Now showing items 21-40 of 148

    • Testing exception and error cases using runtime fault injection 

      Whittaker, James A.; Mottay, Florence E.; El-Far, Ibrahim K. (2001-12-13)
      Fault injection deals with the insertion or simulation of faults in order to test the robustness and fault tolerance of a software application. Such measures are generally performed on software that is mission critical, ...
    • A framework for multilingual information processing 

      Atkin, Steven Edward (2002-02-18)
      Recent and (continuing) rapid increases in computing power now enable more of humankind's written communication to be represented as digital data. The most recent and obvious changes in multilingual information processing ...
    • On the use of Linda as a framework for distributed database systems 

      Thirukonda, Madhan M.; Menezes, Ronaldo (2002-02-22)
      Linda is a coordination language capable of solving issues in distributed computing environments that relate to process synchronization, communication and creation. The expressiveness of Linda in distributed systems is ...
    • Measuring pointing times of a non-visual haptic interface 

      Hrezo, Gary Wayne (2002-03-04)
      An experiment was performed to evaluate the effectiveness of using haptics (force feedback of a manual joystick) in a non-visual computing environment. It was believed that a haptic display would enhance, if not eliminate, ...
    • Coordination using logical operators in Linda 

      Snyder, James Kendall (2002-03-04)
      During the past 20 years, research in coordination has had success in demonstrating that distributed systems are made of two distinct parts: computation and coordination. One of the models that has contributed to the success ...
    • Genetic routing algorithms to optimize availability in broadband wireless networks with load balancing 

      Hortos, William S. (2002-03-11)
      Packet-switched networks using the Internet Protocol (IP) provide multimedia services through broadband wireless access to mobile and fixed subscribers from an IP core network via bi-directional paths consisting of a ...
    • Learning nonstationary models of normal network traffic for detecting novel attacks 

      Mahoney, Matthew V.; Chan, Philip K. (2002-04-29)
      Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new attacks which do not have known signatures. In ...
    • WebSpy: an architecture for monitoring web server availability in a multi-platform environment 

      Thirukonda, Madhan M.; Becker, Shirley A. (2002-05-08)
      For an electronic business (e-business), customer satisfaction can be the difference between long-term success and short-term failure. Customer satisfaction is highly impacted by web server availability, as customers expect ...
    • Learning models of network traffic for detecting novel attacks 

      Mahoney, Matthew V.; Chan, Philip K. (2002-05-24)
      Network intrusion detection systems often rely on matching patterns that are gleaned from known attacks. While this method is reliable and rarely produces false alarms, it has the obvious disadvantage that it cannot detect ...
    • Software design based on operational modes 

      Jorgensen, Alan Albert (2002-07-23)
      The use of software is ubiquitous despite its reputation for low reliability. This dissertation experimentally verifies this reputation and then proposed changes to the development process to prevent certain classes of ...
    • Unicode compress: does size really matter? 

      Atkin, Steve; Stansifer, Ryan (2002-07-31)
      The Unicode standard provides several algorithms, techniques, and strategies for assigning, transmitting, and compressing Unicode characters. These techniques allow Unicode data to be represented in a concise format in ...
    • A unique examination of the buffer overflow condition 

      Gillette, Terry B. (2002-08-27)
      Buffer overflows have been the most common form of security vulnerability for the last ten years. Moreover, buffer overflow vulnerabilities enable the type of exploits that dominate remote network penetration. As our ...
    • Network traffic anomaly detection based on packet bytes 

      Mahoney, Matthew V. (2002-09-06)
      Hostile network traffic is often "different" from benign traffic in ways that can be distinguished without knowing the nature of the attack. We describe a two-stage anomaly detection system for identifying suspicious ...
    • An algorithm applicable to clearing combinatorial exchanges 

      Silaghi, Marius-Calin (2002-09-16)
      It is important to approach negotiations in a way that ensures privacy. So far, research has focused on securely solving restricted classes of negotiation techniques, mainly the (M+1)-st-price auctions. Here we show how ...
    • Learning implicit user interest hierarchy for context in personalization 

      Kim, Hyoung-Rae; Chan, Philip K. (2002-10-05)
      To provide a more robust context for personalization, we desire to extract a continuum of general (long-term) to specific (short-term) interests of a user. Our proposed approach is to learn a user interest hierarchy (UIH) ...
    • An optimum greedy algorithm for choosing minimal set of conflicting constraints in the point sequencing problem 

      Launay, Florent; Mitra, Debasis (2002-12-02)
      In this work, we first have proposed a technique to define the "causes" of inconsistency on an online point based reasoning constraint network. Second, we introduce an algorithm that proposes the user a minimal set of ...
    • HEAT: runtime interception of Win32 functions 

      Andrews, Michael M. (2003-01-14)
      When researching in any field, it is always important to build upon existing work. In most research disciplines, the core base is well defined and widely documented. However, the basis of innovative research in computer ...
    • An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection 

      Mahoney, Matthew V.; Chan, Philip K. (2003-01-27)
      We investigate potential simulation artifacts and their effects on the evaluation of network anomaly detection systems in the 1999 DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set. A statistical ...
    • Testing with hostile data streams 

      Jorgensen, Alan A. (2003-01-30)
      This note describes a method of testing software for response to malicious data streams. Systems that process data streams obtained from an external source such as the Internet are vulnerable to security issues if malicious ...
    • A new approach to scalable Linda-systems based on swarms (EXTENDED VERSION) 

      Menezes, Ronaldo; Tolksdorf, Robert (2003-03-07)
      Natural forming multi-agent systems (aka Swarms) have the ability to grow to enormous sizes without requiring any of the agents to oversee the entire system. The success of these systems comes from the fact that agents are ...