Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Dartmouth College

Dartmouth College Undergraduate Theses

2010

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Virtual Container Attestation: Customized Trusted Containers For On-Demand Computing., Katelin A. Bailey Jun 2010

Virtual Container Attestation: Customized Trusted Containers For On-Demand Computing., Katelin A. Bailey

Dartmouth College Undergraduate Theses

In today's computing environment, data is moving to central locations and most computers are merely used to access the data. Today is the era of cloud computing and distributed computing, where users have control over neither data nor computation. As this trend continues there is an increasing frequency of mutually distrustful parties being forced to interact and share resources with each other in potentially dangerous situations. Therefore, there is an urgent need for a means of creating trust between two entities, or at the very least providing some means of determining the trust level of a given machine. Current approaches …


Creating Large Disturbances In The Power Grid: Methods Of Attack After Cyber Infiltration, Loren D. Sands-Ramshaw Jun 2010

Creating Large Disturbances In The Power Grid: Methods Of Attack After Cyber Infiltration, Loren D. Sands-Ramshaw

Dartmouth College Undergraduate Theses

Researchers are pursuing methods of securing the cyber aspect of the U.S. power grid, one of the country's most critical infrastructures. An attacker who is able to infiltrate an Energy Management System (EMS) can instruct elements of the grid to function improperly or can skew the state information received by the control programs or operators. In addition, a cyber attack can combine multiple attacks and affect many physical locations at once. A study of the possible adverse effects an attack could generate can underline the urgency of improving grid security, contribute to a roadmap and priority list for security researchers, …


Block Sensitivity Versus Sensitivity, Karn Seth Jun 2010

Block Sensitivity Versus Sensitivity, Karn Seth

Dartmouth College Undergraduate Theses

Sensitivity and block sensitivity are useful and well-studied measures of computational complexity, but in spite of their similarities, the largest possible gap between them is still unknown. Rubinstein showed that this gap must be at least quadratic, and Kenyon and Kutin showed that it is at worst exponential, but many strongly suspect that the gap is indeed quadratic, or at worst polynomial. Our work shows that for a large class of functions, which includes Rubinstein's function, the quadratic gap between sensitivity and block sensitivity is the best we can possibly do.


The Curious Timekeeper: Creative Thesis In Interactive Sculpture, Kate I. Schnippering May 2010

The Curious Timekeeper: Creative Thesis In Interactive Sculpture, Kate I. Schnippering

Dartmouth College Undergraduate Theses

When we interact with computers, we have set expectations about our interactive experience, operating a mouse and keyboard to elicit predictable responses on a screen. Intersecting the world of Computing with Fine Art gains us potential to innovate outside these bounds by restricting the expected performance of a computer-- setting it to a particular purpose rather than allowing it to run anyone's software. To challenge standard human-computer interaction, this work set out to create an interesting and unusual interactive experience, fully integrated into a sculpture. The approach was to design a system to form a small environment, having many components …


Neurophone: Brain-Mobile Phone Interface Using A Wireless Eeg Headset, Matthew K. Mukerjee May 2010

Neurophone: Brain-Mobile Phone Interface Using A Wireless Eeg Headset, Matthew K. Mukerjee

Dartmouth College Undergraduate Theses

Neural signals are everywhere just like mobile phones. We propose to use neural signals to control mobile phones for hands-free, silent and effortless human-mobile interaction. Until recently, devices for detecting neural signals have been costly, bulky and fragile. We present the design, implementation and evaluation of the NeuroPhone system, which allows neural signals to drive mobile phone applications on the iPhone using cheap off-the-shelf wireless electroencephalography (EEG) headsets. We demonstrate a mind-controlled address book dialing app, which works on similar principles to P300-speller brain-computer interfaces: the phone flashes a sequence of photos of contacts from the address book and a …