Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
Virtual Container Attestation: Customized Trusted Containers For On-Demand Computing., Katelin A. Bailey
Virtual Container Attestation: Customized Trusted Containers For On-Demand Computing., Katelin A. Bailey
Dartmouth College Undergraduate Theses
In today's computing environment, data is moving to central locations and most computers are merely used to access the data. Today is the era of cloud computing and distributed computing, where users have control over neither data nor computation. As this trend continues there is an increasing frequency of mutually distrustful parties being forced to interact and share resources with each other in potentially dangerous situations. Therefore, there is an urgent need for a means of creating trust between two entities, or at the very least providing some means of determining the trust level of a given machine. Current approaches …
Creating Large Disturbances In The Power Grid: Methods Of Attack After Cyber Infiltration, Loren D. Sands-Ramshaw
Creating Large Disturbances In The Power Grid: Methods Of Attack After Cyber Infiltration, Loren D. Sands-Ramshaw
Dartmouth College Undergraduate Theses
Researchers are pursuing methods of securing the cyber aspect of the U.S. power grid, one of the country's most critical infrastructures. An attacker who is able to infiltrate an Energy Management System (EMS) can instruct elements of the grid to function improperly or can skew the state information received by the control programs or operators. In addition, a cyber attack can combine multiple attacks and affect many physical locations at once. A study of the possible adverse effects an attack could generate can underline the urgency of improving grid security, contribute to a roadmap and priority list for security researchers, …
Block Sensitivity Versus Sensitivity, Karn Seth
Block Sensitivity Versus Sensitivity, Karn Seth
Dartmouth College Undergraduate Theses
Sensitivity and block sensitivity are useful and well-studied measures of computational complexity, but in spite of their similarities, the largest possible gap between them is still unknown. Rubinstein showed that this gap must be at least quadratic, and Kenyon and Kutin showed that it is at worst exponential, but many strongly suspect that the gap is indeed quadratic, or at worst polynomial. Our work shows that for a large class of functions, which includes Rubinstein's function, the quadratic gap between sensitivity and block sensitivity is the best we can possibly do.
The Curious Timekeeper: Creative Thesis In Interactive Sculpture, Kate I. Schnippering
The Curious Timekeeper: Creative Thesis In Interactive Sculpture, Kate I. Schnippering
Dartmouth College Undergraduate Theses
When we interact with computers, we have set expectations about our interactive experience, operating a mouse and keyboard to elicit predictable responses on a screen. Intersecting the world of Computing with Fine Art gains us potential to innovate outside these bounds by restricting the expected performance of a computer-- setting it to a particular purpose rather than allowing it to run anyone's software. To challenge standard human-computer interaction, this work set out to create an interesting and unusual interactive experience, fully integrated into a sculpture. The approach was to design a system to form a small environment, having many components …
Neurophone: Brain-Mobile Phone Interface Using A Wireless Eeg Headset, Matthew K. Mukerjee
Neurophone: Brain-Mobile Phone Interface Using A Wireless Eeg Headset, Matthew K. Mukerjee
Dartmouth College Undergraduate Theses
Neural signals are everywhere just like mobile phones. We propose to use neural signals to control mobile phones for hands-free, silent and effortless human-mobile interaction. Until recently, devices for detecting neural signals have been costly, bulky and fragile. We present the design, implementation and evaluation of the NeuroPhone system, which allows neural signals to drive mobile phone applications on the iPhone using cheap off-the-shelf wireless electroencephalography (EEG) headsets. We demonstrate a mind-controlled address book dialing app, which works on similar principles to P300-speller brain-computer interfaces: the phone flashes a sequence of photos of contacts from the address book and a …