Biblio

Found 19604 results

2005
Ferreira, P.M.F.M., Orvalho, J.M., Boavida, F..  2005.  Large Scale Mobile and Pervasive Augmented Reality Games. EUROCON 2005 - The International Conference on "Computer as a Tool". 2:1775—1778.
Ubiquitous or pervasive computing is a new kind of computing, where specialized elements of hardware and software will have such high level of deployment that their use will be fully integrated with the environment. Augmented reality extends reality with virtual elements but tries to place the computer in a relatively unobtrusive, assistive role. To our knowledge, there is no specialized network middleware solution for large-scale mobile and pervasive augmented reality games. We present a work that focus on the creation of such network middleware for mobile and pervasive entertainment, applied to the area of large scale augmented reality games. In, this context, mechanisms are being studied, proposed and evaluated to deal with issues such as scalability, multimedia data heterogeneity, data distribution and replication, consistency, security, geospatial location and orientation, mobility, quality of service, management of networks and services, discovery, ad-hoc networking and dynamic configuration
Katz, Jonathan, Shin, Ji Sun.  2005.  Modeling Insider Attacks on Group Key-exchange Protocols. Proceedings of the 12th ACM Conference on Computer and Communications Security. :180–189.

Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communication. It is fair to say that group AKE is currently less well understood than the case of two-party AKE; in particular, attacks by malicious insiders –- a concern specific to the group setting –- have so far been considered only in a relatively "ad-hoc" fashion. The main contribution of this work is to address this deficiency by providing a formal, comprehensive model and definition of security for group AKE which automatically encompasses insider attacks. We do so by defining an appropriate ideal functionality for group AKE within the universal composability (UC) framework. As a side benefit, any protocol secure with respect to our definition is secure even when run concurrently with other protocols, and the key generated by any such protocol may be used securely in any subsequent application.In addition to proposing this definition, we show that the resulting notion of security is strictly stronger than the one proposed by Bresson, et al. (termed "AKE-security"), and that our definition implies all previously-suggested notions of security against insider attacks. We also show a simple technique for converting any AKE-secure protocol into one secure with respect to our definition.

2006
Xin, Wuping, Hourdos, John, Michalopoulos, Panos.  2006.  Comprehensive evaluation of new integrated freeway ramp control strategy. Transportation Research Record: Journal of the Transportation Research Board. :46–54.
George K. Atia, Masoud Sharif, Venkatesh Saligrama.  2006.  Effect of Geometry on the Diversity-Multiplexing Tradeoff in Relay Channels. Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006.
Onur Savas, Murat Alanyali, Venkatesh Saligrama.  2006.  Efficient In-Network Processing Through Local Ad-Hoc Information Coalescence. Distributed Computing in Sensor Systems, Second {IEEE} International Conference, {DCOSS} 2006, San Francisco, CA, USA, June 18-20, 2006, Proceedings. 4026:252–265.
Marwedel, Peter.  2006.  Embedded system design. 1

A unique feature of this textbook is to provide a comprehensive introduction to the fundamental knowledge in embedded systems, with applications in cyber-physical systems and the Internet of things. It starts with an introduction to the field and a survey of specification models and languages for embedded and cyber-physical systems. It provides a brief overview of hardware devices used for such systems and presents the essentials of system software for embedded systems, including real-time operating systems. The author also discusses evaluation and validation techniques for embedded systems and provides an overview of techniques for mapping applications to execution platforms, including multi-core platforms. Embedded systems have to operate under tight constraints and, hence, the book also contains a selected set of optimization techniques, including software optimization techniques. The book closes with a brief survey on testing. This third edition has been updated and revised to reflect new trends and technologies, such as the importance of cyber-physical systems and the Internet of things, the evolution of single-core processors to multi-core processors, and the increased importance of energy efficiency and thermal issues.

Feng, Baichun, Hourdos, John, Michalopoulos, Panos.  2006.  Improving Minnesota's stratified ramp control strategy. Transportation Research Record: Journal of the Transportation Research Board. :77–83.
Venkatesh Saligrama, David Starobinski.  2006.  On the macroscopic effects of local interactions in multi-hop wireless networks. 4th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2006), 3-6 April 2006, Boston, Massachusetts, {USA}. :161–168.
Xin, Wuping, Hourdos, John, Michalopoulos, Panos.  2006.  Preprocessing volume input data for improved traffic simulation. Transportation Research Record: Journal of the Transportation Research Board. :192–200.
Hourdos, John, Garg, Vishnu, Michalopoulos, Panos, Davis, Gary.  2006.  Real-time detection of crash-prone conditions at freeway high-crash locations. Transportation research record: journal of the transportation research board. :83–91.
Venkatesh Saligrama, David A. Castañón.  2006.  Reliable Tracking With Intermittent Communications. 2006 {IEEE} International Conference on Acoustics Speech and Signal Processing, {ICASSP} 2006, Toulouse, France, May 14-19, 2006. :1141–1144.
Sekine, Junko, Campos-Náñnez, Enrique, Harrald, John R., Abeledo, Hernán.  2006.  A Simulation-Based Approach to Trade-off Analysis of Port Security. Proceedings of the 38th Conference on Winter Simulation. :521–528.

Motivated by the September 11 attacks, we are addressing the problem of policy analysis of supply-chain security. Considering the potential economic and operational impacts of inspection together with the inherent difficulty of assigning a reasonable cost to an inspection failure call for a policy analysis methodology in which stakeholders can understand the trade-offs between the diverse and potentially conflicting objectives. To obtain this information, we used a simulation-based methodology to characterize the set of Pareto optimal solutions with respect to the multiple objectives represented in the decision problem. Our methodology relies on simulation and the response surface method (RSM) to model the relationships between inspection policies and relevant stakeholder objectives in order to construct a set of Pareto optimal solutions. The approach is illustrated with an application to a real-world supply chain.

2007
Heaslip, Kevin.  2007.  Application of FAIR Lanes to Help Alleviate Freeway Congestion. ITE 2007 Annual Meeting and ExhibitInstitute of Transportation Engineers.
Heaslip, Kevin.  2007.  Are Travel Patterns of Older Drivers Changing? Submitted to the 29th International Association for Time use Research Conference, Washington, DC.