Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Algorithms (1)
- Block (1)
- Bridge (1)
- C++ (1)
- Computer Science (1)
-
- Correspondence (1)
- Cyber Security (1)
- Distribution (1)
- Finite Elements (1)
- Hybrid Automata (1)
- Information Security (1)
- MATLAB (1)
- Matching (1)
- OpenCV (1)
- PHP (1)
- Parallel (1)
- RSA (1)
- Real (1)
- SIMD (1)
- SSE (1)
- Security (1)
- Simulink (1)
- Specification (1)
- Static Analysis (1)
- Stereo (1)
- Thermal Signature Generation (1)
- Threshold (1)
- Time (1)
- Tor (1)
- Vision (1)
Articles 1 - 6 of 6
Full-Text Articles in Computer Engineering
Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work
Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work
Chancellor’s Honors Program Projects
No abstract provided.
Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise
Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise
Masters Theses
An enumeration hybrid automaton has been shown in principle to be ready for automated transformation into a Simulink implementation. This paper describes a strategy for and a demonstration of automated construction. This is accomplished by designing a data model which represents EHA data and providing a mapping from EHA data points to Simulink blocks.
Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton
Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton
Masters Theses
Since its inception, Tor has offered anonymity for internet users around the world. Tor now offers bridges to help users evade internet censorship, but the primary distribution schemes that provide bridges to users in need have come under attack. This thesis explores how threshold RSA can help strengthen Tor's infrastructure while also enabling more powerful bridge distribution schemes. We implement a basic threshold RSA signature system for the bridge authority and a reputation-based social network design for bridge distribution. Experimental results are obtained showing the possibility of quick responses to requests from honest users while maintaining both the secrecy and …
Dynamic Task Execution On Shared And Distributed Memory Architectures, Asim Yarkhan
Dynamic Task Execution On Shared And Distributed Memory Architectures, Asim Yarkhan
Doctoral Dissertations
Multicore architectures with high core counts have come to dominate the world of high performance computing, from shared memory machines to the largest distributed memory clusters. The multicore route to increased performance has a simpler design and better power efficiency than the traditional approach of increasing processor frequencies. But, standard programming techniques are not well adapted to this change in computer architecture design.
In this work, we study the use of dynamic runtime environments executing data driven applications as a solution to programming multicore architectures. The goals of our runtime environments are productivity, scalability and performance. We demonstrate productivity by …
Validation Of Weak Form Thermal Analysis Algorithms Supporting Thermal Signature Generation, Elton Lewis Freeman
Validation Of Weak Form Thermal Analysis Algorithms Supporting Thermal Signature Generation, Elton Lewis Freeman
Masters Theses
Extremization of a weak form for the continuum energy conservation principle differential equation naturally implements fluid convection and radiation as flux Robin boundary conditions associated with unsteady heat transfer. Combining a spatial semi-discretization via finite element trial space basis functions with time-accurate integration generates a totally node-based algebraic statement for computing. Closure for gray body radiation is a newly derived node-based radiosity formulation generating piecewise discontinuous solutions, while that for natural-forced-mixed convection heat transfer is extracted from the literature. Algorithm performance, mathematically predicted by asymptotic convergence theory, is subsequently validated with data obtained in 24 hour diurnal field experiments for …
Real-Time Mobile Stereo Vision, Bryan Hale Bodkin
Real-Time Mobile Stereo Vision, Bryan Hale Bodkin
Masters Theses
Computer stereo vision is used extract depth information from two aligned cameras and there are a number of hardware and software solutions to solve the stereo correspondence problem. However few solutions are available for inexpensive mobile platforms where power and hardware are major limitations. This Thesis will proposes a method that competes with an existing OpenCV stereo correspondence method in speed and quality, and is able to run on generic multi core CPU’s.