Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Computer Engineering

2003

Institution
Keyword
Publication
Publication Type

Articles 211 - 225 of 225

Full-Text Articles in Engineering

Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb Jan 2003

Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb

Theses : Honours

Many organisations and individuals installing wireless local area networks (WLANs), which are based on the IEEE 802.11 b standard, have little understanding of the security issues that surround this technology.

This study was initiated to determine how WLAN security issues affect organisations in Perth, Western Australia. The scope of the study was restricted to 802.llb WLANs operating in infrastructure mode, where all traffic is transmitted by wireless access points (APs). This study was conducted in two phases. The general aims of the first phase were to determine the number of detectable WLANs in the Perth Central Business District (CBD) and …


Access To Networks: Economic And Constitutional Connections, Daniel F. Spulber, Christopher S. Yoo Jan 2003

Access To Networks: Economic And Constitutional Connections, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

A fundamental transformation is taking place in the basic approach to regulating network industries. Policy makers are in the process of abandoning their century-old commitment to rate regulation in favor of a new regulatory approach known as access regulation. Rather than controlling the price of outputs, the new approach focuses on compelling access to and mandating the price of inputs. Unfortunately, this shift in regulatory policy has not been met with an accompanying shift in the manner in which regulatory authorities regulate prices. Specifically, policy makers have continued to base rates on either historical or replacement cost. We argue that …


A University Wide Smart Card System, Philip Cummins Jan 2003

A University Wide Smart Card System, Philip Cummins

Theses : Honours

Presently, many tertiary educational institutions utilise card technologies for staff and student identification and the support of other related services within the institution. A new type of card technology has been developed known as a Smart Card, where an existing plastic card has an embedded integrated circuit and is capable of expanding the range of applications and services capable within an institution. This thesis will detail the advantages that these new Smart Cards have over existing institution cards, detail other institution's attempts to use Smart Cards and finally, this thesis proposes a suitable system for integrating Smart Cards into an …


Identity Management, Duncan A. Buell, Ravi Sandhu Jan 2003

Identity Management, Duncan A. Buell, Ravi Sandhu

Faculty Publications

No abstract provided.


The Sentient Web, Michael N. Huhns Jan 2003

The Sentient Web, Michael N. Huhns

Faculty Publications

In a startling revelation, a team of university scientists has reported that a network of computers has become conscious and sentient, and is beginning to assume control of online information system. In spite of the ominous tone typically chosen for dramatic effect, a sentient Web would be more helpful and much easier for people to use. An agent is an active, persistent software component that perceives, reasons, and acts, and whose actions include communication. Agents inherently take intentional actions based on sensory information and memories of past actions. All agents have necessary communication ability, but they do not necessarily possess …


Commitments Among Agents, Ashok U. Mallya, Michael N. Huhns Jan 2003

Commitments Among Agents, Ashok U. Mallya, Michael N. Huhns

Faculty Publications

Commitments are a powerful representation for modeling multiagent interactions. Previous approaches have considered the semantics of commitments and how to check compliance with them. However, these approaches do not capture some of the subtleties that arise in real-life applications such as e-commerce, in which contracts and institutions have implicit temporal references. In this column, we describe a rich representation for the temporal content of commitments that lets us capture realistic contracts and avoid ambiguities. Consequently, this approach lets us reason about whether, and at what point, a commitment is satisfied or breached, and whether it is or ever becomes unenforceable.


Being And Acting Rational, Michael N. Huhns Jan 2003

Being And Acting Rational, Michael N. Huhns

Faculty Publications

Rationality alone is insufficient to specify agent design. Using economic theory, we can program agents to behave in ways that maximize their utility while responding to environmental changes. However, economic models for agents, although general in principle, are typically limited in practice because the value functions that are tractable essentially reduce an agent to acting selfishly. Building a stable social system from a collection of agents motivated by self-serving interests is difficult. Finally, understanding rationality and knowledge requires interdisciplinary results from artificial intelligence, distributed.


Under The Plastic: A Quantitative Look At Dvd Video Encoding And Its Impact On Video Modeling, Wu-Chi Feng, Jin Choi, Wu-Chang Feng, Jonathan Walpole Jan 2003

Under The Plastic: A Quantitative Look At Dvd Video Encoding And Its Impact On Video Modeling, Wu-Chi Feng, Jin Choi, Wu-Chang Feng, Jonathan Walpole

Computer Science Faculty Publications and Presentations

In this paper, we examine the DVD encoding process and the implications this process has video modeling and network traffic analysis. We have assembled a system that allows us to extract the video data from the DVDs as they were encoded for distribution. Analyzing the resulting video trace data, we describe how DVD encodings have evolved over time. In addition, our findings show that the underlying video content is fundamentally different than those produced by basic consumer video capture boards. We demonstrate how this affects current video modeling proposals and their affect on network traffic characterization. This research is based …


Dsp Processor Based Vision Processing And System Integration For Control Of Laser Aided Manufacturing Process (Lamp), Srinivas Musti Jan 2003

Dsp Processor Based Vision Processing And System Integration For Control Of Laser Aided Manufacturing Process (Lamp), Srinivas Musti

Masters Theses

"This thesis presents the research and development of a real-time vision system and integration of various subsystems to build the hybrid system for the Laser aided manufacturing process (LAMP), being developed at the University of Missouri--Rolla. A description of the real-time control architecture, showing the interaction of the real-time controller with various sensors and subsystems to monitor and regulate the process is presented.

Control of melt pool geometry is important for ensuring the final product quality since the bead size significantly influences the joint strength. However, during the deposition process, impurities and the plume present around the pool complicate the …


A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu Jan 2003

A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu

Theses: Doctorates and Masters

Malicious executable code is nothing new. While many consider that the concept of malicious code began in the 1980s when the first PC viruses began to emerge, the concept does in fact date back even earlier. Throughout the history of malicious code, methods of hostile code delivery have mirrored prevailing patterns of code distribution. In the 1980s, file infecting and boot sector viruses were common, mirroring the fact that during this time, executable code was commonly transferred via floppy disks. Since the 1990s email has been a major vector for malicious code attacks. Again, this mirrors the fact that during …


The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai Jan 2003

The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai

Theses: Doctorates and Masters

The information required for decision making by executives in organizations is normally scattered across disparate data sources including databases and legacy systems. To gain a competitive advantage, it is extremely important for executives to be able to obtain one unique view of information in an accurate and timely manner. To do this, it is necessary to interoperate multiple data sources, which differ structurally and semantically. Particular problems occur when applying traditional integration approaches, for example, the global schema needs to be recreated when the component schema has been modified. This research investigates the following heterogeneities between heterogeneous data sources: Data …


Automatic Human Face Detection In Color Images, Son Lam Phung Jan 2003

Automatic Human Face Detection In Color Images, Son Lam Phung

Theses: Doctorates and Masters

Automatic human face detection in digital image has been an active area of research over the past decade. Among its numerous applications, face detection plays a key role in face recognition system for biometric personal identification, face tracking for intelligent human computer interface (HCI), and face segmentation for object-based video coding. Despite significant progress in the field in recent years, detecting human faces in unconstrained and complex images remains a challenging problem in computer vision. An automatic system that possesses a similar capability as the human vision system in detecting faces is still a far-reaching goal. This thesis focuses on …


Database Development And Intranet Based Image Included Database Management System For Ballistic Firearm Identification System, Toni C. Jiao Jan 2003

Database Development And Intranet Based Image Included Database Management System For Ballistic Firearm Identification System, Toni C. Jiao

Theses: Doctorates and Masters

The process of imaging, collecting and searching a cartridge case to identifying its suspected firearm is a time consuming procedure. Within this study, a cartridge case identification database management system in an Intranet environment is designed and implemented, thus enabling firearm examiners from different forensic laboratories to engage firearm identification without the constraints of time and location. Specifically, the study investigates appropriate database management system for image involved and Intranet secured ballistics firearm identification database. The results demonstrated that a computerized firearm identification system could be implemented in Intranet with a secure, scalable, performable Intranet database management system.


Consensus Software: Robustness And Social Good, Michael N. Huhns Jan 2003

Consensus Software: Robustness And Social Good, Michael N. Huhns

Faculty Publications

In this column I explore some far-reaching issues of software development that lie at the intersection of robust software and sociopolitical systems. These two areas might seem unrelated-and most software developers would likely be horrified to have politics intrude on their programming efforts-but the intersection occurs through these premises: software systems administer and control much of our societal infrastructure; people would appreciate and better accept that control if they had input into the nature of the control and the systems' behavior; designers can make software systems more robust through redundancy, in which different versions of software components might cover for …


Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta Jan 2003

Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta

Theses: Doctorates and Masters

Over the last few years, incidents of network based intrusions have rapidly increased, due to the increase and popularity of various attack tools easily available for download from the Internet. Due to this increase in intrusions, the concept of a network defence known as Honeypots developed. These honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. Deception exists in various forms. It is a tactic to survive and defeat the motives of attackers. Due to its presence in the nature, deception …