Open Access. Powered by Scholars. Published by Universities.®

Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Marquette University

Mathematics, Statistics and Computer Science Faculty Research and Publications

2007

Articles 1 - 3 of 3

Full-Text Articles in Mathematics

Unit Rectangle Visibility Graphs, Alice M. Dean, Joanna A. Ellis-Monaghan, Sarah J. Hamilton, Greta Pangborn Dec 2007

Unit Rectangle Visibility Graphs, Alice M. Dean, Joanna A. Ellis-Monaghan, Sarah J. Hamilton, Greta Pangborn

Mathematics, Statistics and Computer Science Faculty Research and Publications

Over the past twenty years, rectangle visibility graphs have generated consider- able interest, in part due to their applicability to VLSI chip design. Here we study unit rectangle visibility graphs, with fixed dimension restrictions more closely modeling the constrained dimensions of gates and other circuit components in computer chip applications. A graph G is a unit rectangle visibility graph (URVG) if its vertices can be represented by closed unit squares in the plane with sides parallel to the axes and pairwise disjoint interiors, in such a way that two vertices are adjacent if and only if there is a non-degenerate …


A Software-Based Trust Framework For Distributed Industrial Management Systems, Sheikh Iqbal Ahamed, Mohammad Zulkernine, Steve Wolfe Oct 2007

A Software-Based Trust Framework For Distributed Industrial Management Systems, Sheikh Iqbal Ahamed, Mohammad Zulkernine, Steve Wolfe

Mathematics, Statistics and Computer Science Faculty Research and Publications

One of the major problems in industrial security management is that most organizations or enterprises do not provide adequate guidelines or well-defined policy with respect to trust management, and trust is still an afterthought in most security engineering projects. With the increase of handheld devices, managers of business organizations tend to use handheld devices to access the information systems. However, the connection or access to an information system requires appropriate level of trust. In this paper, we present a flexible, manageable, and configurable software-based trust framework for the handheld devices of mangers to access distributed information systems. The presented framework …


Ets (Efficient, Transparent, And Secured) Self-Healing Service For Pervasive Computing Applications, Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed May 2007

Ets (Efficient, Transparent, And Secured) Self-Healing Service For Pervasive Computing Applications, Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed

Mathematics, Statistics and Computer Science Faculty Research and Publications

To ensure smooth functioning of numerous handheld devices anywhere anytime, the importance of self-healing mechanism cannot be overlooked. Incorporation of efficient fault detection and recovery in device itself is the quest for long but there is no existing self-healing scheme for devices running in pervasive computing environments that can be claimed as the ultimate solution. Moreover, the highest degree of transparency, security and privacy attainability should also be maintained. ETS Self-healing service, an integral part of our developing middleware named MARKS (Middleware Adaptability for Resource discovery, Knowledge usability, and Self-healing), holds promise for offering all of those functionalities.