear infinitesimally small amplitude physics is described correctly only by including the full kinetic theory and …


Statistical Tools For Digital Image Forensics, Alin C. Popescu Dec 2004

Statistical Tools For Digital Image Forensics, Alin C. Popescu

Dartmouth College Ph.D Dissertations

A digitally altered image, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic image. The tampering, however, may disturb some underlying statistical properties of the image. Under this assumption, we propose five techniques that quantify and detect statistical perturbations found in different forms of tampered images: (1) re-sampled images (e.g., scaled or rotated); (2) manipulated color filter array interpolated images; (3) double JPEG compressed images; (4) images with duplicated regions; and (5) images with inconsistent noise patterns. These techniques work in the absence of any embedded watermarks or signatures. For each technique we …


Discrete-Time Fractional Differentiation From Integer Derivatives, Hany Farid Dec 2004

Discrete-Time Fractional Differentiation From Integer Derivatives, Hany Farid

Computer Science Technical Reports

Discrete-time fractional derivative filters (1-D and 2-D) are shown to be well approximated from a small set of integer derivatives. A fractional derivative of arbitrary order (and, in 2-D, of arbitrary orientation) can therefore be efficiently computed from a linear combination of integer derivatives of the underlying signal or image.


Self‐Consistent Diffusive Lifetimes Of Weibel Magnetic Fields In Gamma‐Ray Bursts, C. H. Jaroschek, H. Lesch, R. A. Treumann Dec 2004

Self‐Consistent Diffusive Lifetimes Of Weibel Magnetic Fields In Gamma‐Ray Bursts, C. H. Jaroschek, H. Lesch, R. A. Treumann

Dartmouth Scholarship

Weibel filamentation in relativistic plasma shell collisions has been demonstrated as an efficient and fast mechanism for the generation of near-equipartition magnetic fields in self-consistent particle-in-cell (PIC) simulations. In generic γ-ray burst (GRB) models with kinetically dominated plasma outflow, sufficient strength and lifetime of magnetic fields are essential to validate synchrotron emission as the source of radiative outbursts. In this article we report on self-consistent PIC simulations of pair-plasma shell collisions in the highly relativistic regime with particle ensembles up to 5 × 108. Energy dependence of magnetic field generation in the Weibel process is discussed, and for …


Secure Hardware Enhanced Myproxy: A Ph.D. Thesis Proposal, John Marchesini, David Kotz Nov 2004

Secure Hardware Enhanced Myproxy: A Ph.D. Thesis Proposal, John Marchesini, David Kotz

Computer Science Technical Reports

In 1976, Whitfield Diffie and Martin Hellman demonstrated how "New Directions In Cryptography" could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed environments, we need an infrastructure for finding and trusting other parties' public keys (i.e., a PKI). A number of useful applications become possible with PKI. While the applications differ in how they use keys (e.g., S/MIME uses the key for message encryption and signing, while client-side SSL uses the key for authentication), all applications share one assumption: users have keypairs. In previous work, we …


A Million Secondchandraview Of Cassiopeia A, Una Hwang, J. Martin Laming, Carles Badenes, Fred Berendse, John Blondin, Denis Cioffi, Tracey Delaney, Daniel Dewey, Robert Fesen Nov 2004

A Million Secondchandraview Of Cassiopeia A, Una Hwang, J. Martin Laming, Carles Badenes, Fred Berendse, John Blondin, Denis Cioffi, Tracey Delaney, Daniel Dewey, Robert Fesen

Dartmouth Scholarship

We introduce a million second observation of the supernova remnant Cassiopeia A with the Chandra X-Ray Observatory. The bipolar structure of the Si-rich ejecta (northeast jet and southwest counterpart) is clearly evident in the new images, and their chemical similarity is confirmed by their spectra. These are most likely due to jets of ejecta as opposed to cavities in the circumstellar medium, since we can reject simple models for the latter. The properties of these jets and the Fe-rich ejecta will provide clues to the explosion of Cas A.


A Survey Of Wpa And 802.11i Rsn Authentication Protocols, Kwang-Hyun Baek, Sean W. Smith, David Kotz Nov 2004

A Survey Of Wpa And 802.11i Rsn Authentication Protocols, Kwang-Hyun Baek, Sean W. Smith, David Kotz

Computer Science Technical Reports

In the new standards for WLAN security, many choices exist for the authentication process. In this paper, we list eight desired properties of WLAN authentication protocols, survey eight recent authentication protocols, and analyze the protocols according to the desired properties.


Problems With The Dartmouth Wireless Snmp Data Collection, Tristan Henderson, David Kotz Oct 2004

Problems With The Dartmouth Wireless Snmp Data Collection, Tristan Henderson, David Kotz

Computer Science Technical Reports

The original Dartmouth wireless network study used SNMP to query the college's Cisco 802.11b access points. The perl scripts that performed the SNMP queries suffered from some problems, in that they queried inappropriate SNMP values, or misunderstood the meaning of other values. This data was also used in a subsequent analysis. The same scripts were used to collect data for a subsequent study of another wireless network. This document outlines these problems and indicates which of the data collected by the original scripts may be invalid.


Composing A Well-Typed Region, Chris Hawblitzel, Heng Huang, Lea Wittie Oct 2004

Composing A Well-Typed Region, Chris Hawblitzel, Heng Huang, Lea Wittie

Computer Science Technical Reports

Efficient low-level systems need more control over memory than safe high-level languages usually provide. In particular, safe languages usually prohibit explicit deallocation, in order to prevent dangling pointers. Regions provide one safe deallocation mechanism; indeed, many region calculi have appeared recently, each with its own set of operations and often complex rules. This paper encodes regions from lower-level typed primitives (linear memory, coercions, and delayed types), so that programmers can design their own region operations and rules.


Location Of The Optical Reverse Shock In The Cassiopeia A Supernova Remnant, Jon A. Morse, Robert A. Fesen, Roger A. Chevalier, Kazimierz J. Borkowski Oct 2004

Location Of The Optical Reverse Shock In The Cassiopeia A Supernova Remnant, Jon A. Morse, Robert A. Fesen, Roger A. Chevalier, Kazimierz J. Borkowski

Dartmouth Scholarship

We use two epochs of Hubble Space Telescope WFPC2 images separated by 2 yr to determine the location and propagation of the reverse shock (RS) in the young supernova remnant Cassiopeia A (Cas A). The images trace optical line emission from fast-moving knots and filaments of highly processed ejecta as they cross the RS, become heated and compressed, and radiatively cool. At numerous positions around the optical shell, new emission features are seen in the 2002 images that were not yet visible in the 2000 exposures. In a few instances emission features seen in the first epoch have completely disappeared …


Dark-Matter Electric And Magnetic Dipole Moments, Kris Sigurdson, Michael Doran, Andriy Kurylov, Robert R. Caldwell, Marc Kamionkowski Oct 2004

Dark-Matter Electric And Magnetic Dipole Moments, Kris Sigurdson, Michael Doran, Andriy Kurylov, Robert R. Caldwell, Marc Kamionkowski

Dartmouth Scholarship

We consider the consequences of a neutral dark-matter particle with a nonzero electric and/or magnetic dipole moment. Theoretical constraints, as well as constraints from direct searches, precision tests of the standard-model, the cosmic microwave background and matter power spectra, and cosmic gamma rays, are included. We find that a relatively light particle with mass between an MeV and a few GeV and an electric or magnetic dipole as large as ∼3×10−16e  cm (roughly 1.6×10−5μB) satisfies all experimental and observational bounds. Some of the remaining parameter space may be probed with forthcoming more sensitive direct searches and with the Gamma-Ray Large …


Performance Evaluation Of A Resource Discovery Service, Jue Wang Oct 2004

Performance Evaluation Of A Resource Discovery Service, Jue Wang

Dartmouth College Master’s Theses

In a pervasive computing environment, the number and variety of resources (services, devices, and contextual information resources) make it necessary for applications to accurately discover the best ones quickly. Thus a resource-discovery service, which locates specific resources and establishes network connections as better resources become available, is necessary for those applications. The performance of the resource-discovery service is important when the applications are in a dynamic and mobile environment. In this thesis, however, we do not focus on the resource- discovery technology itself, but the evaluation of the scalability and mobility of the resource discovery module in Solar, a context …


Mercer Kernels For Object Recognition With Local Features, Siwei Lyu Oct 2004

Mercer Kernels For Object Recognition With Local Features, Siwei Lyu

Computer Science Technical Reports

In this paper, we propose a new class of kernels for object recognition based on local image feature representations. Formal proofs are given to show that these kernels satisfy the Mercer condition and reflect similarities between sets of local features. In addition, multiple types of local features and semilocal constraints are incorporated to reduce mismatches between local features, thus further improve the classification performance. Experimental results of SVM classifiers coupled with the proposed kernels are reported on ecognition tasks with the standard COIL-100 database and compared with existing methods. The proposed kernels achieved satisfactory performance and were robust to changes …


Efficient Wait-Free Implementation Of Multiword Ll/Sc Variables, Prasad Jayanti, Srdjan Petrovic Oct 2004

Efficient Wait-Free Implementation Of Multiword Ll/Sc Variables, Prasad Jayanti, Srdjan Petrovic

Computer Science Technical Reports

Since the design of lock-free data structures often poses a formidable intellectual challenge, researchers are constantly in search of abstractions and primitives that simplify this design. The multiword LL/SC object is such a primitive: many existing algorithms are based on this primitive, including the nonblocking and wait-free universal constructions of Anderson and Moir (1995), the closed objects construction of Chandra et al.(1998) and the snapshot algorithms of Jayanti (2002, 2004). In this paper, we consider the problem of implementing a W-word LL/SC object shared by N processes. The previous best algorithm, due to Anderson and Moir (1995), is time optimal …


Automatic Image Orientation Determination With Natural Image Statistics, Siwei Lyu Oct 2004

Automatic Image Orientation Determination With Natural Image Statistics, Siwei Lyu

Computer Science Technical Reports

In this paper, we propose a new method for automatically determining image orientations. This method is based on a set of natural image statistics collected from a multi-scale multi-orientation image decomposition (e.g., wavelets). From these statistics, a two-stage hierarchal classification with multiple binary SVM classifiers is employed to de- termine image orientation. The proposed method is evaluated and compared to existing methods with experiments performed on 18040 natural images, where it showed promising performance.


Experimental Evaluation Of Wireless Simulation Assumptions, David Kotz, Calvin Newport, Robert S. Gray, Jason Liu, Yougu Yuan, Chip Elliot Oct 2004

Experimental Evaluation Of Wireless Simulation Assumptions, David Kotz, Calvin Newport, Robert S. Gray, Jason Liu, Yougu Yuan, Chip Elliot

Dartmouth Scholarship

All analytical and simulation research on ad hoc wireless networks must necessarily model radio propagation using simplifying assumptions. We provide a comprehensive review of six assumptions that are still part of many ad hoc network simulation studies, despite increasing awareness of the need to represent more realistic features, including hills, obstacles, link asymmetries, and unpredictable fading. We use an extensive set of measurements from a large outdoor routing experiment to demonstrate the weakness of these assumptions, and show how these assumptions cause simulation results to differ significantly from experimental results. We close with a series of recommendations for researchers, whether …


Noao Fundamental Plane Survey. I. Survey Design, Redshifts, And Velocity Dispersion Data, Russell J. Smith, Michael J. Hudson, Jenica E. Nelan, Stephen A. W Moore, Stephen J. Quinney, Gary A. Wegner, John R. Lucey, Roger L. Davies, Justin J. Malecki, David Schade, Nicholas B. Suntzeff Oct 2004

Noao Fundamental Plane Survey. I. Survey Design, Redshifts, And Velocity Dispersion Data, Russell J. Smith, Michael J. Hudson, Jenica E. Nelan, Stephen A. W Moore, Stephen J. Quinney, Gary A. Wegner, John R. Lucey, Roger L. Davies, Justin J. Malecki, David Schade, Nicholas B. Suntzeff

Dartmouth Scholarship

We introduce the NOAO Fundamental Plane Survey (NFPS), a wide-field imaging/spectroscopic study of rich, low-redshift galaxy clusters. The survey targets X-ray–selected clusters at 0.010 < z < 0.067, distributed over the whole sky, with imaging and spectroscopic observations obtained for 93 clusters. This data set will be used in investigations of galaxy properties in the cluster environment and of large-scale velocity fields through the fundamental plane. In this paper, we present details of the cluster sample construction and the strategies employed to select early-type galaxy samples for spectroscopy. Details of the spectroscopic observations are reported. From observations of 5479 red galaxies, we present redshift measurements for 5388 objects and internal velocity dispersions for 4131. The velocity dispersions have a median estimated error ~7%. The NFPS has ~15% overlap with previously published velocity dispersion data sets. Comparisons to these external catalogs are presented and indicate typical external errors of ~8%.


Kinematics Of X‐Ray–Emitting Components In Cassiopeia A, Tracey Delaney, Lawrence Rudnick, Robert A. Fesen, T. W. Jones Sep 2004

Kinematics Of X‐Ray–Emitting Components In Cassiopeia A, Tracey Delaney, Lawrence Rudnick, Robert A. Fesen, T. W. Jones

Dartmouth Scholarship

We present high-resolution X-ray proper-motion measurements of Cassiopeia A using Chandra X-Ray Observatory observations from 2000 and 2002. We separate the emission into four spectrally distinct classes: Si-dominated, Fe-dominated, low-energy-enhanced, and continuum-dominated. These classes also represent distinct spatial and kinematic components. The Si- and Fe-dominated classes are ejecta and have a mean expansion rate of 0.2% yr-1. This is the same as for the forward shock filaments but less than the 0.3% yr-1 characteristic of optical ejecta. The low-energy-enhanced spectral class possibly illuminates a clumpy circumstellar component and has a mean expansion rate of 0.05% yr-1. The continuum-dominated emission likely …


Oscillator Damped By A Constant-Magnitude Friction Force, Avi Marchewka, David S. Abbott, Robert J. Beichner Sep 2004

Oscillator Damped By A Constant-Magnitude Friction Force, Avi Marchewka, David S. Abbott, Robert J. Beichner

Dartmouth Scholarship

Although a simple spring/mass system damped by a friction force of constant magnitude shares many of the characteristics of the simple and damped harmonic oscillators, its solution is not presented in most texts. Closed form solutions for the turning and stopping points can be found using an energy-based approach. A dynamical approach leads to a closed form solution for the position of the mass as a function of time. The main result is that the amplitude of the oscillator damped by a constant magnitude friction force decreases by a constant amount each swing and the motion dies out after a …


Simulations Of Resonant Alfvén Waves Generated By Artificial Hf Heating Of The Auroral Ionosphere, D Pokhotelov, W Lotko, A V. Streltsov Sep 2004

Simulations Of Resonant Alfvén Waves Generated By Artificial Hf Heating Of The Auroral Ionosphere, D Pokhotelov, W Lotko, A V. Streltsov

Dartmouth Scholarship

Numerical two-dimensional two-fluid MHD sim- ulations of dynamic magnetosphere-ionosphere (MI) cou- pling have been performed to model the effects imposed on the auroral ionosphere by a powerful HF radio wave trans- mitter. The simulations demonstrate that modifications of the ionospheric plasma temperature and recombination due to artificial heating may trigger the ionospheric feedback in- stability when the coupled MI system is close to the state of marginal stability. The linear dispersion analysis of MI coupling has been performed to find the favorable conditions for marginal stability of the system. The development of the ionospheric feedback instability leads to the generation …


Creating And Detecting Doctored And Virtual Images: Implications To The Child Pornography Prevention Act, Hany Farid Sep 2004

Creating And Detecting Doctored And Virtual Images: Implications To The Child Pornography Prevention Act, Hany Farid

Computer Science Technical Reports

The 1996 Child Pornography Prevention Act (CPPA) extended the existing federal criminal laws against child pornography to include certain types of "virtual porn". In 2002, the United States Supreme Court found that portions of the CPPA, being overly broad and restrictive, violated First Amendment rights. The Court ruled that images containing an actual minor or portions of a minor are not protected, while computer generated images depicting a fictitious "computer generated" minor are constitutionally protected. In this report I outline various forms of digital tampering, placing them in the context of this recent ruling. I also review computational techniques for …


The Changing Usage Of A Mature Campus-Wide Wireless Network, Tristan Henderson, David Kotz, Ilya Abyzov Sep 2004

The Changing Usage Of A Mature Campus-Wide Wireless Network, Tristan Henderson, David Kotz, Ilya Abyzov

Dartmouth Scholarship

Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As “Wi-Fi” technology becomes ubiquitous, it is increasingly important to understand trends in the usage of these networks. \par This paper analyzes an extensive network trace from a mature 802.11 WLAN, including more than 550 access points and 7000 users over seventeen weeks. We employ several measurement techniques, including syslogs, telephone records, SNMP polling and tcpdump packet sniffing. This is the largest WLAN study to date, and the first to look at a large, mature WLAN and consider geographic mobility. We compare this trace to a …


Heterogeneous Self-Reconfiguring Robotics, Robert Charles Fitch Sep 2004

Heterogeneous Self-Reconfiguring Robotics, Robert Charles Fitch

Dartmouth College Ph.D Dissertations

Self-reconfiguring (SR) robots are modular systems that can autonomously change shape, or reconfigure, for increased versatility and adaptability in unknown environments. In this thesis, we investigate planning and control for systems of non-identical modules, known as heterogeneous SR robots. Although previous approaches rely on module homogeneity as a critical property, we show that the planning complexity of fundamental algorithmic problems in the heterogeneous case is equivalent to that of systems with identical modules. Primarily, we study the problem of how to plan shape changes while considering the placement of specific modules within the structure. We characterize this key challenge in …


The Oxford-Dartmouth Thirty Degree Survey - I. Observations And Calibration Of A Wide-Field Multiband Survey, Emily C. Macdonald, Paul Allen, Gavin Dalton, Leonidas A. Moustakas, Catherine Heymans, Edward Edmondso N, Chris Blake, Lee Clewley, Molly C. Hammell, Ed Olding, Lance Miller, Steve Rawlings, Jasper Wall, Gary Wegner, Christian Wolf Aug 2004

The Oxford-Dartmouth Thirty Degree Survey - I. Observations And Calibration Of A Wide-Field Multiband Survey, Emily C. Macdonald, Paul Allen, Gavin Dalton, Leonidas A. Moustakas, Catherine Heymans, Edward Edmondso N, Chris Blake, Lee Clewley, Molly C. Hammell, Ed Olding, Lance Miller, Steve Rawlings, Jasper Wall, Gary Wegner, Christian Wolf

Dartmouth Scholarship

The Oxford–Dartmouth Thirty Degree Survey (ODTS) is a deep, wide, multiband imaging survey designed to cover a total of 30 deg2 in BV RiZ, with a subset of U- and K-band data, in four separate fields of 5–10 deg2 centred at 00:18:24 +34:52, 09:09:45 +40:50, 13:40:00 +02:30 and 16:39:30 +45:24. Observations have been made using the Wide Field Camera on the 2.5-m Isaac Newton Telescope (INT) in La Palma to average limiting depths (5σ Vega, aperture magnitudes) of U= 24.8, B= 25.6, V= 25.0, R= 24.6 and i′= …


Casimir Force Between Eccentric Cylinders, D. A. R. Dalvit, F. C. Lombardo, F. D D. Mazzitelli, R Onofrio Aug 2004

Casimir Force Between Eccentric Cylinders, D. A. R. Dalvit, F. C. Lombardo, F. D D. Mazzitelli, R Onofrio

Dartmouth Scholarship

We consider the Casimir interaction between a cylinder and a hollow cylinder, both conducting, with parallel axis and slightly different radii. The Casimir force, which vanishes in the coaxial situation, is evaluated for both small and large eccentricities using the proximity approximation. The cylindrical configuration offers various experimental advantages with respect to the parallel planes or the plane-sphere geometries, leading to favourable conditions for the search of extra-gravitational forces in the micrometer range and for the observation of finite-temperature corrections.


Solar: Building A Context Fusion Network For Pervasive Computing, Guanling Chen Aug 2004

Solar: Building A Context Fusion Network For Pervasive Computing, Guanling Chen

Dartmouth College Ph.D Dissertations

The complexity of developing context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. In this dissertation, we present a Context Fusion Network (CFN), called Solar, which is built with a scalable and self-organized service overlay. Solar is flexible and allows applications to select distributed data sources and compose them with customized data-fusion operators into a directed acyclic information flow graph. Such a graph represents how an application computes high-level understandings of its execution context from low-level sensory data. To manage application-specified operators on a set of overlay nodes called Planets, Solar …