Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (40)
- Astrophysics and Astronomy (23)
- Physics (15)
- Stars, Interstellar Medium and the Galaxy (13)
- Earth Sciences (9)
-
- Glaciology (9)
- Medicine and Health Sciences (6)
- External Galaxies (4)
- Quantum Physics (4)
- Statistical, Nonlinear, and Soft Matter Physics (4)
- Engineering (3)
- Cosmology, Relativity, and Gravity (2)
- Physical Processes (2)
- Arts and Humanities (1)
- Atmospheric Sciences (1)
- Biological and Chemical Physics (1)
- Communication (1)
- Condensed Matter Physics (1)
- Environmental Microbiology and Microbial Ecology (1)
- Environmental Sciences (1)
- Health Communication (1)
- Health Services Research (1)
- Hydrology (1)
- Infectious Disease (1)
- Life Sciences (1)
- Mathematics (1)
- Medical Specialties (1)
- Microbiology (1)
- Natural Resources and Conservation (1)
- Keyword
-
- Astrophysics (12)
- Cosmology and astronomy (9)
- Privacy (6)
- Classical and quantum mechanics (5)
- General physics (5)
-
- Models (5)
- Stars (5)
- Magnetosphere (4)
- Mhealth (4)
- Plasma (4)
- Security (4)
- Supernova remnants (4)
- Wireless (4)
- Arctic region (3)
- Condensed matter (3)
- Control (3)
- Dust (3)
- Electric potential (3)
- Emission (3)
- Engineering (3)
- Galaxies (3)
- Healthcare (3)
- Instrumentation related to nuclear science and technology (3)
- Mass (3)
- Network (3)
- Plasma physics (3)
- Polar regions (3)
- Pulses (3)
- Pure states (3)
- Star evolution (3)
- Publication
- Publication Type
Articles 1 - 30 of 95
Full-Text Articles in Physical Sciences and Mathematics
Correlation Of Inflation-Produced Magnetic Fields With Scalar Fluctuations, Robert R. Caldwell, Leonardo Motta, Marc Kamionkowski
Correlation Of Inflation-Produced Magnetic Fields With Scalar Fluctuations, Robert R. Caldwell, Leonardo Motta, Marc Kamionkowski
Dartmouth Scholarship
If the conformal invariance of electromagnetism is broken during inflation, then primordial magnetic fields may be produced. If this symmetry breaking is generated by the coupling between electromagnetism and a scalar field—e.g. the inflaton, curvaton, or Ricci scalar—then these magnetic fields may be correlated with primordial density perturbations, opening a new window to the study of non-Gaussianity in cosmology. In order to illustrate, we couple electromagnetism to an auxiliary scalar field in a de Sitter background. We calculate the power spectra for scalar-field perturbations and magnetic fields, showing how a scale-free magnetic-field spectrum with rms amplitude of ∼nG at Mpc …
The Sn 393-Snr Rx J1713.7-3946 (G347.3-0.5) Connection, Robert A. Fesen, Richard Kremer, Daniel Patnaude, Dan Milisavljevic
The Sn 393-Snr Rx J1713.7-3946 (G347.3-0.5) Connection, Robert A. Fesen, Richard Kremer, Daniel Patnaude, Dan Milisavljevic
Dartmouth Scholarship
Although the connection of the Chinese "guest" star of 393 AD with the Galactic supernova remnant RX J1713.7-3946 (G347.3-0.5) made by Wang et al. in 1997 is consistent with the remnant's relatively young properties and the guest star's projected position within the "tail" of the constellation Scorpius, there are difficulties with such an association. The brief Chinese texts concerning the 393 AD guest star make no comment about its apparent brightness, stating only that it disappeared after eight months. However, at the remnant's current estimated 1-1.3 kpc distance and A V 3, its supernova (SN) should have been a visually …
A Perceptual Metric For Photo Retouching, Eric Kee, Hany Farid
A Perceptual Metric For Photo Retouching, Eric Kee, Hany Farid
Dartmouth Scholarship
In recent years, advertisers and magazine editors have been widely criticized for taking digital photo retouching to an extreme. Impossibly thin, tall, and wrinkle- and blemish-free models are routinely splashed onto billboards, advertisements, and magazine covers. The ubiquity of these unrealistic and highly idealized images has been linked to eating disorders and body image dissatisfaction in men, women, and children. In response, several countries have considered legislating the labeling of retouched photos. We describe a quantitative and perceptually meaningful metric of photo retouching. Photographs are rated on the degree to which they have been digitally altered by explicitly modeling and …
Second-Order Weak Lensing From Modified Gravity, R. Ali Vanderveld, Robert R. Caldwell, Jason Rhodes
Second-Order Weak Lensing From Modified Gravity, R. Ali Vanderveld, Robert R. Caldwell, Jason Rhodes
Dartmouth Scholarship
We explore the sensitivity of weak gravitational lensing to second-order corrections to the spacetime metric within a cosmological adaptation of the parametrized post-Newtonian framework. Whereas one might expect nonlinearities of the gravitational field to introduce non-Gaussianity into the statistics of the lensing convergence field, we show that such corrections are actually always small within a broad class of scalar-tensor theories of gravity. We show this by first computing the weak lensing convergence within our parametrized framework to second order in the gravitational potential, and then computing the relevant post-Newtonian parameters for scalar-tensor gravity theories. In doing so we show that …
The Acs Survey Of Galactic Globular Clusters. Xi. The Three-Dimensional Orientation Of The Sagittarius Dwarf Spheroidal Galaxy And Its Globular Clusters, Michael H. H. Siegel, Steven R. Majewski, David R. Law, Ata Sarajedini, Aaron Dotter, A Marín-Franch, Brian Chaboyer
The Acs Survey Of Galactic Globular Clusters. Xi. The Three-Dimensional Orientation Of The Sagittarius Dwarf Spheroidal Galaxy And Its Globular Clusters, Michael H. H. Siegel, Steven R. Majewski, David R. Law, Ata Sarajedini, Aaron Dotter, A Marín-Franch, Brian Chaboyer
Dartmouth Scholarship
We use observations from the Hubble Space Telescope Advanced Camera for Surveys (HST/ACS) study of Galactic globular clusters to investigate the spatial distribution of the inner regions of the disrupting Sagittarius dwarf spheroidal galaxy (Sgr). We combine previously published analyses of four Sgr member clusters located near or in the Sgr core (M54, Arp 2, Terzan 7, and Terzan 8) with a new analysis of diffuse Sgr material identified in the background of five low-latitude Galactic bulge clusters (NGC 6624, 6637, 6652, 6681, and 6809) observed as part of the ACS survey. By comparing the bulge cluster color-magnitude …
The Laboca Survey Of The Extended Chandra Deep Field-South: Clustering Of Submillimetre Galaxies, Ryan C. Hickox, J. L. Wardlow, Ian Smail, A. D. Myers
The Laboca Survey Of The Extended Chandra Deep Field-South: Clustering Of Submillimetre Galaxies, Ryan C. Hickox, J. L. Wardlow, Ian Smail, A. D. Myers
Dartmouth Scholarship
We present a measurement of the spatial clustering of submillimetre galaxies (SMGs) at z = 1–3. Using data from the 870 μm LABOCA submillimetre survey of the Extended Chandra Deep Field South, we employ a novel technique to measure the cross-correlation between SMGs and galaxies, accounting for the full probability distributions for photometric redshifts of the galaxies. From the observed projected two-point cross-correlation function we derive the linear bias and characteristic dark matter halo masses for the SMGs. We detect clustering in the cross-correlation between SMGs and galaxies at the > 4σ level. Accounting for the clustering of galaxies from their …
Magnetopause Displacements: The Possible Role Of Dust, R. A. Treumann, W. Baumjohann
Magnetopause Displacements: The Possible Role Of Dust, R. A. Treumann, W. Baumjohann
Dartmouth Scholarship
Large compressions of the magnetopause are proposed to occasionally result from temporary encounters of the magnetosphere with dust streams in interplanetary space. Such streams may have their origin in cometary dust tails or asteroids which cross the inner heliosphere or in meteoroids in Earth's vicinity. Dust ejected from such objects when embedding the magnetosphere for their limited transition time should cause substantial global deformations of the magnetopause/magnetosphere due to the very large dust grain mass and momentum which compensates for the low dust density when contributing to the upstream pressure variation.
Security Applications Of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina
Security Applications Of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina
Computer Science Technical Reports
We present an approach to improving the security of complex, composed systems based on formal language theory, and show how this approach leads to advances in input validation, security modeling, attack surface reduction, and ultimately, software design and programming methodology. We cite examples based on real-world security flaws in common protocols representing different classes of protocol complexity. We also introduce a formalization of an exploit development technique, the parse tree differential attack, made possible by our conception of the role of formal grammars in security. These insights make possible future advances in software auditing techniques applicable to static and dynamic …
Flow Dynamics Of An Accumulation Basin: A Case Study Of Upper Kahiltna Glacier, Mount Mckinley, Alaska, Seth Campbell, Karl Kreutz, Erich Osterberg, Steven Arcone
Flow Dynamics Of An Accumulation Basin: A Case Study Of Upper Kahiltna Glacier, Mount Mckinley, Alaska, Seth Campbell, Karl Kreutz, Erich Osterberg, Steven Arcone
Dartmouth Scholarship
We interpreted flow dynamics of the Kahiltna Pass Basin accumulation zone on Mount McKinley, Alaska, USA, using 40, 100 and 900 MHz ground-penetrating radar profiles and GPS surface velocity measurements. We found dipping, englacial surface-conformable strata that experienced vertical thickening as the glacier flowed westward from a steep, higher-velocity (60 m a−1) region into flat terrain associated with a 90° bend in the glacier and lower velocities (15 m a−1) to the south. Stratigraphy near the western side of the basin was surface-conformable to ∼170 m depth and thinned as flow diverged southward, down-glacier. We found complex strata beneath the …
Time Evolution Of The Reverse Shock In Sn 1006, P. Frank Winkler, Andrew J. S. Hamilton, Knox S. Long, Robert A. Fesen
Time Evolution Of The Reverse Shock In Sn 1006, P. Frank Winkler, Andrew J. S. Hamilton, Knox S. Long, Robert A. Fesen
Dartmouth Scholarship
The Schweizer-Middleditch star, located behind the SN 1006 remnant and near its center in projection, provides the opportunity to study cold, expanding ejecta within the SN 1006 shell through UV absorption. Especially notable is an extremely sharp red edge to the Si II 1260 Å feature, which stems from the fastest moving ejecta on the far side of the SN 1006 shell—material that is just encountering the reverse shock. Comparing Hubble Space Telescope far-UV spectra obtained with the Cosmic Origins Spectrograph in 2010 and with the Space Telescope Imaging Spectrograph in 1999, we have measured the change in this feature …
Distance Scale Zero Points From Galactic Rr Lyrae Star Parallaxes, G. Fritz Benedict, Barbara E. Mcarthur, Michael W. Feast, Thomas G. Barnes, Thomas E. Harrison, Jacob L. Bean, John W. Menzies, Brian Chaboyer
Distance Scale Zero Points From Galactic Rr Lyrae Star Parallaxes, G. Fritz Benedict, Barbara E. Mcarthur, Michael W. Feast, Thomas G. Barnes, Thomas E. Harrison, Jacob L. Bean, John W. Menzies, Brian Chaboyer
Dartmouth Scholarship
We present new absolute trigonometric parallaxes and proper motions for seven Population II variable stars—five RR Lyr variables: RZ Cep, XZ Cyg, SU Dra, RR Lyr, and UV Oct; and two type 2 Cepheids: VY Pyx and κ Pav. We obtained these results with astrometric data from Fine Guidance Sensors, white-light interferometers on Hubble Space Telescope. We find absolute parallaxes in milliseconds of arc: RZ Cep, 2.12 ± 0.16 mas; XZ Cyg, 1.67 ± 0.17 mas; SU Dra, 1.42 ± 0.16 mas; RR Lyr, 3.77 ± 0.13 mas; UV Oct, 1.71 ± 0.10 mas; VY Pyx, 6.44 ± 0.23 …
The Good, The Bad, And The Actively Verified, John Williamson
The Good, The Bad, And The Actively Verified, John Williamson
Dartmouth College Master’s Theses
We believe that we can use active probing for compromise recovery. Our intent is to exploit the differences in behavior between compromised and uncompromised systems and use that information to identify those which are not behaving as expected. Those differences may indicate a deviation in either con figuration or implementation from what we expect on the network, either of which suggests that the misbehaving entity might not be trustworthy. In this work, we propose and build a case for a method for using altered behavior directly resulting from or introduced as a side-effect of the compromise of a network service …
A 3-D Lighting And Shadow Analysis Of The Jfk Zapruder Film (Frame 317), Hany Farid
A 3-D Lighting And Shadow Analysis Of The Jfk Zapruder Film (Frame 317), Hany Farid
Computer Science Technical Reports
Claims of a broader conspiracy behind U.S. President John F. Kennedy's assassination have persisted for the past nearly five decades. The Zapruder film is considered to be the most complete recording of JFK's assassination. Many have claimed that this 8mm film was manipulated to conceal evidence of a second shooter, which would invalidate the claim that a lone gunman, Lee Harvey Oswald, was responsible for JFK's assassination. Here we consider the viability of one specific claim of postproduction tampering in the Zapruder film.
Experimental Characterization Of Coherent Magnetization Transport In A One-Dimensional Spin System, Chandrasekhar Ramanathan, Paola Cappellaro, Lorenza Viola, David G. Cory
Experimental Characterization Of Coherent Magnetization Transport In A One-Dimensional Spin System, Chandrasekhar Ramanathan, Paola Cappellaro, Lorenza Viola, David G. Cory
Dartmouth Scholarship
We experimentally characterize the non-equilibrium, room-temperature magnetization dynamics of a spin chain evolving under an effective double-quantum (DQ) Hamiltonian. We show that the Liouville space operators corresponding to the magnetization and the two-spin correlations evolve 90 degrees out of phase with each other, and drive the transport dynamics. For a nearest-neighbor-coupled N-spin chain, the dynamics are found to be restricted to a Liouville operator space whose dimension scales only as N2, leading to a slow growth of multi-spin correlations. Even though long-range couplings are present in the real system, we find excellent agreement between the analytical predictions …
Acurate Low-Mass Stellar Models Of Koi-126, Gregory A. Feiden, Brian Chaboyer, Aaron Dotter
Acurate Low-Mass Stellar Models Of Koi-126, Gregory A. Feiden, Brian Chaboyer, Aaron Dotter
Dartmouth Scholarship
The recent discovery of an eclipsing hierarchical triple system with two low-mass stars in a close orbit (KOI-126) by Carter et al. (2011) appeared to reinforce the evidence that theoretical stellar evolution models are not able to reproduce the observational mass-radius relation for low-mass stars. We present a set of stellar models for the three stars in the KOI-126 system that show excellent agreement with the observed radii. This agreement appears to be due to the equation of state implemented by our code. A significant dispersion in the observed mass-radius relation for fully convective stars is demonstrated; indicative of the …
Approach To Accurately Measuring The Speed Of Optical Precursors, Chuan-Feng Li, Zong-Quan Zhou, Heejeong Jeong, Guang-Can Guo
Approach To Accurately Measuring The Speed Of Optical Precursors, Chuan-Feng Li, Zong-Quan Zhou, Heejeong Jeong, Guang-Can Guo
Dartmouth Scholarship
Precursors can serve as a bound on the speed of information with dispersive medium. We propose a method to identify the speed of optical wavefronts using polarization-based interference in a solid-state device, which can bound the accuracy of the speed of wavefronts to less than 10−4 with conventional experimental conditions. Our proposal may have important implications for optical communications and fast information processing.
Adapt-Lite: Privacy-Aware, Secure, And Efficient Mhealth Sensing, Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, David Kotz
Adapt-Lite: Privacy-Aware, Secure, And Efficient Mhealth Sensing, Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, David Kotz
Dartmouth Scholarship
As healthcare in many countries faces an aging population and rising costs, mobile sensing technologies promise a new opportunity. Using mobile health (mHealth) sensing, which uses medical sensors to collect data about the patients, and mobile phones to act as a gateway between sensors and electronic health record systems, caregivers can continuously monitor the patients and deliver better care. Although some work on mHealth sensing has addressed security, achieving strong security and privacy for low-power sensors remains a challenge. \par We make three contributions. First, we propose Adapt-lite, a set of two techniques that can be applied to existing wireless …
A Model Of So-Called "Zebra" Emissions In Solar Flare Radio Burst Continua, R. A. Treumann, R. Nakamura, W. Baumjohann
A Model Of So-Called "Zebra" Emissions In Solar Flare Radio Burst Continua, R. A. Treumann, R. Nakamura, W. Baumjohann
Dartmouth Scholarship
A simple mechanism for the generation of elec- tromagnetic “Zebra” pattern emissions is proposed. “Zebra” bursts are regularly spaced narrow-band radio emissions on the otherwise broadband radio continuum emitted by the ac- tive solar corona. The mechanism is based on the generation of an ion-ring distribution in a magnetic mirror geometry in the presence of a properly directed field-aligned electric po- tential field. Such ion-rings or ion-conics are well known from magnetospheric observations. Under coronal condi- tions they may become weakly relativistic. In this case the ion-cyclotron maser generates a number of electromagnetic ion-cyclotron harmonics which modulate the electron maser …
Reducing Sequencing Complexity In Dynamical Quantum Error Suppression By Walsh Modulation, David Hayes, Kaveh Khodjasteh, Lorenza Viola, Michael J. Biercuk
Reducing Sequencing Complexity In Dynamical Quantum Error Suppression By Walsh Modulation, David Hayes, Kaveh Khodjasteh, Lorenza Viola, Michael J. Biercuk
Dartmouth Scholarship
We study dynamical error suppression from the perspective of reducing sequencing complexity, with an eye toward facilitating the development of efficient semiautonomous quantum-coherent systems. To this end, we focus on digital sequences where all interpulse time periods are integer multiples of a minimum clock period and compatibility with digital classical control circuitry is intrinsic. We use so-called Walsh functions as a unifying mathematical framework; the Walsh functions are an orthonormal set of basis functions which may be associated directly with the control propagator for a digital modulation scheme. Using this insight, we characterize the suite of resulting Walsh dynamical decoupling …
Hide-N-Sense: Privacy-Aware Secure Mhealth Sensing, Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, David Kotz
Hide-N-Sense: Privacy-Aware Secure Mhealth Sensing, Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, David Kotz
Computer Science Technical Reports
As healthcare in many countries faces an aging population and rising costs, mobile sensing technologies promise a new opportunity. Using mobile health (mHealth) sensing, which uses medical sensors to collect data about the patients, and mobile phones to act as a gateway between sensors and electronic health record systems, caregivers can continuously monitor the patients and deliver better care. Furthermore, individuals can become better engaged in monitoring and managing their own health. Although some work on mHealth sensing has addressed security, achieving strong privacy for low-power sensors remains a challenge.
We make three contributions. First, we propose an mHealth sensing …
Bgrep And Bdiff: Unix Tools For High-Level Languages, Gabriel A. Weaver, Sean W. Smith
Bgrep And Bdiff: Unix Tools For High-Level Languages, Gabriel A. Weaver, Sean W. Smith
Computer Science Technical Reports
The rise in high-level languages for system administrators requires us to rethink traditional UNIX tools designed for these older data formats. We propose new block-oriented tools, bgrep and bdiff, operating on syntactic blocks of code rather than the line, the traditional information container of UNIX. Transcending the line number allows us to introduce longitudinal diff, a mode of bdiff that lets us track changes across arbitrary blocks of code. We present a detailed implementation roadmap and evaluation framework for the full version of this paper. In addition we demonstrate how the design of our tools already addresses several real-wold problems …
Melt Regimes, Stratigraphy, Flow Dynamics And Glaciochemistry Of Three Glaciers In The Alaska Range, Seth Campbell, Karl Kreutz, Erich Osterberg, Steven Arcone
Melt Regimes, Stratigraphy, Flow Dynamics And Glaciochemistry Of Three Glaciers In The Alaska Range, Seth Campbell, Karl Kreutz, Erich Osterberg, Steven Arcone
Dartmouth Scholarship
We used ground-penetrating radar (GPR), GPS and glaciochemistry to evaluate melt regimes and ice depths, important variables for mass-balance and ice-volume studies, of Upper Yentna Glacier, Upper Kahiltna Glacier and the Mount Hunter ice divide, Alaska. We show the wet, percolation and dry snow zones located below 2700ma.s.l., at 2700 to 3900ma.s.l. and above 3900ma.s.l., respectively. We successfully imaged glacier ice depths upwards of 480m using 40–100MHz GPR frequencies. This depth is nearly double previous depth measurements reached using mid-frequency GPR systems on temperate glaciers. Few Holocene-length climate records are available in Alaska, hence we also assess stratigraphy and flow …
Using Borehole Logging And Electron Backscatter Diffraction To Orient An Ice Core From Upper Fremont Glacier, Wyoming, Usa, R. W. Obbard, T. Cassano, K. Aho, G. Troderman, I. Baker
Using Borehole Logging And Electron Backscatter Diffraction To Orient An Ice Core From Upper Fremont Glacier, Wyoming, Usa, R. W. Obbard, T. Cassano, K. Aho, G. Troderman, I. Baker
Dartmouth Scholarship
While glacier fabric reflects the accumulated strain, detailed azimuthal information is required to link the microstructure to the flow, and this is not easily gathered at depth. Borehole logging provides a way to obtain a log of azimuthal orientation of tilted stratigraphic features that can be used to orient the core with respect to glacier flow. We demonstrate this using acoustic borehole logs and the ice core from a 162 m borehole in Upper Fremont Glacier, Wind River Range, Wyoming, USA. We measured the dip of tilted dust and bubble layers in the actual ice core, identified them on the …
Tackling Latency Using Fg, Priya Natarajan
Tackling Latency Using Fg, Priya Natarajan
Dartmouth College Ph.D Dissertations
Applications that operate on datasets which are too big to fit in main memory, known in the literature as external-memory or out-of-core applications, store their data on one or more disks. Several of these applications make multiple passes over the data, where each pass reads data from disk, operates on it, and writes data back to disk. Compared with an in-memory operation, a disk-I/O operation takes orders of magnitude (approx. 100,000 times) longer; that is, disk-I/O is a high-latency operation. Out-of-core algorithms often run on a distributed-memory cluster to take advantage of a cluster's computing power, memory, disk space, and …
Anomaly Detection In Network Streams Through A Distributional Lens, Chrisil Arackaparambil
Anomaly Detection In Network Streams Through A Distributional Lens, Chrisil Arackaparambil
Dartmouth College Ph.D Dissertations
Anomaly detection in computer networks yields valuable information on events relating to the components of a network, their states, the users in a network and their activities. This thesis provides a unified distribution-based methodology for online detection of anomalies in network traffic streams. The methodology is distribution-based in that it regards the traffic stream as a time series of distributions (histograms), and monitors metrics of distributions in the time series. The effectiveness of the methodology is demonstrated in three application scenarios. First, in 802.11 wireless traffic, we show the ability to detect certain classes of attacks using the methodology. Second, …
Pointer States Via Engineered Dissipation, Kaveh Khodjasteh, Viatcheslav V. V. Dobrovitski, Lorenza Viola
Pointer States Via Engineered Dissipation, Kaveh Khodjasteh, Viatcheslav V. V. Dobrovitski, Lorenza Viola
Dartmouth Scholarship
Pointer states are long-lasting high-fidelity states in open quantum systems. We show how any pure state in a non-Markovian open quantum system can be made to behave as a pointer state by suitably engineering the coupling to the environment via open-loop periodic control. Engineered pointer states are constructed as approximate fixed points of the controlled open-system dynamics, in such a way that they are guaranteed to survive over a long time with a fidelity determined by the relative precision with which the dynamics is engineered. We provide quantitative minimum-fidelity bounds by identifying symmetry and ergodicity conditions that the decoherence-inducing perturbation …
Does The Normal Stress Parallel To The Sliding Plane Affect The Friction Of Ice Upon Ice?, Andrew L. Fortt, Erland M. Schulson
Does The Normal Stress Parallel To The Sliding Plane Affect The Friction Of Ice Upon Ice?, Andrew L. Fortt, Erland M. Schulson
Dartmouth Scholarship
Sliding experiments were performed at –10 degrees C on smooth surfaces of freshwater columnar-grained S2 ice sliding against itself at a velocity of 8X10 –4 ms –1, with the purpose of examining whether normal stress parallel to the sliding plane affects frictional resistance. This component of the stress tensor was varied (0.20–1.83 MPa) using a loading system operated under biaxial compression, by orienting the sliding plane at two different angles, 26 degrees and 64 degrees, with respect to the principal loading direction. Under these conditions, no evidence was found to indicate that the normal stress in the direction of …
Discovery Of A Bright, Extremely Low Mass White Dwarf In A Close Double Degenerate System, S. Vennes, J. R. Thorstensen, A. Kawka, P. Németh, J. N. Skinner
Discovery Of A Bright, Extremely Low Mass White Dwarf In A Close Double Degenerate System, S. Vennes, J. R. Thorstensen, A. Kawka, P. Németh, J. N. Skinner
Dartmouth Scholarship
We report the discovery of a bright (V ~ 13.7), extremely low-mass white dwarf in a close double degenerate system. We originally selected GALEX J171708.5+675712 for spectroscopic follow-up among a group of white dwarf candidates in an ultraviolet-optical reduced proper-motion diagram. The new white dwarf has a mass of 0.18 M_solar and is the primary component of a close double degenerate system (P=0.246137 d, K_1 = 288 km/s) comprising a fainter white dwarf secondary with M_2 ~ 0.9 M_solar. Light curves phased with the orbital ephemeris show evidence of relativistic beaming and weaker ellipsoidal variations. The light curves also reveal …
Autoscopy Jr.: Intrusion Detection For Embedded Control Systems, Jason O. Reeves
Autoscopy Jr.: Intrusion Detection For Embedded Control Systems, Jason O. Reeves
Dartmouth College Master’s Theses
Securing embedded control systems within the power grid presents a unique challenge: on top of the resource restrictions inherent to these devices, SCADA systems must also accommodate strict timing requirements that are non-negotiable, and their massive scale greatly amplifies costs such as power consumption. These constraints make the conventional approach to host intrusion detection--namely, employing virtualization in some manner--too costly or impractical for embedded control systems within critical infrastructure. Instead, we take an in-kernel approach to system protection, building upon the Autoscopy system developed by Ashwin Ramaswamy that places probes on indirectly-called functions and uses them to monitor its host …
Beyond Selinux: The Case For Behavior-Based Policy And Trust Languages, Sergey Bratus, Michael E. Locasto, Boris Otto, Rebecca Shapiro, Sean W. Smith, Gabriel Weaver
Beyond Selinux: The Case For Behavior-Based Policy And Trust Languages, Sergey Bratus, Michael E. Locasto, Boris Otto, Rebecca Shapiro, Sean W. Smith, Gabriel Weaver
Computer Science Technical Reports
Despite the availability of powerful mechanisms for security policy and access control, real-world information security practitioners---both developers and security officers---still find themselves in need of something more. We believe that this is the case because available policy languages do not provide clear and intelligible ways to allow developers to communicate their knowledge and expectations of trustworthy behaviors and actual application requirements to IT administrators. We work to address this policy engineering gap by shifting the focus of policy language design to this communication via behavior-based policies and their motivating scenarios.