Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2009

Institution
Keyword
Publication
Publication Type
File Type

Articles 61 - 83 of 83

Full-Text Articles in Computer Engineering

Automated Virtual Machine Introspection For Host-Based Intrusion Detection, Brett A. Pagel Feb 2009

Automated Virtual Machine Introspection For Host-Based Intrusion Detection, Brett A. Pagel

Theses and Dissertations

This thesis examines techniques to automate configuration of an intrusion detection system utilizing hardware-assisted virtualization. These techniques are used to detect the version of a running guest operating system, automatically configure version-specific operating system information needed by the introspection library, and to locate and monitor important operating system data structures. This research simplifies introspection library configuration and is a step toward operating system independent introspection. An operating system detection algorithm and Windows virtual machine system service dispatch table monitor are implemented using the Xen hypervisor and a modified version of the XenAccess library. All detection and monitoring is implemented from …


Adaptive Control Of Woofer-Tweeter Adaptive Optics, Jimmie J. Perez Feb 2009

Adaptive Control Of Woofer-Tweeter Adaptive Optics, Jimmie J. Perez

Theses and Dissertations

Adaptive optics applies advanced sensing and control to improve the ability of optical systems to collect images through a turbulent atmosphere. The results of this research effort demonstrate that the combination of two recent approaches improves the performance of adaptive optics in directed energy and laser communication scenarios. The first approach is adaptive control, which offers improved performance over fixed-gain controllers in the presence of rapidly changing turbulence. The second approach incorporated into the study is a dual-mirror system. The two mirrors are a high-bandwidth, low-actuator-stroke (tweeter) mirror and a low-bandwidth, large actuator-stroke (woofer) mirror. The woofer-tweeter combination allows for …


Subjective Audio Quality Over A Secure Ieee 802.11n Draft 2.0 Wireless Local Area Network, Benjamin W. Ramsey Feb 2009

Subjective Audio Quality Over A Secure Ieee 802.11n Draft 2.0 Wireless Local Area Network, Benjamin W. Ramsey

Theses and Dissertations

This thesis investigates the quality of audio generated by a G.711 codec and transmission over an IEEE 802.11n draft 2.0 wireless local area network (WLAN). Decline in audio quality due to additional calls or by securing the WLAN with transport mode Internet Protocol Security (IPsec) is quantified. Audio quality over an IEEE 802.11n draft 2.0 WLAN is also compared to that of IEEE 802.11b and IEEE 802.11g WLANs under the same conditions. Audio quality is evaluated by following International Telecommunication Union Telecommunication Standardization Sector (ITU-T) Recommendation P.800, where human subjects rate audio clips recorded during various WLAN configurations. The Mean …


An Fpga-Based System For Tracking Digital Information Transmitted Via Peer-To-Peer Protocols, Karl R. Schrader Feb 2009

An Fpga-Based System For Tracking Digital Information Transmitted Via Peer-To-Peer Protocols, Karl R. Schrader

Theses and Dissertations

This thesis addresses the problem of identifying and tracking digital information that is shared using peer-to-peer file transfer and Voice over IP (VoIP) protocols. The goal of the research is to develop a system for detecting and tracking the illicit dissemination of sensitive government information using file sharing applications within a target network, and tracking terrorist cells or criminal organizations that are covertly communicating using VoIP applications. A digital forensic tool is developed using an FPGA-based embedded software application. The tool is designed to process file transfers using the BitTorrent peer-to-peer protocol and VoIP phone calls made using the Session …


An Approach Of Optimized Utilization Of Battery Backup In Manet, Vijay Singh Feb 2009

An Approach Of Optimized Utilization Of Battery Backup In Manet, Vijay Singh

vijay singh

No abstract provided.


Novel Materialized View Selection In A Multidimensional Database, Vijay Singh Feb 2009

Novel Materialized View Selection In A Multidimensional Database, Vijay Singh

vijay singh

No abstract provided.


Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo Feb 2009

Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo

All Faculty Scholarship

The Federal Communications Commission’s recent Comcast decision has rejected categorical, ex ante restrictions on Internet providers’ ability to manage their networks in favor of a more flexible approach that examines each dispute on a case-by-case basis, as I have long advocated. This book chapter, written for a conference held in February 2009, discusses the considerations that a case-by-case approach should take into account. First, allowing the network to evolve will promote innovation by allowing the emergence of applications that depend on a fundamentally different network architecture. Indeed, as the universe of Internet users and applications becomes more heterogeneous, it is …


Implementation Of Data Path Credentials For High-Performance Capabilities-Based Networks, Kamlesh T. Vasudevan Jan 2009

Implementation Of Data Path Credentials For High-Performance Capabilities-Based Networks, Kamlesh T. Vasudevan

Masters Theses 1911 - February 2014

Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any destination, routers deny forwarding by default. For a successful transmission, packets need to positively identify themselves and their permissions to the router. A major challenge for a high performance implementation of such a network is an efficient design of the credentials that are carried in the packet and the verification procedure on the router. A network protocol that implements data path credentials based on Bloom filters is presented in this thesis. Our prototype implementation shows …


One Stop Information Site, Poongkuzhali Dhanasekaran Jan 2009

One Stop Information Site, Poongkuzhali Dhanasekaran

Theses Digitization Project

The purpose of this project is to construct a website to provide users with interactive, daily information such as weather, traffic alerts, news, restaurant, etc. in one easy accessible site. Contains source code.


High-Performance Broadcast And Multicast Protocols For Multi-Radio Multi-Channel Wireless Mesh Networks, Jun Wang Jan 2009

High-Performance Broadcast And Multicast Protocols For Multi-Radio Multi-Channel Wireless Mesh Networks, Jun Wang

Electrical & Computer Engineering Theses & Dissertations

Recently, wireless mesh networks (WMNs) have attracted much attention. A vast amount of unicast, multicast and broadcast protocols has been developed for WMNs or mobile ad hoc networks (MANETs). First of all, broadcast and multicast in wireless networks are fundamentally different from the way in which wired networks function due to the well-known wireless broadcast/multicast advantage. Moreover, most broadcast and multicast protocols in wireless networks assume a single-radio single-channel and single-rate network model, or a generalized physical model, which does not take into account the impact of interference. This dissertation focuses on high-performance broadcast and multicast protocols designed for multi-radio …


Supporting Protocols For Structuring And Intelligent Information Dissemination In Vehicular Ad Hoc Networks, Filip Cuckov Jan 2009

Supporting Protocols For Structuring And Intelligent Information Dissemination In Vehicular Ad Hoc Networks, Filip Cuckov

Electrical & Computer Engineering Theses & Dissertations

The goal of this dissertation is the presentation of supporting protocols for structuring and intelligent data dissemination in vehicular ad hoc networks (VANETs). The protocols are intended to first introduce a structure in VANETs, and thus promote the spatial reuse of network resources. Segmenting a flat VANET in multiple cluster structures allows for more efficient use of the available bandwidth, which can effectively increase the capacity of the network. The cluster structures can also improve the scalability of the underlying communication protocols. The structuring and maintenance of the network introduces additional overhead. The aim is to provide a mechanism for …


Survivable Mesh-Network Design & Optimization To Support Multiple Qop Service Classes, Hoang N. Nguyen Jan 2009

Survivable Mesh-Network Design & Optimization To Support Multiple Qop Service Classes, Hoang N. Nguyen

Theses: Doctorates and Masters

Every second, vast amounts of data are transferred over communication systems around the world, and as a result, the demands on optical infrastructures are extending beyond the traditional, ring-based architecture. The range of content and services available from the Internet is increasing, and network operations are constantly under pressure to expand their optical networks in order to keep pace with the ever increasing demand for higher speed and more reliable links.


Multicast Encryption Infrastructure For Security In Sensor Networks, Richard R. Brooks, Brijesh Pillai, Matthew Pirretti, Michele C. Weigle Jan 2009

Multicast Encryption Infrastructure For Security In Sensor Networks, Richard R. Brooks, Brijesh Pillai, Matthew Pirretti, Michele C. Weigle

Computer Science Faculty Publications

Designing secure sensor networks is difficult. We propose an approach that uses multicast communications and requires fewer encryptions than pairwise communications. The network is partitioned into multicast regions; each region is managed by a sensor node chosen to act as a keyserver. The keyservers solicit nodes in their neighborhood to join the local multicast tree. The keyserver generates a binary tree of keys to maintain communication within the multicast region using a shared key. Our approach supports a distributed key agreement protocol that identifies the compromised keys and supports membership changes with minimum system overhead. We evaluate the overhead of …


Minimizing Spatial And Time Reservation With Collision-Aware Dcf In Mobile Ad Hoc Networks, Lubo Song, Chansu Yu Jan 2009

Minimizing Spatial And Time Reservation With Collision-Aware Dcf In Mobile Ad Hoc Networks, Lubo Song, Chansu Yu

Electrical and Computer Engineering Faculty Publications

Carrier sensing is widely adopted in wireless communication to protect data transfers from collisions. For example, distributed coordination function (DCF) in IEEE 802.11 standard renders a node to defer its communication if it senses the medium busy. For the duration of deferment, each frame carries, in its MAC header, a 16-bit number in microseconds during which any overhearing node must defer. However, even if the carrier signal is detected, both ongoing and a new communication can be simultaneously successful depending on their relative positions in the network or equivalently, their mutual interference level. Supporting multiple concurrent communications is …


A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy Jan 2009

A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy

Articles

A principal weakness of all encryption systems is that the output data can be ‘seen’ to be encrypted. In other words, encrypted data provides a ‘flag’ on the potential value of the information that has been encrypted. In this paper, we provide a new approach to ‘hiding’ encrypted data in a digital image.

In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher. The algorithm used is ideally designed to: (i) generate a maximum entropy cipher so that there is no bias with regard to any …


Beyond Fair Use, Gideon Parchomovsky, Philip J. Weiser Jan 2009

Beyond Fair Use, Gideon Parchomovsky, Philip J. Weiser

All Faculty Scholarship

For centuries, the fair use doctrine has been the main - if not the exclusive - bastion of user rights. Originating in the English court of equity, the doctrine permitted users under appropriate circumstances to employ copyrighted content without consent from the rightsholder. In the current digital media environment, however, the uncertainty that shrouds fair use and the proliferation of technological protection measures undermine the doctrine and its role in copyright policy. Notably, the enactment of the Digital Millennium Copyright Act, which prohibits the circumvention of such measures even for fair use purposes, has diminished the ability of fair use …


Hierarchical Routing In Manets Using Simple Clustering, Adam Carnine Jan 2009

Hierarchical Routing In Manets Using Simple Clustering, Adam Carnine

UNLV Theses, Dissertations, Professional Papers, and Capstones

This thesis presents both a review of current MANET routing protocols and a new MANET routing algorithm. The routing protocols reviewed include representative samples from the three primary forms of routing found in MANETS: proactive routing, reactive routing and hybrid routing. Secure algorithms are given special treatment in the review. In addition several protocol enhancements are discussed.

The proposed routing protocol is designed to support networks of a medium size, containing over 200 nodes but less than 3,000 nodes. The design is intentionally simple to allow ease of implementation in comparison with other MANET protocols that provide similar functionality.


Software Engineering Education At Carnegie Mellon University: One University; Programs Taught In Two Places, Ray Bareiss, Mel Rosso-Llopart Dec 2008

Software Engineering Education At Carnegie Mellon University: One University; Programs Taught In Two Places, Ray Bareiss, Mel Rosso-Llopart

Ray Bareiss

Teaching Software Engineering to professional master’s students is a challenging endeavor, and arguably for the past 20 years, Carnegie Mellon University has been quite successful. Although CMU teaches Software Engineering at sites world-wide and uses different pedagogies, the goal of the curriculum -- to produce world-class software engineers -- remains constant. This paper will discuss two of the most mature versions of Carnegie Mellon’s Software Engineering program -- the main campus program and its “daughter program” at the Silicon Valley Campus. We discuss the programs with respect to the dimensions of curriculum, how students work and learn, how faculty teach, …


Tradeoffs Between Jamming Resilience And Communication Efficiency In Key Establishment, Patrick Tague, David Slater, Radha Poovendran, Brian Matt Dec 2008

Tradeoffs Between Jamming Resilience And Communication Efficiency In Key Establishment, Patrick Tague, David Slater, Radha Poovendran, Brian Matt

Patrick Tague

We address the problem of allowing authorized users, who do not preshare a common key, to effectively exchange key establishment messages over an insecure channel in the presence of jamming and message insertion attacks. In this work, we jointly consider the security and efficiency of key exchange protocols, focusing on the interplay between message fragmentation, jamming resilience, and verification complexity for protocol optimization. Finally, we present three fragment verification schemes and demonstrate through analysis and simulation that in comparison with existing approaches, they can significantly decrease the amount of time required for key establishment without degrading the guaranteed level of …


Developing Software Engineering Leaders At Carnegie Mellon Silicon Valley, Ray Bareiss, Todd Sedano Dec 2008

Developing Software Engineering Leaders At Carnegie Mellon Silicon Valley, Ray Bareiss, Todd Sedano

Ray Bareiss

The Carnegie Mellon’s Silicon Valley Campus offers a master’s degree in Software Engineering, with technical and development management tracks, targeted at working software professionals in Silicon Valley. We believe the program to be unique in that it is entirely team-based and project-centered. Students learn by doing as they are coached just in time by faculty in the context of their work on authentic projects, and they are evaluated based on what they produce. In response to our interactions with an industry characterized by innovation and short project development timelines, the program evolved from one focused on “high ceremony” processes to …


Developing Software Engineering Leaders At Carnegie Mellon Silicon Valley, Ray Bareiss, Todd Sedano Dec 2008

Developing Software Engineering Leaders At Carnegie Mellon Silicon Valley, Ray Bareiss, Todd Sedano

Todd Sedano

The Carnegie Mellon’s Silicon Valley Campus offers a master’s degree in Software Engineering, with technical and development management tracks, targeted at working software professionals in Silicon Valley. We believe the program to be unique in that it is entirely team-based and project-centered. Students learn by doing as they are coached just in time by faculty in the context of their work on authentic projects, and they are evaluated based on what they produce. In response to our interactions with an industry characterized by innovation and short project development timelines, the program evolved from one focused on “high ceremony” processes to …


Building A Business On Open Source Software, Tony Wasserman Dec 2008

Building A Business On Open Source Software, Tony Wasserman

Tony Wasserman

For many years, free and open source software was exclusively associated with the research community, in contrast to the closed source products developed by commercial software vendors. Over the past decade, there has been a vast increase in the availability of open source software, growing from such projects as Linux and Apache. Open source software is being widely adopted in industry, which has led to numerous business opportunities for entrepreneurs and vendors. This activity is having a disruptive effect on the software industry that has affected even the largest software vendors. This paper describes the emergence of open source business, …


Throughput And Delay In Wireless Sensor Networks Using Directional Antennas, Hong-Ning Dai Dec 2008

Throughput And Delay In Wireless Sensor Networks Using Directional Antennas, Hong-Ning Dai

Hong-Ning Dai

Most of studies only consider that wireless sensor networks are equipped with only omni-directional antennas, which can cause high collisions. It is shown that the per node throughput in such networks is decreased with the increased number of nodes. Thus, the transmission with multiple short-range hops is preferred to reduce the interference. However, other studies show that the transmission delay increases with the increased number of hops.

In this paper, we consider using directional antennas in wireless sensor networks. We have found that using directional antennas not only can increase the throughput capacity but also can decrease the delay by …