Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Using Timed-Release Cryptography To Mitigate Preservation Risk Of Embargo Periods, Rabia Haq Oct 2008

Using Timed-Release Cryptography To Mitigate Preservation Risk Of Embargo Periods, Rabia Haq

Computer Science Theses & Dissertations

This research defines Time-Locked Embargo, a framework designed to mitigate the Preservation Risk Interval: the preservation risk associated with embargoed scholarly material. Due to temporary access restrictions, embargoed data cannot be distributed freely and thus preserved via data refreshing during the embargo time interval. A solution to mitigate the risk of data loss has been developed by suggesting a data dissemination framework that allows data refreshing of encrypted instances of embargoed content in an open, unrestricted scholarly community. This framework has been developed by exploiting implementations of existing technologies to"time-lock" data using Timed-Release Cryptology (TRC) so that it can be …


Modeling And Stability Analysis Of Nonlinear Sampled-Data Systems With Embedded Recovery Algorithms, Heber Herencia-Zapana Oct 2008

Modeling And Stability Analysis Of Nonlinear Sampled-Data Systems With Embedded Recovery Algorithms, Heber Herencia-Zapana

Electrical & Computer Engineering Theses & Dissertations

Computer control systems for safety critical systems are designed to be fault tolerant and reliable, however, soft errors triggered by harsh environments can affect the performance of these control systems. The soft errors of interest which occur randomly, are nondestructive and introduce a failure that lasts a random duration. To minimize the effect of these errors, safety critical systems with error recovery mechanisms are being investigated. The main goals of this dissertation are to develop modeling and analysis tools for sampled-data control systems that are implemented with such error recovery mechanisms. First, the mathematical model and the well-posedness of the …


Integrating Preservation Functions Into The Web Server, Joan A. Smith Jul 2008

Integrating Preservation Functions Into The Web Server, Joan A. Smith

Computer Science Theses & Dissertations

Digital preservation of theWorldWideWeb poses unique challenges, different fromthe preservation issues facing professional Digital Libraries. The complete list of a website’s resources cannot be cited with confidence, and the descriptive metadata available for the resources is so minimal that it is sometimes insufficient for a browser to recognize. In short, the Web suffers from a counting problem and a representation problem. Refreshing the bits, migrating from an obsolete file format to a newer format, and other classic digital preservation problems also affect the Web. As digital collections devise solutions to these problems, the Web will also benefit. But the core …


Using Agile Software Development Practices In A Research Oriented Distributed Simulation, Douglas James Mielke Jul 2008

Using Agile Software Development Practices In A Research Oriented Distributed Simulation, Douglas James Mielke

Computational Modeling & Simulation Engineering Theses & Dissertations

Although sometimes controversial, agile methodologies have proven to be a viable choice for some software development projects. Projects suited to agile methodologies are those that involve new technology, have requirements that change rapidly, and are controlled by small, talented teams. Much literature about agile software development leans towards business products and non-government entities. Only a handful of literature resources mention agile software development being used in government contracts and even fewer resources mention research projects. NASA's Airspace and Traffic Operations Simulation (ATOS) is a research oriented simulation that doesn't follow the traditional business project mold. In an effort to gain …


Evaluation Of The Applicability Of Jc3iedm Based Information Exchange Standardization Efforts To Link-16 Based Systems, Anthony Devivi Apr 2008

Evaluation Of The Applicability Of Jc3iedm Based Information Exchange Standardization Efforts To Link-16 Based Systems, Anthony Devivi

Computational Modeling & Simulation Engineering Theses & Dissertations

Command and Control (C2) systems are critical components in decision-making systems in both the military and civilian domains. These systems act as the data evaluation and dissemination tools for larger Command, Control, Computer, Communication, Intelligence, Surveillance, and Recognizance (C4ISR) systems. Typical C2 systems accept a wide variety of inputs from many sources such as radars, weapons systems, simulators, operators, and other C2 systems. The C2 system processes the input data and presents to the user information with which decisions are made. The C2 system also determines what information should be translated and disseminated to other C2 platforms.

The basis for …


Creating Preservation-Ready Web Resources, Joan A. Smith, Michael L. Nelson Jan 2008

Creating Preservation-Ready Web Resources, Joan A. Smith, Michael L. Nelson

Computer Science Faculty Publications

There are innumerable departmental, community, and personal web sites worthy of long-term preservation but proportionally fewer archivists available to properly prepare and process such sites. We propose a simple model for such everyday web sites which takes advantage of the web server itself to help prepare the site's resources for preservation. This is accomplished by having metadata utilities analyze the resource at the time of dissemination. The web server responds to the archiving repository crawler by sending both the resource and the just-in-time generated metadata as a straight-forward XML-formatted response. We call this complex object (resource + metadata) a CRATE. …


Community-Of-Interest (Coi) Model-Based Languages Enabling Composable Net-Centric Services, Andreas Tolk, Saikou Y. Diallo Jan 2008

Community-Of-Interest (Coi) Model-Based Languages Enabling Composable Net-Centric Services, Andreas Tolk, Saikou Y. Diallo

Computational Modeling & Simulation Engineering Faculty Publications

Net-centric services shall be designed to collaborate with other services used within the supported Community of Interest (COI). This requires that such services not only be integratable on the technical level and interoperable on the implementation level, but also that they are composable in the sense that they are semantically and pragmatically consistent and able to exchange information in a consistent and unambiguous way.

In order to support Command-and-Control with Composable Net-centric Services, the human-machine interoperation must be supported as well as the machine-machine interoperation. This paper shows that techniques of computer linguistic can support the human-machine interface by structuring …


Efficient Corona Training Protocols For Sensor Networks, Alan A. Bertossi, Stephan Olariu, Cristina M. Pinotti Jan 2008

Efficient Corona Training Protocols For Sensor Networks, Alan A. Bertossi, Stephan Olariu, Cristina M. Pinotti

Computer Science Faculty Publications

Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireless communications capabilities. It is expected that these small devices, referred to as sensors, will be mass-produced and deployed, making their production cost negligible. Due to their small form factor and modest non-renewable energy budget, individual sensors are not expected to be GPS-enabled. Moreover, in most applications, exact geographic location is not necessary, and all that the individual sensors need is a coarse-grain location awareness. The task of acquiring such a coarse-grain location awareness is referred to as training. …