Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

San Jose State University

2007

Discipline
Keyword
Publication
Publication Type

Articles 31 - 36 of 36

Full-Text Articles in Physical Sciences and Mathematics

Cryptanalysis Of Sigaba, Wing Chan Jan 2007

Cryptanalysis Of Sigaba, Wing Chan

Master's Projects

SIGABA is a World War II cipher machine used by the United States. Both the United States Army and the United States Navy used it for tactical communication. In this paper, we consider an attack on SIGABA using the largest practical keyspace for the machine. This attack will highlight the strengths and weaknesses of the machine, as well as provide an insight into the strength of the security provided by the cipher.


A Multiple-Copy Scheme For Multi-Channel Stop-And-Wait Harq, Yucheng Shih Jan 2007

A Multiple-Copy Scheme For Multi-Channel Stop-And-Wait Harq, Yucheng Shih

Master's Projects

HARQ (Hybrid Automatic Repeat Request) combines ARQ (Automatic Repeat Request) with FEC (Forward Error Correction) to provide a reliable way to ensure that data are received correctly and in sequence. A multiple-copy HARQ scheme is proposed for WiMAX (Worldwide Interoperability for Microwave Access) to reduce the waiting time of erroneously received data in the receivers’ buffer. In this project, the performances of WiMAX multi-channel stop-and-wait HARQ scheme are compared with that of the proposed multiple-copy HARQ scheme. The multiple-copy HARQ can send the same copy of a data burst on contiguous channels during noisy channel conditions so that the required …


Case Studies In Proof Checking, Robert Kam Jan 2007

Case Studies In Proof Checking, Robert Kam

Master's Projects

The aim of computer proof checking is not to find proofs, but to verify them. This is different from automated deduction, which is the use of computers to find proofs that humans have not devised first. Currently, checking a proof by computer is done by taking a known mathematical proof and entering it into the special language recognized by a proof verifier program, and then running the verifier to hopefully obtain no errors. Of course, if the proof checker approves the proof, there are considerations of whether or not the proof checker is correct, and this has been complicated by …


Comment: Boosting Algorithms: Regularization, Prediction And Model Fitting, A. Buja, David Mease, A. Wyner Jan 2007

Comment: Boosting Algorithms: Regularization, Prediction And Model Fitting, A. Buja, David Mease, A. Wyner

Faculty Publications

The authors are doing the readers of Statistical Science a true service with a well-written and up-to-date overview of boosting that originated with the seminal algorithms of Freund and Schapire. Equally, we are grateful for high-level software that will permit a larger readership to experiment with, or simply apply, boosting-inspired model fitting. The authors show us a world of methodology that illustrates how a fundamental innovation can penetrate every nook and cranny of statistical thinking and practice. They introduce the reader to one particular interpretation of boosting and then give a display of its potential with extensions from classification (where …


Pairwise Alignment Of Metamorphic Computer Viruses, Scott Mcghee Jan 2007

Pairwise Alignment Of Metamorphic Computer Viruses, Scott Mcghee

Master's Projects

Computer viruses and other forms of malware pose a threat to virtually any software system (with only a few exceptions). A computer virus is a piece of software which takes advantage of known weaknesses in a software system, and usually has the ability to deliver a malicious payload. A common technique that virus writers use to avoid detection is to enable the virus to change itself by having some kind of self-modifying code. This kind of virus is commonly known as a metamorphic virus, and can be particularly difficult to detect [17]. Existing virus detection software is continually being improved …


Securing Wireless Networks From Arp Cache Poisoning, Roney Philip Jan 2007

Securing Wireless Networks From Arp Cache Poisoning, Roney Philip

Master's Projects

Wireless networks have become an integral part of today’s networks. The ease of deployment, low cost, mobility and high data rates have contributed significantly to their popularity. The medium of data transmission in wireless networks makes them inherently less secure than wired networks. For wireless networks to access the Internet they must be connected to a wired network via an Access Point or a wireless router. This has led wireless network equipment manufacturers to implement wireless Access Points and wireless routers with a built in switch for wired clients and a WiFi access point for wireless clients. The set up …