Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn
Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn
Williams Honors College, Honors Research Projects
Any well-versed Magic: The Gathering (MTG) player or collector knows how difficult it can be to keep track of all cards in their collection. Some spend hours searching for that one specific card, and others are constantly scouring the internet for how much their collection costs. However, this issue does not only affect casual fans. Resale companies spend hours a day determining the costs of cards, and tournament judges painstakingly check players’ decks to ensure they are not cheating. To assist with these struggles, the design team proposed to create the MTG Card Virtualizer. This device scans MTG playing cards …
Dbknot: A Transparent And Seamless, Pluggable Tamper Evident Database, Islam Khalil
Dbknot: A Transparent And Seamless, Pluggable Tamper Evident Database, Islam Khalil
Theses and Dissertations
Database integrity is crucial to organizations that rely on databases of important data. They suffer from the vulnerability to internal fraud. Database tampering by internal malicious employees with high technical authorization to their infrastructure or even compromised by externals is one of the important attack vectors.
This thesis addresses such challenge in a class of problems where data is appended only and is immutable. Examples of operations where data does not change is a) financial institutions (banks, accounting systems, stock market, etc., b) registries and notary systems where important data is kept but is never subject to change, and c) …
Wearable Ekg, Cale Hopkins, Tanner Papenfuss, Travis E. Michael
Wearable Ekg, Cale Hopkins, Tanner Papenfuss, Travis E. Michael
Computer Engineering
No abstract provided.