Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Old Dominion University (7)
- Air Force Institute of Technology (6)
- Selected Works (6)
- Grand Valley State University (4)
- Singapore Management University (4)
-
- University of Massachusetts Amherst (3)
- Cleveland State University (2)
- Embry-Riddle Aeronautical University (2)
- Portland State University (2)
- University of Nebraska - Lincoln (2)
- University of Pennsylvania Carey Law School (2)
- California Polytechnic State University, San Luis Obispo (1)
- California State University, San Bernardino (1)
- Edith Cowan University (1)
- Morehead State University (1)
- Syracuse University (1)
- University of Nevada, Las Vegas (1)
- Keyword
-
- Computer architecture (4)
- Internet (3)
- Virtual machine (3)
- Command and control languages (2)
- Command and control systems (2)
-
- Computer network architectures (2)
- Conceptual modeling (2)
- Electrical engineering (2)
- Parallels (2)
- Simulation (2)
- Symposia (2)
- VMware (2)
- Virtualization (2)
- 3d (1)
- ACT-R (1)
- Adaptive wireless scheduling QoS Heterogenous channel Buffer requirements Fairness (1)
- Adobe Flex (1)
- Algorithms (1)
- Algorithms--Data processing (1)
- And control information exchange Data Model (JC3IEDM) (1)
- And experimentation (MATREX) (1)
- Application specific customization (1)
- Army personnel (1)
- Artificial neural network (1)
- Assessment system (1)
- Automatic synthesis (1)
- BDI (1)
- BGP (1)
- Battle Management Language (BML) (1)
- Beamforming (1)
- Publication
-
- Computational Modeling & Simulation Engineering Faculty Publications (7)
- Theses and Dissertations (6)
- Culminating Experience Projects (4)
- Research Collection School Of Computing and Information Systems (4)
- Masters Theses 1911 - February 2014 (3)
-
- All Faculty Scholarship (2)
- Electrical and Computer Engineering Faculty Publications (2)
- Ray Bareiss (2)
- Australian Information Warfare and Security Conference (1)
- CSE Technical Reports (1)
- Computer Science Faculty Publications and Presentations (1)
- Dissertations and Theses (1)
- Electrical & Computer Engineering Faculty Research (1)
- Electrical Engineering and Computer Science - All Scholarship (1)
- Hong-Ning Dai (1)
- Information Technology Services: Publications (1)
- J. Philip Craiger, Ph.D. (1)
- Master's Theses (1)
- Morehead State Theses and Dissertations (1)
- Publications (1)
- Security Studies & International Affairs - Daytona Beach (1)
- Theses Digitization Project (1)
- Todd Sedano (1)
- Tony Wasserman (1)
- Publication Type
Articles 1 - 30 of 46
Full-Text Articles in Computer Engineering
Tailored Systems Architecture For Design Of Space Science And Technology Missions Using Dodaf V2.0, Nicholas J. Merski
Tailored Systems Architecture For Design Of Space Science And Technology Missions Using Dodaf V2.0, Nicholas J. Merski
Theses and Dissertations
The use of systems architecture, following a set of integrated descriptions from an architecture framework, has been well codified in Department of Defense acquisition and systems engineering. However, in the Space Science and Technology (S&T) community, this guidance and practice is not commonly adopted. This paper outlines an approach to leverage the changes made in DoD Architecture Framework 2.0 (DoDAF2.0), and the renewed emphasis on data and support to acquisition decision analysis. After decomposing the Space S&T design lifecycle into phases, design milestones and activities using process models, a set of DoDAF prescribed and Fit-for-Purpose views are constructed into a …
Performance Analysis Of Live-Virtual-Constructive And Distributed Virtual Simulations: Defining Requirements In Terms Of Temporal Consistency, Douglas D. Hodson
Performance Analysis Of Live-Virtual-Constructive And Distributed Virtual Simulations: Defining Requirements In Terms Of Temporal Consistency, Douglas D. Hodson
Theses and Dissertations
This research extends the knowledge of live-virtual-constructive (LVC) and distributed virtual simulations (DVS) through a detailed analysis and characterization of their underlying computing architecture. LVCs are characterized as a set of asynchronous simulation applications each serving as both producers and consumers of shared state data. In terms of data aging characteristics, LVCs are found to be first-order linear systems. System performance is quantified via two opposing factors; the consistency of the distributed state space, and the response time or interaction quality of the autonomous simulation applications. A framework is developed that defines temporal data consistency requirements such that the objectives …
Anaglym: A Graphics Engine Providing Secure Execution Of Applications, Josh Holtrop
Anaglym: A Graphics Engine Providing Secure Execution Of Applications, Josh Holtrop
Culminating Experience Projects
"The Anaglym graphics engine uses the Lua programming language as the high-level language in which to interpret Anaglym applications. Applications running inside Anaglym are Lua scripts that have a particular environment exposed to them. By default, when Lua is embedded inside a C or C++ host application, no Lua functions are available to the hosted script. Lua functions must be exported by the host environment to be callable by a Lua script."
Appraising Critical Infrastructure Systems With Visualisation, Graeme Pye, Matthew Warren
Appraising Critical Infrastructure Systems With Visualisation, Graeme Pye, Matthew Warren
Australian Information Warfare and Security Conference
This paper explores the use of system modelling as an approach for appraising critical infrastructure systems. It reports on focus group findings with relation to the system modelling aspects of a critical infrastructure security analysis and modelling framework. Specifically, this discussion focuses on the interpretations of a focus group in terms of the likely benefits or otherwise of system visualisation. With the group focusing on its perceived value as an educational tool in terms of providing an abstract visualisation representation of a critical infrastructure system incident.
The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo
The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo
All Faculty Scholarship
This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence …
A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White
A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White
Master's Theses
The size and speed of computer networks continue to expand at a rapid pace, as do the corresponding errors, failures, and faults inherent within such extensive networks. This thesis introduces a novel approach to interface Border Gateway Protocol (BGP) computer networks with neural networks to learn the precursor connectivity patterns that emerge prior to a node failure. Details of the design and construction of a framework that utilizes neural networks to learn and monitor BGP connection states as a means of detecting and predicting BGP peer node failure are presented. Moreover, this framework is used to monitor a BGP network …
A Clustering Based Discretization For Supervised Learning, Ankit Gupta, Kishan Mehrotra, Chilukuri K. Mohan
A Clustering Based Discretization For Supervised Learning, Ankit Gupta, Kishan Mehrotra, Chilukuri K. Mohan
Electrical Engineering and Computer Science - All Scholarship
We address the problem of discretization of continuous variables for machine learning classification algorithms. Existing procedures do not use interdependence between the variables towards this goal. Our proposed method uses clustering to exploit such interdependence. Numerical results show that this improves the classification performance in almost all cases. Even if an existing algorithm can successfully operate with continuous variables, better performance is obtained if variables are first discretized. An additional advantage of discretization is that it reduces the overall time-complexity.
Analysis Of Tradeoffs Between Buffer And Qos Requirements In Wireless Networks, Raphael Rom, Hwee-Pink Tan
Analysis Of Tradeoffs Between Buffer And Qos Requirements In Wireless Networks, Raphael Rom, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
In this paper, we consider the scheduling problem where data packets from K input-flows need to be delivered to K corresponding wireless receivers over a heterogeneous wireless channel. Our objective is to design a wireless scheduler that achieves good throughput and fairness performance while minimizing the buffer requirement at each wireless receiver. This is a challenging problem due to the unique characteristics of the wireless channel. We propose a novel idea of exploiting both the long-term and short-term error behavior of the wireless channel in the scheduler design. In addition to typical first-order Quality of Service (QoS) metrics such as …
Binary Usenet Application, Alexander J. Patterson
Binary Usenet Application, Alexander J. Patterson
Culminating Experience Projects
ANZBC software was written as a prototype to download small‐encoded files form Usenet servers. This software allows anything from a text document to a HD movie to be downloaded and decoded into a single file. Often this is a single file that is split into multiple small files and then compressed.
Exploiting Set-Level Non-Uniformity Of Capacity Demand To Enhance Cmp Cooperative Caching, Dongyuan Zhan, Hong Jiang, Sharad C. Seth
Exploiting Set-Level Non-Uniformity Of Capacity Demand To Enhance Cmp Cooperative Caching, Dongyuan Zhan, Hong Jiang, Sharad C. Seth
CSE Technical Reports
As the Memory Wall remains a bottleneck for Chip Multiprocessors (CMP), the effective management of CMP last level caches becomes of paramount importance in minimizing expensive off-chip memory accesses. For the CMPs with private last level caches, Cooperative Caching (CC) has been proposed to enable capacity sharing among private caches by spilling an evicted block from one cache to another. But this eviction-driven CC does not necessarily promote cache performance since it implicitly favors the applications full of block evictions regardless of their real capacity demand. The recent Dynamic Spill-Receive (DSR) paradigm improves cooperative caching by prioritizing applications with higher …
Admission Control For Differentiated Services In Future Generation Cdma Networks, Hwee-Pink Tan, Rudesindo Núñez-Queija, Adriana F. Gabor, Onno J. Boxma
Admission Control For Differentiated Services In Future Generation Cdma Networks, Hwee-Pink Tan, Rudesindo Núñez-Queija, Adriana F. Gabor, Onno J. Boxma
Research Collection School Of Computing and Information Systems
Future Generation CDMA wireless systems, e.g., 3G, can simultaneously accommodate flow transmissions of users with widely heterogeneous applications. As radio resources are limited, we propose an admission control rule that protects users with stringent transmission bit-rate requirements (“streaming traffic”) while offering sufficient capacity over longer time intervals to delay-tolerant users (“elastic traffic”). While our strategy may not satisfy classical notions of fairness, we aim to reduce congestion and increase overall throughput of elastic users. Using time-scale decomposition, we develop approximations to evaluate the performance of our differentiated admission control strategy to support integrated services with transmission bit-rate requirements in a …
Microsoft Silverlight Photography Framework: Comparing Component Based Designs In Adobe Flex And Microsoft Silverlight, David Roossien
Microsoft Silverlight Photography Framework: Comparing Component Based Designs In Adobe Flex And Microsoft Silverlight, David Roossien
Culminating Experience Projects
Flex and Silverlight provide large Application Programming Interfaces (API’s). Applications can be designed using a variety of architectures. The purpose of this paper is not to perform a complete comparison between Flex and Silverlight. To do such a comparison would require massive amounts of time and research. The purpose of this paper is to describe the design and implementation of the Silverlight photography framework project. Along the way this paper compares the Silverlight project to the Adobe Flex project and discusses the goals of each product. During the comparison many important similarities and differences between Silverlight and Flex technologies are …
Program Assessment System, Dyana Polderdyk
Program Assessment System, Dyana Polderdyk
Culminating Experience Projects
Today’s world is experiencing constant and rapid change in all areas of life. Progress and technology are the catalysts for the change, and the result is a continuous turnover of knowledge. It is essential for educational institutions to keep pace with the changes in order to turn out students that meet local and national employment requirements. Educational institutions are in need of an assessment system to measure the ongoing effectiveness of disciplines, curricula, programs and courses. The assessment system will provide the tools to develop, implement, manage, maintain and evaluate the efficiencies of educational programs. The input will include past …
Design And Implementation Of A Byzantine Fault Tolerance Framework For Web Services, Wenbing Zhao
Design And Implementation Of A Byzantine Fault Tolerance Framework For Web Services, Wenbing Zhao
Electrical and Computer Engineering Faculty Publications
Many Web services are expected to run with high degree of security and dependability. To achieve this goal, it is essential to use a Web services compatible framework that tolerates not only crash faults, but Byzantine faults as well, due to the untrusted communication environment in which the Web services operate. In this paper, we describe the design and implementation of such a framework, called BFT-WS. BFT-WS is designed to operate on top of the standard SOAP messaging framework for maximum interoperability. It is implemented as a pluggable module within the Axis2 architecture, as such, it requires minimum changes …
From General Technology Familiarity To Anti-Spyware Program Adoption: Comparison Between The U.S. And South Korea, Dong-Heon Kwak
From General Technology Familiarity To Anti-Spyware Program Adoption: Comparison Between The U.S. And South Korea, Dong-Heon Kwak
Morehead State Theses and Dissertations
A thesis presented to the faculty of the College of Business at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Dong-Heon Kwak on April 7, 2009.
Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang
Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang
Electrical and Computer Engineering Faculty Publications
A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed …
Where Does Your Institution Stand?, Wendell Brase, Mark Askren
Where Does Your Institution Stand?, Wendell Brase, Mark Askren
Information Technology Services: Publications
Media coverage of sustainability and "green" issues is hard to ignore these days. But less clear is a specific understanding of what this agenda means within higher ed IT organizations. For starters, it's useful to self-assess whether your campus is a leading innovator on all things "green" or satisfied to remain inconspicuous in the middle of the pack. If your institution is trailing but wants to assert a leadership role in environmental stewardship, you need to get engaged to understand what it will take to catch up and how IT can be a leader, not just a contributor, to such …
Methodology For Value-Driven Enterprise Architecture Development Goals: Application To Dodaf Framework, Justin W. Osgood
Methodology For Value-Driven Enterprise Architecture Development Goals: Application To Dodaf Framework, Justin W. Osgood
Theses and Dissertations
The Department of Defense Architectural Framework (DoDAF) describes 29 distinct views but offers limited guidance on view selection to meet system needs. This research extends the Value-Driven Enterprise Architecture Score (VDEA-Score) from a descriptive, evaluation protocol toward a prescriptive one by evaluating each DoDAF view and its contribution to the overall objective of the completed architecture. This extension of VDEA is referred to as VDEA-Development Goals (VDEA-DG). The program manager or other decision-makers may use this insight to justify the allocation of resources to the development of specific architecture views considered to provide maximum value. This research provides insight into …
The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis
The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis
Theses and Dissertations
This thesis examines the problem in initializing communications whereby cognitive radios need to find common spectrum with other cognitive radios, a process known as frequency rendezvous. It examines the rendezvous problem as it exists in a dynamic spectrum access cognitive network. Specifically, it addresses the problem of rendezvous in an infrastructureless environment. A new algorithm, the modular clock algorithm, is developed and analyzed as a solution for the simple rendezvous environment model, coupled with a modified version for environment models with less information. The thesis includes a taxonomy of commonly used environment models, and analysis of previous efforts to solve …
Dynamic Interactions For Network Visualization And Simulation, Cigdem Yetisti
Dynamic Interactions For Network Visualization And Simulation, Cigdem Yetisti
Theses and Dissertations
Most network visualization suites do not interact with a simulator, as it executes. Nor do they provide an effective user interface that includes multiple visualization functions. The subject of this research is to improve the network visualization presented in the previous research [5] adding these capabilities to the framework. The previous network visualization did not have the capability of altering specific visualization characteristics, especially when detailed observations needed to be made for a small part of a large network. Searching for a network event in this topology might cause large delays leading to lower quality user interface. In addition to …
Enhancing The Ns-2 Network Simulator For Near Real-Time Control Feedback And Distributed Simulation Breaks, John S. Weir
Enhancing The Ns-2 Network Simulator For Near Real-Time Control Feedback And Distributed Simulation Breaks, John S. Weir
Theses and Dissertations
A network simulator coupled with a visualization package enables the human visual system to analyze the results of network modeling as a supplement to analytical data analysis. This research takes the next step in network simulator and visualization suite interaction. A mediator (or run-time infrastructure (RTI) in the literature) provides researchers the potential to interact with a simulation as it executes. Utilizing TCP/IP sockets, the mediator has the capability to connect multiple visualization packages to a single simulation. This new tool allows researchers to change simulation parameters on the y without restarting the network simulation.
Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo
Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo
All Faculty Scholarship
The Federal Communications Commission’s recent Comcast decision has rejected categorical, ex ante restrictions on Internet providers’ ability to manage their networks in favor of a more flexible approach that examines each dispute on a case-by-case basis, as I have long advocated. This book chapter, written for a conference held in February 2009, discusses the considerations that a case-by-case approach should take into account. First, allowing the network to evolve will promote innovation by allowing the emergence of applications that depend on a fundamentally different network architecture. Indeed, as the universe of Internet users and applications becomes more heterogeneous, it is …
Is Parallel Programming Hard, And If So, Why?, Paul E. Mckenney, Maged M. Michael, Manish Gupta, Philip William Howard, Josh Triplett, Jonathan Walpole
Is Parallel Programming Hard, And If So, Why?, Paul E. Mckenney, Maged M. Michael, Manish Gupta, Philip William Howard, Josh Triplett, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Of the 200+ parallel-programming languages and environments created in the 1990s, almost all are now defunct. Given that parallel systems are now well within the budget of the typical hobbyist or graduate student, it is not unreasonable to expect a new cohort in excess of several thousand parallel languages and environments to appear in the 2010s. If this expected new cohort is to have more practical impact than did its 1990s counterpart, a robust and widely applicable framework will be required that encompasses exactly what, if anything, is hard about parallel programming. This paper revisits the fundamental precepts of concurrent …
Integrated Cognitive Architectures: A Survey, Hui-Qing Chong, Ah-Hwee Tan, Gee-Wah Ng
Integrated Cognitive Architectures: A Survey, Hui-Qing Chong, Ah-Hwee Tan, Gee-Wah Ng
Research Collection School Of Computing and Information Systems
This article aims to present an account of the state of the art research in the field of integrated cognitive architectures by providing a review of six cognitive architectures, namely Soar, ACT-R, ICARUS, BDI, the subsumption architecture and CLARION. We conduct a detailed functional comparison by looking at a wide range of cognitive components, including perception, memory, goal representation, planning, problem solving, reasoning, learning, and relevance to neurobiology. In addition, we study the range of benchmarks and applications that these architectures have been applied to. Although no single cognitive architecture has provided a full solution with the level of human …
Application Specific Customization And Scalability Of Soft Multiprocessors, Deepak C. Unnikrishnan
Application Specific Customization And Scalability Of Soft Multiprocessors, Deepak C. Unnikrishnan
Masters Theses 1911 - February 2014
Soft multiprocessor systems exploit the plentiful computational resources available in field programmable devices. By virtue of their adaptability and ability to support coarse grained parallelism, they serve as excellent platforms for rapid prototyping and design space exploration of embedded multiprocessor applications. As complex applications emerge, careful mapping, processor and interconnect customization are critical to the overall performance of the multiprocessor system. In this thesis, we have developed an automated scalable framework to efficiently map applications written in a high-level programmer-friendly language to customizable soft-cores. The framework allows the user to specify the application in a high-level language called Streamit. After …
Implementation Of Data Path Credentials For High-Performance Capabilities-Based Networks, Kamlesh T. Vasudevan
Implementation Of Data Path Credentials For High-Performance Capabilities-Based Networks, Kamlesh T. Vasudevan
Masters Theses 1911 - February 2014
Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any destination, routers deny forwarding by default. For a successful transmission, packets need to positively identify themselves and their permissions to the router. A major challenge for a high performance implementation of such a network is an efficient design of the credentials that are carried in the packet and the verification procedure on the router. A network protocol that implements data path credentials based on Bloom filters is presented in this thesis. Our prototype implementation shows …
A Hardware Framework For Yield And Reliability Enhancement In Chip Multiprocessors, Abhisek Pan
A Hardware Framework For Yield And Reliability Enhancement In Chip Multiprocessors, Abhisek Pan
Masters Theses 1911 - February 2014
Device reliability and manufacturability have emerged as dominant concerns in end-of-road CMOS devices. Today an increasing number of hardware failures are attributed to device reliability problems that cause partial system failure or shutdown. Also maintaining an acceptable manufacturing yield is seen as challenge because of smaller feature sizes, process variation, and reduced headroom for burn-in tests. In this project we investigate a hardware-based scheme for improving yield and reliability of a homogeneous chip multiprocessor (CMP). The proposed solution involves a hardware framework that enables us to utilize the redundancies inherent in a multi-core system to keep the system operational in …
Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler
Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler
Security Studies & International Affairs - Daytona Beach
"This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info."--from the article
Conceptual Requirements For Command And Control Languages, Andreas Tolk, Curtis L. Blais, Saikou Y. Diallo, Charles Turnitsa
Conceptual Requirements For Command And Control Languages, Andreas Tolk, Curtis L. Blais, Saikou Y. Diallo, Charles Turnitsa
Computational Modeling & Simulation Engineering Faculty Publications
The current Coalition Battle Management Language initiative (C-BML) will define a language to unambiguously exchange command and control information between systems. This paper introduces a categorization that may be used to guide the process of developing C-BML effectively by enumerating the conceptual requirements the authors have identified in model-based data engineering and process engineering based studies in various domains.
First, it is important to distinguish if application of the language will support the planning, execution, or observation phase of command and control. While C-BML already distinguishes between tasking and reporting, planning is a category with different requirements.
Second, the language …
Harmonizing Bml Approaches: Grammars And Data Models For A Bml Standard, Dietmar Kunde, Thomas Orichel, Andreas Tolk, Ulrich Schade, Michael R. Hieb
Harmonizing Bml Approaches: Grammars And Data Models For A Bml Standard, Dietmar Kunde, Thomas Orichel, Andreas Tolk, Ulrich Schade, Michael R. Hieb
Computational Modeling & Simulation Engineering Faculty Publications
Battle Management Language (BML) is being developed as an open standard that unambiguously formalizes and specifies Command and Control information, including orders and reports built upon precise representations of tasks. BML is a language specification, based on doctrine and consistent with Coalition standards. The goal of BML is to enable and improve the interoperability in the C2 area, especially by enabling also the military communication with simulation systems and future robotic forces.
Although the need for BML is well documented, a SISO standard has still not been achieved. At present, there are two recommended approaches focusing on different aspects. In …