Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2001

Series

Dartmouth College

Computer Science Technical Reports

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Differential Elastic Image Registration, Senthil Periaswamy, Hany Farid Sep 2001

Differential Elastic Image Registration, Senthil Periaswamy, Hany Farid

Computer Science Technical Reports

We have applied techniques from differential motion estimation to the problem of automatic elastic registration of medical images. This method models the mapping between images as a locally affine but globally smooth warp. The mapping also explicitly accounts for variations in image intensities. This approach is simple and highly effective across a broad range of medical images. We show the efficacy of this approach on several synthetic and clinical images.


Detecting Steganographic Messages In Digital Images, Hany Farid Sep 2001

Detecting Steganographic Messages In Digital Images, Hany Farid

Computer Science Technical Reports

Techniques and applications for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting the presence of hidden messages has also become considerably more difficult. It is sometimes possible, nevertheless, to detect (but not necessarily decipher) the presence of embedded messages. The basic approach taken here works by finding predictable higher-order statistics of ``natural'' images within a multi-scale decomposition, and then showing that embedded messages alter these statistics.


Write Once, Move Anywhere: Toward Dynamic Interoperability Of Mobile Agent Systems, Arne Grimstrup, Robert Gray, David Kotz, Thomas Cowin, Greg Hill, Niranjan Suri, Daria Chacon, Martin Hofmann Jul 2001

Write Once, Move Anywhere: Toward Dynamic Interoperability Of Mobile Agent Systems, Arne Grimstrup, Robert Gray, David Kotz, Thomas Cowin, Greg Hill, Niranjan Suri, Daria Chacon, Martin Hofmann

Computer Science Technical Reports

Mobile agents are an increasingly popular paradigm, and in recent years there has been a proliferation of mobile-agent systems. These systems are, however, largely incompatible with each other. In particular, agents cannot migrate to a host that runs a different mobile-agent system. Prior approaches to interoperability have tried to force agents to use a common API, and so far none have succeeded. Our goal, summarized in the catch phrase ``Write Once, Move Anywhere,'' led to our efforts to develop mechanisms that support dynamic runtime interoperability of mobile-agent systems. This paper describes the Grid Mobile-Agent System, which allows agents to migrate …


Securing Web Servers Against Insider Attack, Shan Jiang, Sean Smith, Kazuhiro Minami Dartmouth College Jul 2001

Securing Web Servers Against Insider Attack, Shan Jiang, Sean Smith, Kazuhiro Minami Dartmouth College

Computer Science Technical Reports

Too often, ``security of Web transactions'' reduces to ``encryption of the channel''---and neglects to address what happens at the server on the other end. This oversight forces clients to trust the good intentions and competence of the server operator---but gives clients no basis for that trust. Furthermore, despite academic and industrial research in secure coprocessing, many in the computer science community still regard ``secure hardware'' as a synonym for ``cryptographic accelerator.' This oversight neglects the real potential of COTS secure coprocessing technology to establish trusted islands of computation in hostile environments---such as at web servers with risk of insider attack. …


Web Spoofing 2001, Yougu Yuan, Eileen Zishuang Ye, Sean Smith Dartmouth College Jul 2001

Web Spoofing 2001, Yougu Yuan, Eileen Zishuang Ye, Sean Smith Dartmouth College

Computer Science Technical Reports

The Web is currently the pre-eminent medium for electronic service delivery to remote users. As a consequence, authentication of servers is more important than ever. Even sophisticated users base their decision whether or not to trust a site on browser cues---such as location bar information, SSL icons, SSL warnings, certificate information, response time, etc. In their seminal work on web spoofing, Felten et al showed how a malicious server could forge some of these cues---but using approaches that are no longer reproducible. However, subsequent evolution of Web tools has not only patched security holes---it has also added new technology to …


Supporting Adaptive Ubiquitous Applications With The Solar System, Guanling Chen, David Kotz May 2001

Supporting Adaptive Ubiquitous Applications With The Solar System, Guanling Chen, David Kotz

Computer Science Technical Reports

As we embed more computers into our daily environment, ubiquitous computing promises to make them less noticeable and help to prevent information overload. We see, however, few ubiquitous applications that are able to adapt to the dynamics of user, physical, and computational context. We believe that there are two challenges causing this lack of ubiquitous applications: there is no flexible and scalable way to support information collection and dissemination in a ubiquitous and mobile environment, and there is no general approach to building adaptive applications given heterogeneous contextual information. We propose a system infrastructure, Solar, to meet these challenges. Solar …


Outbound Authentication For Programmable Secure Coprocessors, S W. Smith Mar 2001

Outbound Authentication For Programmable Secure Coprocessors, S W. Smith

Computer Science Technical Reports

A programmable secure coprocessor platform can help solve many security problems in distributed computing. These solutions usually require that coprocessor applications be able to participate as full-fledged parties in distributed cryptographic protocols. Thus, to fully enable these solutions, a generic platform must not only provide programmability, maintenance, and configuration in the hostile field---it must also provide outbound authentication for the entities that result. A particular application on a particular untampered device must be able to prove who it is to a party on the other side of the Internet. To be effective, a secure outbound authentication service must closely mesh …


Mobile-Agent Versus Client/Server Performance: Scalability In An Information-Retrieval Task, Robert S. Gray, David Kotz, Ronald A. Peterson Jr, Peter Gerken, Martin Hofmann, Daria Chacon, Greg Hill, Niranjan Suri Jan 2001

Mobile-Agent Versus Client/Server Performance: Scalability In An Information-Retrieval Task, Robert S. Gray, David Kotz, Ronald A. Peterson Jr, Peter Gerken, Martin Hofmann, Daria Chacon, Greg Hill, Niranjan Suri

Computer Science Technical Reports

Mobile agents are programs that can jump from host to host in the network, at times and to places of their own choosing. Many groups have developed mobile-agent software platforms, and several mobile-agent applications. Experiments show that mobile agents can, among other things, lead to faster applications, reduced bandwidth demands, or less dependence on a reliable network connection. There are few if any studies of the scalability of mobile-agent servers, particularly as the number of clients grows. We present some recent performance and scalability experiments that compare three mobile-agent platforms with each other and with a traditional client/server approach. The …


Ambiguity-Directed Sampling For Qualitative Analysis Of Sparse Data From Spatially-Distributed Physical Systems, Chris Bailey-Kellogg, Naren Ramakrishnan Jan 2001

Ambiguity-Directed Sampling For Qualitative Analysis Of Sparse Data From Spatially-Distributed Physical Systems, Chris Bailey-Kellogg, Naren Ramakrishnan

Computer Science Technical Reports

A number of important scientific and engineering applications, such as fluid dynamics simulation and aircraft design, require analysis of spatially-distributed data from expensive experiments and complex simulations. In such data-scarce applications, it is advantageous to use models of given sparse data to identify promising regions for additional data collection. This paper presents a principled mechanism for applying domain-specific knowledge to design focused sampling strategies. In particular, our approach uses ambiguities identified in a multi-level qualitative analysis of sparse data to guide iterative data collection. Two case studies demonstrate that this approach leads to highly effective sampling decisions that are also …


Lock-Free Scheduling Of Logical Processes In Parallel Simulation, Xiaowen Liu, David M. Nicol, King Tan Dartmouth College Jan 2001

Lock-Free Scheduling Of Logical Processes In Parallel Simulation, Xiaowen Liu, David M. Nicol, King Tan Dartmouth College

Computer Science Technical Reports

With fixed lookahead information in a simulation model, the overhead of asynchronous conservative parallel simulation lies in the mechanism used for propagating time updates in order for logical processes to safely advance their local simulation clocks. Studies have shown that a good scheduling algorithm should preferentially schedule processes containing events on the critical path. This paper introduces a lock-free algorithm for scheduling logical processes in conservative parallel discrete-event simulation on shared-memory multiprocessor machines. The algorithm uses fetch\&add operations that help avoid inefficiencies associated with using locks. The lock-free algorithm is robust. Experiments show that, compared with the scheduling algorithm using …