Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

Covert Shells, John Christian Smith Nov 2000

Covert Shells, John Christian Smith

John Christian Smith

The potential for covert communications exist anywhere that legitimate communication channels are in use. In order to maintain control of the channel once exploited, the insertion of a backdoor Trojan horse server, to be used with a client that provides shell access, is often a necessary prerequisite to establishing and using a covert channel long term.

We discuss covert channel communications methods ranging from embedded channels to disguised protocols. What follows is a review of available covert shell tools. The underground, historical evolution of covert shells is reviewed, focusing on selected, available tools, which range from simple encapsulation methods to …


Effect Of Carbopol And Polyvinylpyrrolidone On The Mechanical, Rheological, And Release Properties Of Bioadhesive Polyethylene Glycol Gels, Philadelphia University May 2000

Effect Of Carbopol And Polyvinylpyrrolidone On The Mechanical, Rheological, And Release Properties Of Bioadhesive Polyethylene Glycol Gels, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Enhancing Partitionable Group Membership Service In Asynchronous Distrib Systems, Marwa Mohamed Mansour May 2000

Enhancing Partitionable Group Membership Service In Asynchronous Distrib Systems, Marwa Mohamed Mansour

Archived Theses and Dissertations

No abstract provided.


Unified Matrix Processor Design For Fct-Iv And Fst-Iv Hartley Based Transforms, Philadelphia University Jan 2000

Unified Matrix Processor Design For Fct-Iv And Fst-Iv Hartley Based Transforms, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Personalizing The Gams Cross-Index, Saverio Perugini, Priya Lakshminarayanan, Naren Ramakrishnan Jan 2000

Personalizing The Gams Cross-Index, Saverio Perugini, Priya Lakshminarayanan, Naren Ramakrishnan

Computer Science Faculty Publications

The NIST Guide to Available Mathematical Software (GAMS) system at http://gams.nist .gov serves as the gateway to thousands of scientific codes and modules for numerical computation. We describe the PIPE personalization facility for GAMS, whereby content from the cross-index is specialized for a user desiring software recommendations for a specific problem instance. The key idea is to (i) mine structure, and (ii) exploit it in a programmatic manner to generate personalized web pages. Our approach supports both content-based and collaborative personalization and enables information integration from multiple (and complementary) web resources. We present case studies for the domain of linear, …


State-Based Reconstructability Modeling For Decision Analysis, Michael S. Johnson, Martin Zwick Jan 2000

State-Based Reconstructability Modeling For Decision Analysis, Michael S. Johnson, Martin Zwick

Systems Science Faculty Publications and Presentations

Reconstructability analysis (RA) is a method for detecting and analyzing the structure of multivariate categorical data. Jones and his colleagues extended the original variable-based formulation of RA to encompass models defined in terms of system states (Jones 1982; Jones 1985; Jones 1985; Jones 1986; Jones 1989). In this paper, we demonstrate that Jones’ previous work comprises two separable ideas: the “g to k” transformation and state-based modeling. We relate the concept of state-based modeling to established variable-based RA methods (Klir 1985; Krippendorff 1986), and demonstrate that statebased modeling, when applied to event and decision tree models, is a valuable adjunct …


Sicnn Optimisation, Two Dimensional Implementation And Comparison, Grant Walker Jan 2000

Sicnn Optimisation, Two Dimensional Implementation And Comparison, Grant Walker

Theses : Honours

The study investigates the process of optimisation, implementation and comparison of a Shunting Inhibitory Cellular Neural Network (SICNN) for Edge Detection. Shunting inhibition is lateral inhibition where the inhibition function is nonlinear. Cellular Neural Networks are locally interconnected nonlinear, parallel networks which can exist as either discrete time or continuous networks. The name given to Cellular Neural Networks that use shunting inhibition as their nonlinear cell interactions are called Shunting Inhibitory Cellular Neural Networks. This project report examines some existing edge detectors and thresholding techniques. Then it describes the optimisation of the connection weight matrix for SICNN with Complementary Output …


Extending Traditional Static Analysis Techniques To Support Development, Testing And Maintenance Of Component-Based Solutions, Robert David Cherinka Jan 2000

Extending Traditional Static Analysis Techniques To Support Development, Testing And Maintenance Of Component-Based Solutions, Robert David Cherinka

Computer Science Theses & Dissertations

Traditional static code analysis encompasses a mature set of techniques for helping understand and optimize programs, such as dead code elimination, program slicing, and partial evaluation (code specialization). It is well understood that compared to other program analysis techniques (e.g., dynamic analysis), static analysis techniques do a reasonable job for the cost associated with implementing them. Industry and government are moving away from more ‘traditional’ development approaches towards component-based approaches as ‘the norm.’ Component-based applications most often comprise a collection of distributed object-oriented components such as forms, code snippets, reports, modules, databases, objects, containers, and the like. These components are …