Now showing items 1-20 of 91

    • Implementations of bidirectional reordering algorithms 

      Atkin, Steven; Stansifer, Ryan (2000)
      The goal of this paper is to contribute to a deeper understanding of the Unicode Bidirectional Reference Algorithm. We have provided an alternative reference algorithm written in the functional language Haskell. The advantage ...
    • A protocol language approach to generating client-server software 

      Douglas, Melvin A.L.; Chan, Philip K. (2000-10-07)
      Client-server software is becoming more common as the Internet grows. To ease the burden of repeatedly writing low-level communication and protocol code, we seek to design a protocol language, My Simple Protocol Language ...
    • Enabling mobile agents communication 

      Samarah, Mohammad; Chan, Philip K. (2000-10-23)
      In this paper, we investigate the need for well-suited remote communication architectures to address communication issues in mobile agent environments. We study the implication of mobility for agent architectures – ...
    • Completeness of propositional logic as a program (with code) 

      Stansifer, Ryan (2001-10-04)
      The proof of completeness for propositional logic is a constructive one, so a computer program is suggested by the proof. We prove the completeness theorem for Łukasiewicz’ axioms directly, and translate the proof into the ...
    • Detecting novel attacks by identifying anomalous network packet headers 

      Mahoney, Matthew V.; Chan, Philip K. (2001-10-07)
      We describe a simple and efficient network intrusion detection algorithm that detects novel attacks by flagging anomalous field values in packet headers at the data link, network, and transport layers. In the 1999 DARPA ...
    • A generalized framework for reasoning with angular directions 

      Mitra, Debasis (2001-11-03)
      This extended abstract presents a new scheme for qualitative reasoning with directions between points in 2D-space, called Star-ontology(6). The current results of our study on the complexity issues for reasoning with ...
    • PHAD: packet header anomaly detection for identifying hostile network traffic 

      Mahoney, Matthew V.; Chan, Philip K. (2001-11-10)
      We describe an experimental packet header anomaly detector (PHAD) that learns the normal range of values for 33 fields of the Ethernet, IP, TCP, UDP, and ICMP protocols. On the 1999 DARPA off-line intrusion detection ...
    • Survivable mobile operating system 

      Samarah, Mohammad; Whittaker, James (2001-12-04)
      Although there is a large body of work on cryptographic techniques and algorithms that provide basic building blocks to solve specific security problems, relatively little work has been done in investigating security issues ...
    • Testing exception and error cases using runtime fault injection 

      Whittaker, James A.; Mottay, Florence E.; El-Far, Ibrahim K. (2001-12-13)
      Fault injection deals with the insertion or simulation of faults in order to test the robustness and fault tolerance of a software application. Such measures are generally performed on software that is mission critical, ...
    • A framework for multilingual information processing 

      Atkin, Steven Edward (2002-02-18)
      Recent and (continuing) rapid increases in computing power now enable more of humankind's written communication to be represented as digital data. The most recent and obvious changes in multilingual information processing ...
    • On the use of Linda as a framework for distributed database systems 

      Thirukonda, Madhan M.; Menezes, Ronaldo (2002-02-22)
      Linda is a coordination language capable of solving issues in distributed computing environments that relate to process synchronization, communication and creation. The expressiveness of Linda in distributed systems is ...
    • Measuring pointing times of a non-visual haptic interface 

      Hrezo, Gary Wayne (2002-03-04)
      An experiment was performed to evaluate the effectiveness of using haptics (force feedback of a manual joystick) in a non-visual computing environment. It was believed that a haptic display would enhance, if not eliminate, ...
    • Coordination using logical operators in Linda 

      Snyder, James Kendall (2002-03-04)
      During the past 20 years, research in coordination has had success in demonstrating that distributed systems are made of two distinct parts: computation and coordination. One of the models that has contributed to the success ...
    • Learning nonstationary models of normal network traffic for detecting novel attacks 

      Mahoney, Matthew V.; Chan, Philip K. (2002-04-29)
      Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new attacks which do not have known signatures. In ...
    • WebSpy: an architecture for monitoring web server availability in a multi-platform environment 

      Thirukonda, Madhan M.; Becker, Shirley A. (2002-05-08)
      For an electronic business (e-business), customer satisfaction can be the difference between long-term success and short-term failure. Customer satisfaction is highly impacted by web server availability, as customers expect ...
    • Learning models of network traffic for detecting novel attacks 

      Mahoney, Matthew V.; Chan, Philip K. (2002-05-24)
      Network intrusion detection systems often rely on matching patterns that are gleaned from known attacks. While this method is reliable and rarely produces false alarms, it has the obvious disadvantage that it cannot detect ...
    • Software design based on operational modes 

      Jorgensen, Alan Albert (2002-07-23)
      The use of software is ubiquitous despite its reputation for low reliability. This dissertation experimentally verifies this reputation and then proposed changes to the development process to prevent certain classes of ...
    • Unicode compress: does size really matter? 

      Atkin, Steve; Stansifer, Ryan (2002-07-31)
      The Unicode standard provides several algorithms, techniques, and strategies for assigning, transmitting, and compressing Unicode characters. These techniques allow Unicode data to be represented in a concise format in ...
    • A unique examination of the buffer overflow condition 

      Gillette, Terry B. (2002-08-27)
      Buffer overflows have been the most common form of security vulnerability for the last ten years. Moreover, buffer overflow vulnerabilities enable the type of exploits that dominate remote network penetration. As our ...
    • Network traffic anomaly detection based on packet bytes 

      Mahoney, Matthew V. (2002-09-06)
      Hostile network traffic is often "different" from benign traffic in ways that can be distinguished without knowing the nature of the attack. We describe a two-stage anomaly detection system for identifying suspicious ...