Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Activity-Aware Electrocardiogram-Based Passive Ongoing Biometric Verification, Janani C. Sriram Sep 2009

Activity-Aware Electrocardiogram-Based Passive Ongoing Biometric Verification, Janani C. Sriram

Dartmouth College Master’s Theses

Identity fraud due to lost, stolen or shared information or tokens that represent an individual's identity is becoming a growing security concern. Biometric recognition - the identification or verification of claimed identity, shows great potential in bridging some of the existing security gaps. It has been shown that the human Electrocardiogram (ECG) exhibits sufficiently unique patterns for use in biometric recognition. But it also exhibits significant variability due to stress or activity, and signal artifacts due to movement. In this thesis, we develop a novel activity-aware ECG-based biometric recognition scheme that can verify/identify under different activity conditions. From a pattern …


Hardware-Assisted Secure Computation, Alexander Iliev Aug 2009

Hardware-Assisted Secure Computation, Alexander Iliev

Dartmouth College Ph.D Dissertations

The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even though this is conceptually the simplest and most general solution. Thus, current protocols involve only the direct players---we call such protocols self-reliant. They often use blinded boolean circuits, which has several sources of overhead, some due to the circuit representation and some due to the blinding. However, secure coprocessors like the IBM 4758 have actual security properties similar to …


Automated Tracking Of Dividing Nuclei In Microscopy Videos Of Living Cells, Evan L. Tice Jun 2009

Automated Tracking Of Dividing Nuclei In Microscopy Videos Of Living Cells, Evan L. Tice

Dartmouth College Undergraduate Theses

Many cell biologists perform analysis of multinucleated cell data in order to better under- stand the mechanisms that regulate cell division. Sbalzarini, et al., have developed methods for automatically tracking nuclei in cell data in order to aid in this time-consuming analysis. In this paper, we present an implementation of the Sbalzarini tracking algorithm, introduce a new algorithm we developed which is able to identify mitosis events, and present other software tools we have developed to aid in the automated detection of nucleus data.


The Effects Of Introspection On Computer Security Policies, Stephanie A. Trudeau Jun 2009

The Effects Of Introspection On Computer Security Policies, Stephanie A. Trudeau

Dartmouth College Undergraduate Theses

What does it mean to be an expert? And what makes an expert more capable than a non-expert when it comes to evaluating and articulating their impressions about something as commonly practiced as food tasting? How do we explain those behaviors that humans perform very well, but don't quite know why? Studies have shown that there exists a class of activities that we as humans execute well intuitively, but that we perform much worse upon introspection. Evidence supports the claim that the act of introspection actually causes us to do more poorly at these tasks. My goal is to apply …


Developing An Improved, Web-Based Classroom Response System With Web Services, Oleg B. Seletsky Jun 2009

Developing An Improved, Web-Based Classroom Response System With Web Services, Oleg B. Seletsky

Dartmouth College Undergraduate Theses

Classroom Response Systems (CRS) are an in-class technology used to poll students and instantly display an aggregate representation of their responses. CRS have been around since the 1970s and have become increasingly more popular in higher education lecture halls. Even though technology, specifically computers and communications, has improved significantly since the 1970s, CRS have remained surprisingly unchanged. The purpose of this project was to develop an innovative web-based CRS using web services. The web-based aspect utilizes Dartmouth's wireless campus while the web services back-end makes the product more extensible. Lastly, we added a set of out-of-class learning tools for students …


An Information Complexity Approach To The Inner Product Problem, William B. Henderson-Frost Jun 2009

An Information Complexity Approach To The Inner Product Problem, William B. Henderson-Frost

Dartmouth College Undergraduate Theses

We prove a lower bound of the randomized communication complexity of the inner product function on the uniform distribution.


Hawk: 3d Gestured-Based Interactive Bird Flight Simulation, Thomas Yale Eastman Jun 2009

Hawk: 3d Gestured-Based Interactive Bird Flight Simulation, Thomas Yale Eastman

Dartmouth College Undergraduate Theses

Control interfaces provide the most tangible connection between human users and computer software. This link is especially important in interactive real-time applications, like games and simulations, because users desire efficient controls that allow them to maximize their interactivity and immersion with the software. Traditionally, interfaces have been largely limited to keyboards and mice. Recently, however, technological advances have made motion-sensitive devices not only available to mainstream consumers but have also lifted restrictions limiting devices to two-dimensional motion. This work presents a 3-dimensional motion-sensitive interface alongside a natural application. Players can control a soaring red-tailed hawk and perform various intuitive flight …


Surface Reconstruction Through Time, Leeann T. Brash Jun 2009

Surface Reconstruction Through Time, Leeann T. Brash

Dartmouth College Master’s Theses

Surface reconstruction is an area of computational geometry that has been progressing rapidly over the last decade. Current algorithms and their implementations can reconstruct surfaces from a variety of input and the accuracy and precision improve with each new development. These all make use of various heuristics to achieve a reconstruction. Much of this work consists of reconstructing a still object from point samples taken from the object's surface. We examine reconstructing an n-dimensional object and its motion by treating time as an (n + 1)st axis. Our input consists of (n-1)-dimensional scans taken over time and at di?erent positions …


Autoscopy: Detecting Pattern-Searching Rootkits Via Control Flow Tracing, Ashwin Ramaswamy May 2009

Autoscopy: Detecting Pattern-Searching Rootkits Via Control Flow Tracing, Ashwin Ramaswamy

Dartmouth College Master’s Theses

Traditional approaches to rootkit detection assume the execution of code at a privilege level below that of the operating system kernel, with the use of virtual machine technologies to enable the detection system itself to be immune from the virus or rootkit code. In this thesis, we approach the problem of rootkit detection from the standpoint of tracing and instrumentation techniques, which work from within the kernel and also modify the kernel's run-time state to detect aberrant control flows. We wish to investigate the role of emerging tracing frameworks (Kprobes, DTrace etc.) in enforcing operating system security without the reliance …