Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Computer Engineering

Testing Virtual Machines For Cadrc Server Hosting, Robin Verweij Dec 2013

Testing Virtual Machines For Cadrc Server Hosting, Robin Verweij

Computer Science and Software Engineering

No abstract provided.


Tascked: The Sanity Promoting Task Manager, Jake Tobin Dec 2013

Tascked: The Sanity Promoting Task Manager, Jake Tobin

Computer Science and Software Engineering

Personal task managers or various forms of to-do lists are abundant in our modern computing age. With the explosion of mobile computing technology, it is easier than ever to take notes digitally and make the data seemingly instantly available anywhere on the Internet. There is a fairly well defined core set of features in personal task managers available for public consumption, but it seems nothing that is publicly available provides feedback to the user or suggestions based on user history. Tascked is a task management solution, which records user history and solicits user feedback on progress. This allows the system …


More Like This, Geoffrey Lawson Jun 2013

More Like This, Geoffrey Lawson

Computer Science and Software Engineering

No abstract provided.


Hid Rw300/Rw400 Hardware Implementation Vulnerabilities And Mitigation Strategies, Taylor Nelson Jun 2013

Hid Rw300/Rw400 Hardware Implementation Vulnerabilities And Mitigation Strategies, Taylor Nelson

Computer Science and Software Engineering

The HID RW300/RW400 readers are in use and deployed in buildings around the world. Designed for industrial/commercial facilities security requirements you can find them outside biotech companies (AMGEN), educational institutions (Cal Poly San Luis Obispo), and doctors offices. In a 2010 paper entitled “Heart of Darkness - exploring the uncharted backwaters of HID iCLASSTM security” by Milosch Meriac numerous vulnerabilities were outlined. Despite this research HID continues to sell these readers to consumers.

To properly protect the safety of individuals and assets these HID devices are no longer adequate. I have verified that these attacks are feasible by a moderately …


Dynamic Paint For Maya: Creation And Use In The Animation Short "Color Clash", Christopher Wallis Jun 2013

Dynamic Paint For Maya: Creation And Use In The Animation Short "Color Clash", Christopher Wallis

Computer Science and Software Engineering

This write-up describes the creation and utilization of a paint effect from both the perspective of the programmer and the animator. The paint effect simulates a 2D fluid using the algorithm described in Jos Stam's ``Real-time Fluid Dynamics for Games'' \cite{stam}, bakes the results into an image sequence, and then wraps the sequence around a 3D mesh. The second half of this paper describes how the effect was integrated into the animation short, ``Color Clash'' and the animation pipeline that was used.


Ticketcloud, Ross Mckelvie Jun 2013

Ticketcloud, Ross Mckelvie

Computer Science and Software Engineering

TicketCloud is a digital ticket service that offers advantages to both event hosts/vendors and consumers. Using QR Codes, RESTful cloud APIs, and mobile devices TicketCloud takes an outdated market digital and opens up new methods of transacting, allowing customers to resell tickets from their couch and for vendors to reap the benefits of these transactions.


Tmc Simulator, Stuart Heater Jun 2013

Tmc Simulator, Stuart Heater

Computer Science and Software Engineering

The goal of this project was to design and implement a graphical user interface which simulates TriTech's VisiCad Inform computer- aided dispatch well enough for trainees to learn how to efficiently and accurately use the software in a risk-free environment. The simulator should also allow the training proctor to actively create new incidents during training in order to ensure that the trainees are able to respond properly. The structure of this project allowed me to work with both more- and less-experienced programmers, particularly those who are far more experienced with networking and hardware than myself. It was my first time …