Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle Jan 2023

Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …


Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh Jul 2017

Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh

Research Collection School Of Computing and Information Systems

Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to understand the students learning and latest trends in industry. Mining Wikis is useful to educationists and academicians for decision-making about how to modify the educational environment to improve student's learning. The main challenge is that the content or data in project Wikis …


Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu May 2017

Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu

Information Science Faculty Publications

Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Jan 2007

Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Law Faculty Scholarship

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …


An Ad Hoc Adaptive Hashing Technique For Non-Uniformly Distributed Ip Address Lookup In Computer Networks, Christopher Martinez, Wei-Ming Lin Jan 2007

An Ad Hoc Adaptive Hashing Technique For Non-Uniformly Distributed Ip Address Lookup In Computer Networks, Christopher Martinez, Wei-Ming Lin

Electrical & Computer Engineering and Computer Science Faculty Publications

Hashing algorithms have been widely adopted for fast address look-up, which involves a search through a database to find a record associated with a given key. Hashing algorithms transforms a key into a hash value hoping that the hashing renders the database a uniform distribution with respect to the hash value. The closer to uniform hash values, the less search time required for a query. When the database is key-wise uniformly distributed, any regular hashing algorithm (bit-extraction, bit-group XOR, etc.) leads to a statistically perfect uniform hash distribution. When the database has keys with a non-uniform distribution, performance of regular …


Robust Control Techniques Enabling Duty Cycle Experiments Utilizing A 6-Dof Crewstation Motion Base, A Full Scale Combat Hybrid Electric Power System, And Long Distance Internet Communications, Marc Compere, Jarrett Goodell, Miguel Simon, Wilford Smith, Mark Brudnak Nov 2006

Robust Control Techniques Enabling Duty Cycle Experiments Utilizing A 6-Dof Crewstation Motion Base, A Full Scale Combat Hybrid Electric Power System, And Long Distance Internet Communications, Marc Compere, Jarrett Goodell, Miguel Simon, Wilford Smith, Mark Brudnak

Publications

The RemoteLink effort supports the U.S. Army's objective for developing and fielding next generation hybrid-electric combat vehicles. It is a distributed soldierin- the-Ioop and hardware-in-the-Ioop environment with a 6-DOF motion base for operator realism, a full-scale combat hybrid electric power system, and an operational context provided by OneSAF. The driver/gunner crewstations rest on one of two 6-DOF motion bases at the U.S. Army TARDEC Simulation Laboratory (TSL). The hybrid power system is located 2,450 miles away at the TARDEC Power and Energy System Integration Laboratory (P&E SIL). The primary technical challenge in the RemoteLink is to operate both laboratories together …


Robust Control Techniques For State Tracking In The Presence Of Variable Time Delays, Jarrett Goodell, Marc Compere, Miguel Simon, Wilford Smith, Ronnie Wright, Mark Brudnak Jan 2005

Robust Control Techniques For State Tracking In The Presence Of Variable Time Delays, Jarrett Goodell, Marc Compere, Miguel Simon, Wilford Smith, Ronnie Wright, Mark Brudnak

Publications

In this paper, a distributed driver-in-the-Ioop and hardware-in-the-Ioop simulator is described with a driver on a motion simulator at the U.S. Army TARDEC Ground Vehicle Simulation Laboratory (GVSL). Realistic power system response is achieved by linking the driver in the GVSL with a full-sized hybrid electric power system located 2,450 miles away at the TARDEC Power and Energy Systems Integration Laboratory (P&E SIL), which is developed and maintained by Science Applications International Corporation (SAIC). The goal is to close the loop between the GVSL and P&E SIL over the Internet to provide a realistic driving experience in addition to realistic …