Search
Now showing items 1-10 of 48
Network-Wide Prediction of BGP Routes
(Georgia Institute of Technology, 2006)
This paper presents provably correct algorithms for
computing the outcome of the BGP route-selection process for
each router in a network, without simulating the complex details
of BGP message passing. The algorithms ...
Operating System Interface Obfuscation and the Revealing of Hidden Operations
(Georgia Institute of Technology, 2008)
Many software security solutions—including malware analyzers, information flow tracking systems,
auditing utilities, and host-based intrusion detectors—rely on knowledge of standard system call interfaces
to reason about ...
LOCK: Locating Countermeasure-Capable Prefix Hijackers
(Georgia Institute of Technology, 2008)
Prefix hijacking is known as one of the security
threats on today’s Internet. A number of measurement based
solutions have been proposed to detect prefix hijacking events. In
this paper we take these solutions one step ...
Message Ferries as Generalized Dominating Sets in Intermittently Connected Mobile Networks
(Georgia Institute of Technology, 2009)
Message ferrying is a technique for routing
data in wireless and mobile networks in which one or more
mobile nodes are tasked with storing and carrying data
between sources and destinations. To achieve connectivity
between ...
Visualization of Exception Handling Constructs to Support Program Understanding
(Georgia Institute of Technology, 2009)
This paper presents a new visualization technique for supporting the understanding of exception-handling constructs in
Java programs. To understand the requirements for such a visualization, we surveyed a group of software ...
ALGORITHMS: Collaborative research: development of vector space based methods for protein structure prediction
(Georgia Institute of Technology, 2007-07-16)
Evaluating the effectiveness of using touch sensor capacitors as an input device for a wrist watch computer
(Georgia Institute of Technology, 2007-12-17)
On the go computing is becoming more important for users who wish to access information from anywhere. Wearable computers are an optimal solution to achieving this feat because it allows for easy accessibility and quick ...
Using First Order Inductive Learning as an Alternative to a Simulator in a Game Artificial Intelligence
(Georgia Institute of Technology, 2009-05-04)
Currently many game artificial intelligences attempt to determine their next moves by using a simulator to predict the effect of actions in the world. However, writing such a simulator is time-consuming, and the simulator ...
Performance Information Sharing Middleware
(Georgia Institute of Technology, 2008-05-05)
This thesis presents a design for distributed monitoring system designed to enable monitoring-informed optimizationsin distributed applications. Microbenchmarks and an evaluation in a scientific-computing scenario are ...
Distributed Feature Extraction Using Cloud Computing Resources
(Georgia Institute of Technology, 2009-05-04)
The need to expand the computational resources in a massive surveillance network is clear but traditional means of purchasing new equipment for short-term tasks every year is wasteful. In this work I will provide evidence ...