Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Computer Sciences

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 1470

Full-Text Articles in Physical Sciences and Mathematics

Humancentric Applications Of Rfid Chips, S. Derrick, K. Michael, H. Tootell Dec 2012

Humancentric Applications Of Rfid Chips, S. Derrick, K. Michael, H. Tootell

Dr Holly Tootell

No abstract provided.


Unit Rectangle Visibility Graphs, Alice M. Dean, Joanna A. Ellis-Monaghan, Sarah J. Hamilton, Greta Pangborn Dec 2007

Unit Rectangle Visibility Graphs, Alice M. Dean, Joanna A. Ellis-Monaghan, Sarah J. Hamilton, Greta Pangborn

Mathematics, Statistics and Computer Science Faculty Research and Publications

Over the past twenty years, rectangle visibility graphs have generated consider- able interest, in part due to their applicability to VLSI chip design. Here we study unit rectangle visibility graphs, with fixed dimension restrictions more closely modeling the constrained dimensions of gates and other circuit components in computer chip applications. A graph G is a unit rectangle visibility graph (URVG) if its vertices can be represented by closed unit squares in the plane with sides parallel to the axes and pairwise disjoint interiors, in such a way that two vertices are adjacent if and only if there is a non-degenerate …


Front Matter Dec 2007

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2007

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2007

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Toward A New Generation Of Ice Sheet Models, Christopher M. Little, Michael Oppenheimer, Richard B. Alley, Venkatramani Balaji, Garry K. C. Clarke, Thomas L. Delworth, Robert Hallberg, David Holland, Christina L. Hulbe, Stan Jacobs, Jesse V. Johnson, Hiram Levy, William Lipscomb, Shawn J. Marshall, Byron R. Parizek, Antony J. Payne, Gavin A. Schmidt, Ronald J. Stouffer, David G. Vaughan, Michael Winton Dec 2007

Toward A New Generation Of Ice Sheet Models, Christopher M. Little, Michael Oppenheimer, Richard B. Alley, Venkatramani Balaji, Garry K. C. Clarke, Thomas L. Delworth, Robert Hallberg, David Holland, Christina L. Hulbe, Stan Jacobs, Jesse V. Johnson, Hiram Levy, William Lipscomb, Shawn J. Marshall, Byron R. Parizek, Antony J. Payne, Gavin A. Schmidt, Ronald J. Stouffer, David G. Vaughan, Michael Winton

Computer Science Faculty Publications

This report summarizes the conclusions and recommendations of a 1-day workshop on ice sheet modeling held at the NOAA Geophysical Fluid Dynamics Laboratory on 8 January 2007, sponsored by NOAA and by the Program in Science, Technology, and Environmental Policy of the Woodrow Wilson School of Public and International Affairs at Princeton University, N. J.


Automated Refinement And Augmentation Of Web Service Description Files, Marc Fisher Ii, Sebastian Elbaum, Gregg Rothermel Dec 2007

Automated Refinement And Augmentation Of Web Service Description Files, Marc Fisher Ii, Sebastian Elbaum, Gregg Rothermel

CSE Technical Reports

Web Service Description Language (WSDL) is being increasingly used to specify web service interfaces. Specifications of this type, however, are often incomplete or imprecise. For example, cursory examination of the WSDL file for Amazon’s E-Commerce Web Service reveals that it often uses a less specific type where a more specific type is applicable, or declares that elements could be missing where other documentation indicates that they are required. Further, specifications reflecting the temporal relationships between operations are completely missing, which is not surprising since they are not supported by the current WSDL standard. These problems in WSDL specifications can cause …


A Unified Framework For Solving Multiagent Task Assignment Problems, Kevin Cousin Dec 2007

A Unified Framework For Solving Multiagent Task Assignment Problems, Kevin Cousin

Theses and Dissertations

Multiagent task assignment problem descriptors do not fully represent the complex interactions in a multiagent domain, and algorithmic solutions vary widely depending on how the domain is represented. This issue is compounded as related research fields contain descriptors that similarly describe multiagent task assignment problems, including complex domain interactions, but generally do not provide the mechanisms needed to solve the multiagent aspect of task assignment. This research presents a unified approach to representing and solving the multiagent task assignment problem for complex problem domains. Ideas central to multiagent task allocation, project scheduling, constraint satisfaction, and coalition formation are combined to …


Settling For Limited Privacy: How Much Does It Help?, Anna M. Shubina Dec 2007

Settling For Limited Privacy: How Much Does It Help?, Anna M. Shubina

Dartmouth College Ph.D Dissertations

This thesis explores practical and theoretical aspects of several privacy-providing technologies, including tools for anonymous web-browsing, verifiable electronic voting schemes, and private information retrieval from databases. State-of-art privacy-providing schemes are frequently impractical for implementational reasons or for sheer information-theoretical reasons due to the amount of information that needs to be transmitted. We have been researching the question of whether relaxing the requirements on such schemes, in particular settling for imperfect but sufficient in real-world situations privacy, as opposed to perfect privacy, may be helpful in producing more practical or more efficient schemes. This thesis presents three results. The first result …


A Hybrid Multi-Robot Control Architecture, Daylond J. Hooper Dec 2007

A Hybrid Multi-Robot Control Architecture, Daylond J. Hooper

Theses and Dissertations

Multi-robot systems provide system redundancy and enhanced capability versus single robot systems. Implementations of these systems are varied, each with specific design approaches geared towards an application domain. Some traditional single robot control architectures have been expanded for multi-robot systems, but these expansions predominantly focus on the addition of communication capabilities. Both design approaches are application specific and limit the generalizability of the system. This work presents a redesign of a common single robot architecture in order to provide a more sophisticated multi-robot system. The single robot architecture chosen for application is the Three Layer Architecture (TLA). The primary strength …


Rendering Principal Direction Contour Lines With Oriented Textures, Kelly Gallagher Dec 2007

Rendering Principal Direction Contour Lines With Oriented Textures, Kelly Gallagher

All Theses

In this paper we explore the use of contour lines in computer graphics as a means of conveying shape to the end-user. Contour lines provide an alternative to traditional realistic rendering styles and may even provide a more appropriate visualization for certain situations. For our images, contour line orientation is established in accordance with principal curvature directions.
We present a method for rendering a texture, oriented in the principal curvature direction, across a traditionally-modeled geometric surface that effectively forms suggestive contour lines to enhance the visualization of that surface. We further extend the method to create animated contour textures, wherein …


A Middle-Ware Level Client Cache For A High Performance Computing I/O Simulator, Michael Bassily Dec 2007

A Middle-Ware Level Client Cache For A High Performance Computing I/O Simulator, Michael Bassily

All Theses

This thesis describes the design and run time analysis of the system level middle-ware cache for Hecios. Hecios is a high performance cluster I/O simulator. With Hecios, we provide a simulation environment that accurately captures the performance characteristics of all the components in a clusterwide parallel file system. Hecios was specifically modeled after PVFS2. It was designed to be extensible and to easily allow for various component modules to be easily replaced by those that model other system types. Built around the OMNeT++ simulation package, Hecios' inner-cluster communication module is easily adaptable to any TCP/IP based protocol and all standard …


Hybrid Image/Model Based Gaze-Contingent Rendering, Hunter Murphy Dec 2007

Hybrid Image/Model Based Gaze-Contingent Rendering, Hunter Murphy

All Dissertations

A non-isotropic hybrid image/model based gaze-contingent rendering technique utilizing ray casting on a GPU is discussed. Empirical evidence derived from human subject experiments indicates an inverse relationship between a peripherally degraded scene's high-resolution inset size and mean search time, a trend consistent with existing image-based and model-based techniques. In addition, the data suggest that maintaining a target's silhouette edges decreases search times when compared to targets with degraded edges. Benefits of the hybrid technique include simplicity of design and parallelizability, both conducive to GPU implementation.


Learning Languages From Positive Data And A Limited Number Of Short Counterexamples, Sanjay Jain, Efim Kinber Dec 2007

Learning Languages From Positive Data And A Limited Number Of Short Counterexamples, Sanjay Jain, Efim Kinber

School of Computer Science & Engineering Faculty Publications

We consider two variants of a model for learning languages in the limit from positive data and a limited number of short negative counterexamples (counterexamples are considered to be short if they are smaller than the largest element of input seen so far). Negative counterexamples to a conjecture are examples which belong to the conjectured language but do not belong to the input language. Within this framework, we explore how/when learners using n short (arbitrary) negative counterexamples can be simulated (or simulate) using least short counterexamples or just ‘no’ answers from a teacher. We also study how a limited number …


Distributed Web Service Coordination For Collaboration Applications And Biological Workflows, Janaka Lalith Balasooriya Dec 2007

Distributed Web Service Coordination For Collaboration Applications And Biological Workflows, Janaka Lalith Balasooriya

Computer Science Dissertations

In this dissertation work, we have investigated the main research thrust of decentralized coordination of workflows over web services. To address distributed workflow coordination, first we have developed “Web Coordination Bonds” as a capable set of dependency modeling primitives that enable each web service to manage its own dependencies. Web bond primitives are as powerful as extended Petri nets and have sufficient modeling and expressive capabilities to model workflow dependencies. We have designed and prototyped our “Web Service Coordination Management Middleware” (WSCMM) system that enhances current web services infrastructure to accommodate web bond enabled web services. Finally, based on core …


Improving Information Security Management In Nonprofit Organisations With Action, Mark Carey-Smith, Karen Nelson, Lauren May Dec 2007

Improving Information Security Management In Nonprofit Organisations With Action, Mark Carey-Smith, Karen Nelson, Lauren May

Australian Information Security Management Conference

Information security is vital for protecting important assets of organisations, including the information resources and the organisation’s reputation. In Australia, the nonprofit sector makes a significant contribution to society but is under represented in the information security literature. This paper describes research in progress that is investigating and improving information security management in some nonprofit organisations (NPOs), which incorporates a participatory action research methodology. This approach will enhance the skill set likely to be present in Australian nonprofit organisations, producing a more sustainable solution, as well as contributing to the open literature. The Technology Acceptance Model will be utilised as …


Device- Versus Network-Centric Authentication Paradigms For Mobile Devices: Operational And Perceptual Trade-Offs, S. Karatzouni, N. L. Clarke, S. M. Furnell Dec 2007

Device- Versus Network-Centric Authentication Paradigms For Mobile Devices: Operational And Perceptual Trade-Offs, S. Karatzouni, N. L. Clarke, S. M. Furnell

Australian Information Security Management Conference

The increasing capability and functionality of mobile devices is leading to a corresponding increase in the need for security to prevent unauthorised access. Indeed, as the data and services accessed via mobile devices become more sensitive, the existing method of user authentication (predominately based upon Personal Identification Numbers) appears increasingly insufficient. An alternative basis for authentication is offered by biometric approaches; which have the potential to be implemented in a non-intrusive manner and also enable authentication to be applied in an ongoing manner, beyond initial point-of-entry. However, the implementation of any authentication mechanism, particularly biometric approaches, introduces considerations of where …


Intrusion Detection System (Ids) Techniques And Responses For Mobile Wireless Networks, Krishnun Sansurooah Dec 2007

Intrusion Detection System (Ids) Techniques And Responses For Mobile Wireless Networks, Krishnun Sansurooah

Australian Information Security Management Conference

In recent years, the rapidly expanding area of mobile and wireless computing applications was definitely redefined the concept of network security. Even though that wireless had opened a new and exiting world with its advancing technology it is no doubt that it is popularity is on the rise. However, the biggest concern with either wireless or mobile computing applications in security. It can no longer be effective in the traditional way of securing networks with the use of firewalls and even with the use of stronger encryption algorithm keys. The need to develop and research for new structures and methods …


Medical Insecurity: When One Size Does Not Fit All, Patricia A. Williams Dec 2007

Medical Insecurity: When One Size Does Not Fit All, Patricia A. Williams

Australian Information Security Management Conference

Security is most commonly seen as a business concept. This is one reason for the poor uptake and implementation of standard security processes in non-business environments such as general medical practice. It is clear that protection of sensitive patient information is imperative yet the overarching conceptual business processes required to ensure this protection are not well suited to this context. The issue of sensitivity of information, together with the expectation that security can be effectively implemented by non-security trained professionals creates an insecure environment. The general security processes used by business, including those for risk assessment, are difficult to operationally …


Security Issues Within Virtual Worlds Such As Second Life, Chia Yao Lee, Matthew Warren Dec 2007

Security Issues Within Virtual Worlds Such As Second Life, Chia Yao Lee, Matthew Warren

Australian Information Security Management Conference

The advancement in Internet and bandwidth has resulted in a number of new applications to be developed. An area of advancement has been in the development of virtual worlds, where people can interact together via virtual characters. Virtual World systems have been so complex that virtual lives can be lived, including all aspect of life such as education, commerce, social activities etc. Not surprisingly, the problems that exist in the real world such as theft, fraud, vandalism and terrorism, also exist in the virtual worlds. The more developed these virtual worlds become the greater the breaches of security will be …


A Single Channel Attack On 915mhz Radio Frequency Identification Systems, Christopher Bolan Dec 2007

A Single Channel Attack On 915mhz Radio Frequency Identification Systems, Christopher Bolan

Australian Information Security Management Conference

There has been some speculation as to the protection offered by the Frequency Hopping Spread Spectrum utilised by RFID technology. This paper explores the construction of an attack based on the broadcast of an attack signal in a single channel. The study details an experiment on two groups of tags where the experimental group are exposed to an attack signal broadcast on a single channel. With consistent findings across both control and experimental groups the experiment clearly demonstrates that FHSS offers no protection against such an attack.


Teaching Php With Security In Mind, Greg Baatard Dec 2007

Teaching Php With Security In Mind, Greg Baatard

Australian Information Security Management Conference

The PHP server-side scripting language has found significant popularity due to its accessibility, simplicity and affordability. With the deployment of PHP-inclusive web development environments becoming easier, universities have begun to offer units of study in the language. However, students coming from a background of HTML-based web development will often not be adequately prepared to consider the security implications associated with a powerful scripting language. It is important that students are taught to recognise and respond to the security implications of their code from an early stage, as a matter of good programming practice. This paper demonstrates how security teachings can …


Evolution Of A Database Security Course: Using Non-Enterprise Teaching Tools, Justin Brown Dec 2007

Evolution Of A Database Security Course: Using Non-Enterprise Teaching Tools, Justin Brown

Australian Information Security Management Conference

This paper examines the issues in delivering a university unit of teaching in database security, examining problems in database environment selection and the ability to provide hands on training for students via oncampus and online modes. Initial problems with Linux and then Windows based enterprise database environments prompted the adoption of Microsoft Access as a database tool that was easier to deliver in-class and online. Though Access is file based and has fundamental flaws in its security implementation (within the enterprise context) it can be tweaked to emulate RDBMS level security, allowing students to see how a properly designed security …


The Impact Of Security Surveys Within Australia And New Zealand, Matthew J. Warren, Shona Leitch Dec 2007

The Impact Of Security Surveys Within Australia And New Zealand, Matthew J. Warren, Shona Leitch

Australian Information Security Management Conference

Information security is portrayed as a global problem that impacts all countries that are considered as part of the Information Society. Recent surveys show that there are increased concerns about computer crime. The paper will focus upon recent national security surveys from Australia and New Zealand and the trends that this research shows. Is it fair to assume the security practices are the same all over the world? The paper looks at security practices from a number of different countries perspectives and shows that security practices are not generic and vary from country to country. The paper will also evaluate …


An Investigation Into The Usability Of Graphical Authentication Using Authentigraph, Paul Minne, Jason Wells, Damien Hutchinson, Justin Pierce Dec 2007

An Investigation Into The Usability Of Graphical Authentication Using Authentigraph, Paul Minne, Jason Wells, Damien Hutchinson, Justin Pierce

Australian Information Security Management Conference

There is increasing coverage in the literature relating to the different facets surrounding the security service of authentication, but there is a need for further research into the usability of graphical authentication. Specifically, the usability and viability of graphical authentication techniques for providing increased security needs to be further explored. There is a significant amount of evidence relating to traditional authentication techniques which highlight the fact that as technological advances grip modern societies, the requirement for more advanced authentication and security approaches increases. The exponential growth in the number of people using the Internet carries with it the high potential …


The Importance Of Human Factors When Assessing Outsourcing Security Risks, Carl Colwill, Andy Jones Dec 2007

The Importance Of Human Factors When Assessing Outsourcing Security Risks, Carl Colwill, Andy Jones

Australian Information Security Management Conference

The word is becoming increasingly interconnected and ways of doing business are evolving rapidly. Communications technology is ubiquitous and reliable and businesses are continuously seeking ways in which systems can be exploited to improve resilience, become more efficient and reduce costs. One way in which organisations seek to achieve this is by concentrating their efforts on core business processes and outsourcing non-core functions. However, outsourcing - and particularly offshoring - presents many security issues that must be considered throughout the lifetime of contracts. The scale of outsourcing and increasing technological and security complexity is making this task more difficult. Often …


How Safe Is Azeroth, Or, Are Mmorpgs A Security Risk?, An Hilven, Andrew Woodward Dec 2007

How Safe Is Azeroth, Or, Are Mmorpgs A Security Risk?, An Hilven, Andrew Woodward

Australian Information Security Management Conference

Massive Multiplayer Online Role Playing Games (MMORPGs) are at a basic level a networked application. Blizzard’s World of Warcraft is currently the largest example of such a type of application, with over nine million subscribers at last count. Whilst the idea of researching a game for network security may sound trivial, nine million potential backdoors into home and business computers is not. The ports used by the game, as well as authentication methods and client update programs were examined using packet analysis software. No obvious vulnerabilities were discovered as a result of this analysis. In addition to this analysis, an …


A Conceptual Model For Security Outsourcing, K. Samarasinghe, M. Warren, G. Pye Dec 2007

A Conceptual Model For Security Outsourcing, K. Samarasinghe, M. Warren, G. Pye

Australian Information Security Management Conference

This research analyses the current literature on IT security outsourcing and the organisational attitudes towards this approach to determine the applicability of outsourcing IT security in a commercial environment. A conceptual model is developed as the main goal of research which provides guidance in the process of outsourcing IT security functions to a third-party security service provider. The research conducted has established a complete process for outsourcing IT security.


Information Security Surveys: A Review Of The Methodologies, The Critics And A Pragmatic Approach To Their Purposes And Usage, Alexis Guillot, Sue Kennedy Dec 2007

Information Security Surveys: A Review Of The Methodologies, The Critics And A Pragmatic Approach To Their Purposes And Usage, Alexis Guillot, Sue Kennedy

Australian Information Security Management Conference

Each year the latest information security surveys are released to the computing and business communities. Often their findings and their methodologies are subject to criticism from the information security community, professional bodies and others in the profession. This paper looks at the viewpoints of both the producers and the critics of the surveys. The criticisms cover such issues as the methodologies, the response rates, the experience of the respondents, the design of the questions and the interpretation of the results. This paper looks at these issues and discusses the validity of these criticisms, the impact of the surveys and their …


Network Security – Is Ip Telephony Helping The Cause?, Paul Hansen, Andrew Woodward Dec 2007

Network Security – Is Ip Telephony Helping The Cause?, Paul Hansen, Andrew Woodward

Australian Information Security Management Conference

The major players in the Public Branch Exchange (PBX) market are moving rapidly towards the implementation of IP Telephony. What will be the effect on network security overall? Will the push to IP Telephony damage the good work already devoted to security networks? As more doorways open up on our networks there is an increased chance we have opened another unseen vector for hackers and other malicious organisation or individuals to access the data stored on server and users workstations, corrupting that data or destroying it. Is it better from a security perspective to have IP telephony only between PBX …