George Mason University

Displaying 41-80 of 119 results

  • White Papers // Jan 2011

    Usage Control: A Vision for Next Generation Access Control

    The term Usage Control (UCON) is a generalization of access control to cover obligations, conditions, continuity (Ongoing controls) and mutability. Traditionally, access control has dealt only with authorization decisions on a subject's access to target resources. Obligations are requirements that have to be fulfilled by the subject for allowing access....

    Provided By George Mason University

  • White Papers // Jan 2011

    Life After Self-Healing: Assessing Post-Repair Program Behavior

    One promising technique for defending software systems against vulnerabilities involve the use of self-healing. Such efforts, however, carry a great deal of risk because they largely bypass the cycle of human-driven patching and testing used to vet both vendor and internally developed patches. In particular, it is difficult to predict...

    Provided By George Mason University

  • White Papers // Dec 2010

    Ruminate: A Scalable Architecture for Deep Network Analysis

    Traditionally, Network Intrusion Detection Systems (NIDS) inspect packet header and payload data for malicious content. While each system is different, most NIDS perform limited analysis on network streams and network protocols. Unfortunately, current NIDS are typically susceptible to evasion through network protocol encoding, such as base64 encoding of SMTP/MIME or...

    Provided By George Mason University

  • White Papers // Dec 2010

    Method and Model to Assess the Performance of Clustered Databases: The Oracle RAC Case

    Oracle allows for locking at the row level and uses a multi-version read consistency model. To provide scalability, Oracle embeds lock data into the data blocks within the database. For added availability and performance, Oracle provides Real Application Cluster (RAC), which has a shared cache and can operate on a...

    Provided By George Mason University

  • White Papers // Dec 2010

    Predicting Network Response Times Using Social Information

    Social networks and discussion boards have become a significant outlet where people communicate and express their opinion freely. Although the social networks themselves are usually well-provisioned, the participating users frequently point to external links to substantiate their discussions. Unfortunately, the sudden heavy traffic load imposed on the external, linked web...

    Provided By George Mason University

  • White Papers // Nov 2010

    GeoMason: GeoSpatial Support for MASON

    MASON is a free, open-source Java-based discrete event multi-agent simulation toolkit that has been used to model network intrusions, unmanned aerial vehicles, nomadic migrations, and farmer/herder conflicts, among others. Many multi-agent models use georeferenced data which represent such things as road networks, rivers, vegetation coverage, population, and topology. However, MASON...

    Provided By George Mason University

  • White Papers // Oct 2010

    Detection of Communities and Bridges in Weighted Networks

    Traditional graph-based clustering methods group vertices into discrete non-intersecting clusters under the assumption that each vertex can belong to only a single cluster. On the other hand, recent research on graph-based clustering methods, applied to real world networks (e.g., Protein-protein interaction networks and social networks), shows overlapping patterns among the...

    Provided By George Mason University

  • White Papers // Oct 2010

    Deliberative Democracy And Political Ignorance

    Advocates of "Deliberative democracy" want citizens to actively participate in serious dialogue over political issues, not merely go to the polls every few years. Unfortunately, these ideals don't take into account widespread political ignorance and irrationality. Most voters neither attain the level of knowledge needed to make deliberative democracy work,...

    Provided By George Mason University

  • White Papers // Oct 2010

    Policy Reversal On Reverse Payments: Why Courts Should Not Follow The New DOJ Position On Reverse-Payment Settlements Of Pharmaceutical Patent Litigation

    In a recent policy reversal, the Department of Justice has, for the first time, pursued antitrust liability for "Reverse payment" settlements. These settlements occur in the pharmaceutical industry when brand-name and generic-drug companies settle patent-infringement litigation. In a reverse-payment settlement, the generic-drug company agrees not to enter the market for...

    Provided By George Mason University

  • White Papers // Oct 2010

    Transformation In Property And Copyright

    Copyright law grants ownership rights in "Works of authorship," and copyright disputes frequently require one to distinguish between two different ways in which a "Work of authorship" may be "Transformed". On one side of the line are changes whose end result is termed a ?derivative work, and which are therefore...

    Provided By George Mason University

  • White Papers // Oct 2010

    Employee "Free" Choice In The Mirror Of Liberty, Fairness And Social Welfare

    The publication of Richard Epstein's book, THE CASE AGAINST THE EMPLOYEE FREE CHOICE ACT provides an opportunity to reconsider the movement to displace the regime of judge-made law that had previously governed labor relationships, the purpose of the NLRA and the revolutionary implications of the effort to transform the NLRA...

    Provided By George Mason University

  • White Papers // Sep 2010

    Artificial Malware Immunization Based on Dynamically Assigned Sense of Self

    Computer malwares (e.g., botnets, rootkits and spyware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking the control flow of the infected system or program. Therefore, it is critically important to protect the mission critical systems from malicious control...

    Provided By George Mason University

  • White Papers // Sep 2010

    Unfolding The Allegory Behind Market Communication And Social Error And Correction

    One aspect of the present paper is to draw out the Adam Smith in Friedrich Hayek. The author suggests that common economic talk of market communication, market error and correction, and policy error and correction invokes a spectatorial being and appeals to our sympathy with such being. Behind such common...

    Provided By George Mason University

  • White Papers // Aug 2010

    CAROSA: A Tool for Authoring NPCs

    Certainly Non-Player Characters (NPCs) can add richness to a game environment. A world without people (or at least humanoids) seems barren and artificial. People are often a major part of the setting of a game. Furthermore, watching NPCs perform and have a life out-side of their interactions with the main...

    Provided By George Mason University

  • White Papers // Aug 2010

    Energy Management for Time-Critical Energy Harvesting Wireless Sensor Networks

    As Cyber-Physical Systems (CPSs) evolve they will be increasingly relied to support time-critical monitoring and control activities. Further, many CPSs that utilizing Wireless Sensor Networking (WSN) technologies will require the use of energy harvesting methods to extend their lifetimes. For this application class, there are currently few effective models that...

    Provided By George Mason University

  • White Papers // Jul 2010

    Dynamic Cloud Management System for Monitoring and Managing Services

    As cloud computing becomes more widely adopted, the size of cloud systems will necessarily become larger. In recent years, large companies, such as Google and Amazon, have become reliant on resources and services provided by cloud computing environments. While these large corporations have most likely implemented efficient, dynamic, and scalable...

    Provided By George Mason University

  • White Papers // Jul 2010

    Constraints-Based Complex Behavior in Rich Environments

    In order to create a system capable of planning complex, constraints-based behaviors for an agent operating in a rich environment, two complementary frameworks were integrated. Linear Temporal Logic mission planning generates controllers that are guaranteed to satisfy complex requirements that describe reactive and possibly infinite behaviors. However, enumerating all the...

    Provided By George Mason University

  • White Papers // Jul 2010

    Providing Mobile Users' Anonymity in Hybrid Network

    The authors present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices to connect to both Wi-Fi and cellular networks. Unlike existing anonymity schemes, they consider all parties that can intercept communications between the mo-bile user and...

    Provided By George Mason University

  • White Papers // Jul 2010

    HyperCheck: A Hardware-Assisted Integrity Monitor

    Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security researchers embraced Virtual Machine Monitors (VMMs) as a new mechanism to guarantee deep isolation of untrusted software components. Unfortunately, their widespread adoption promoted VMMs as a prime...

    Provided By George Mason University

  • White Papers // Jul 2010

    Providing Mobile Users' Anonymity in Hybrid Networks

    The authors present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices to connect to both WiFi and cellular networks. Unlike existing anonymity schemes, they consider all parties that can intercept communications between the mobile user and...

    Provided By George Mason University

  • White Papers // Jun 2010

    Encryption-Based Policy Enforcement for Cloud Storage

    Nowadays, users are more and more exploiting external storage and connectivity for sharing and disseminating user-generated content. To this aim, they can benefit of the services offered by Internet companies, which however assume that the service provider is entitled to access the resources. To overcome this limitation, the authors present...

    Provided By George Mason University

  • White Papers // Jun 2010

    Transmission Probability Control Game for Coexisting Random ALOHA Wireless Networks in Unlicensed Bands

    In this paper, the authors consider N ad hoc networks, with nodes randomly and uniformly distributed, coexisting and sharing an unlicensed band. The objective of this paper is the optimization of the transmission probabilities in these networks to maximize the throughput in each network. Throughput in each system is limited...

    Provided By George Mason University

  • White Papers // Jun 2010

    On the Role of Architectural Styles in Improving the Adaptation Support of Middleware Platforms

    Modern middleware platforms provide the applications deployed on top of them with facilities for their adaptation. However, the level of adaptation support provided by the state-of-the-art middleware solutions is often limited to dynamically loading and off-loading of software components. Therefore, it is left to the application developers to handle the...

    Provided By George Mason University

  • White Papers // Jun 2010

    Geospatial Cyberinfrastructure: Past, Present and Future

    A CyberInfrastructure (CI) is a combination of data resources, network protocols, computing platforms, and computational services that brings people, information, and computational tools together to perform science or other data-rich applications in this information-driven world. Most science domains adopt intrinsic geospatial principles (such as spatial constraints in phenomena evolution) for...

    Provided By George Mason University

  • White Papers // May 2010

    Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs

    Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an evaluation should be performed in order to make it fair, transparent, practical, and acceptable for the majority of the cryptographic community....

    Provided By George Mason University

  • White Papers // May 2010

    Effective Outlier Detection in Science Data Streams

    The growth in data volumes from all aspects of space and earth science (satellites, sensors, observatory monitoring systems, and simulations) requires more effective knowledge discovery and extraction algorithms. Among these are algorithms for outlier (novelty / surprise / anomaly) detection and discovery. Effective outlier detection in data streams is essential...

    Provided By George Mason University

  • White Papers // May 2010

    Exploiting Multichannel Diversity in Cognitive Radio Networks

    Cognitive radios hold tremendous promise for increasing spectral efficiency in wireless systems. In cognitive radio networks, secondary users equipped with frequency-agile cognitive radios communicate with one another via spectrum that is not being used by the primary, licensed users of the spectrum. The authors consider a multichannel cognitive radio network...

    Provided By George Mason University

  • White Papers // May 2010

    Model-Based System Development for Managing the Evolution of a Common Submarine Combat System

    Managing the evolution of a complex product family that is deployed and maintained in multiple variants on various platforms using traditional systems engineering tools and processes is a significant challenge. An example is managing the evolution of a common combat system across a fleet of submarines. Due to the realities...

    Provided By George Mason University

  • White Papers // May 2010

    Universal Multi-Factor Authentication Using Graphical Passwords

    With AO, companies are able to turn into a more industrialized model in a centralized low-cost country for the service. With this, funds can be released easily and they therefore help pay for investments in larger transformation programs. In the case of AO, companies can ask their suppliers to manage...

    Provided By George Mason University

  • White Papers // May 2010

    Context-Driven Optimization of Mobile Service-Oriented Systems for Improving Their Resilience

    Mobile software systems are characterized by their highly dynamic and unpredictable execution context. Such systems are permeating a number of domains where the systems operate in constantly changing conditions. The authors refer to such systems as Situated Software Systems. These systems are often deployed in mission-critical settings with stringent reliability...

    Provided By George Mason University

  • White Papers // Apr 2010

    Functional Crowds

    Most crowd simulation research either focuses on navigating characters through an environment while avoiding collisions or on simulating very large crowds. The authors' work focuses on creating populations that inhabit a space as opposed to passing through it. Characters exhibit behaviors that are typical for their setting. They term these...

    Provided By George Mason University

  • White Papers // Apr 2010

    Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs

    The authors optimally place Intrusion Detection System (IDS) sensors and prioritize IDS alerts using attack graph analysis. They begin by predicting all possible ways of penetrating a network to reach critical assets. The set of all such paths through the network constitutes an attack graph, which they aggregate according to...

    Provided By George Mason University

  • White Papers // Apr 2010

    Proactive Intrusion Prevention and Response via Attack Graphs

    Network defense today is largely reactive rather than proactive, and lacks sufficient context for optimal countermeasures. Administrators and security analysts are overwhelmed by constant outside threats, complexity of security measures, and network growth. Today's status quo for network defense is often reduced to mere triage and after-the-fact remediation. This paper...

    Provided By George Mason University

  • White Papers // Apr 2010

    Getting It Right The First Time: Belief Elicitation With Novice Participants

    The auction design literature makes clear that theoretically equivalent mechanisms can perform very differently in practice. Though of equal importance, much less is known about the empirical performance of theoretically equivalent mechanisms for belief elicitation. This is especially unfortunate given the increasing interest in eliciting beliefs from respondents in large-scale...

    Provided By George Mason University

  • White Papers // Mar 2010

    TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client

    BitTorrent (BT) has carried out a significant and continuously increasing portion of Internet traffic. While several designs have been recently proposed and implemented to improve the resource utilization by bridging the application layer (overlay) and the network layer (underlay), these designs are largely dependent on Internet infrastructures, such as ISPs...

    Provided By George Mason University

  • White Papers // Feb 2010

    Cooperative Communication With Regenerative Relays for Cognitive Radio Networks

    Cognitive radios hold tremendous promise for increasing spectral efficiency in wireless systems. In cognitive radio networks, secondary users equipped with frequency-agile cognitive radios communicate with one another via spectrum that is not being used by the primary, licensed users of the spectrum. The authors consider a cooperative communication scenario in...

    Provided By George Mason University

  • White Papers // Feb 2010

    Security Policy Cognizant Module Composition

    Component-based software development and deployment is based on developing individual software modules that are composed on an as needed basis. Such modules expose the computations they provide and their dependencies on providing these computations - that results in a well known requires-provides specifications for modules. This paper provides a framework...

    Provided By George Mason University

  • White Papers // Jan 2010

    High Level Fusion and Predictive Situational Awareness With Probabilistic Ontologies

    The change of focus in modern warfare from individual platforms to the network has caused a concomitant shift in supporting concepts and technologies. Greater emphasis is placed on interoperability and composeability. New technologies such as SOA and semantically aware systems have come into the spotlight. This paper argues that just...

    Provided By George Mason University

  • White Papers // Jan 2010

    GeoInformation Computing & Cyberinfrastructure

    Geographic information processing is expanding in several dimensions in the past decades: 1) Earth observation, ground sensing, and other data collection techniques accelerated exponentially the capability for collecting petabytes of data on a daily basis. 2) Research in the past years produces computing intensive algorithms and models for analyzing the...

    Provided By George Mason University

  • White Papers // Jan 2010

    An Integrated Multi-Task Inductive Database and Decision Support System VINLEN: An Initial Implementation and First Results

    A brief review of the current research on VINLEN multitask inductive database and decision support system is presented. VINLEN integrates a wide range of knowledge generation operators that given input data and/or knowledge create new knowledge. The central operator of VINLEN is a natural induction module that generates hypotheses from...

    Provided By George Mason University

  • White Papers // Mar 2010

    TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client

    BitTorrent (BT) has carried out a significant and continuously increasing portion of Internet traffic. While several designs have been recently proposed and implemented to improve the resource utilization by bridging the application layer (overlay) and the network layer (underlay), these designs are largely dependent on Internet infrastructures, such as ISPs...

    Provided By George Mason University

  • White Papers // Jul 2011

    Network Security Risks Associated With IaaS in a Shared Environment

    Cloud computing offers extraordinary benefits and efficiencies to organizations. Organizations can now purchase computing resources on an as-needed basis without the overhead and costs of managing their own IT resources. However, with those efficiencies come many hurdles that must be overcome. Understanding what is going on behind the opaque wall...

    Provided By George Mason University

  • White Papers // Jun 2010

    Encryption-Based Policy Enforcement for Cloud Storage

    Nowadays, users are more and more exploiting external storage and connectivity for sharing and disseminating user-generated content. To this aim, they can benefit of the services offered by Internet companies, which however assume that the service provider is entitled to access the resources. To overcome this limitation, the authors present...

    Provided By George Mason University

  • White Papers // May 2009

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    Network security tools generally lack sufficient context for maintaining a well informed and proactive defense posture. Vulnerabilities are usually assessed in isolation, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged as isolated events, with limited correlation capabilities. Security professionals are often overwhelmed by constant...

    Provided By George Mason University

  • White Papers // Jul 2009

    Dartmouth Internet Security Testbed (DIST): Building a Campus-Wide Wireless Testbed

    This paper describes the experiences in deploying a campus-wide wireless security testbed. The testbed gives one the capability to monitor security-related aspects of the 802.11 MAC layer in over 200 diverse campus locations. The paper describes both the technical and the social challenges of designing, building, and deploying such a...

    Provided By George Mason University

  • White Papers // Jul 2009

    Spam Detection Using Clustering, Random Forests, and Active Learning

    This paper describes work in progress. The research is focused on efficient construction of effective models for spam detection. Clustering messages allows for efficient labeling of a representative sample of messages for learning a spam detection model using a Random Forest for classification and active learning for refining the classification...

    Provided By George Mason University

  • White Papers // May 2009

    Simulation-Based Command and Control Applications in a Service-Oriented, Cloud Computing Environment

    Modeling and Simulation (M&S) technologies have matured suitably to provide real time tactical utility to warfighting Command and Control (C2) computer system users, but C2 systems adoption of M&S in their native applications has been slow for design, acceptance, computing and procurement reasons. While extensive work has been done with...

    Provided By George Mason University

  • White Papers // Jul 2009

    VirusMeter: Preventing Your Cellphone From Spies

    Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growing popularity of mobile devices in the last few years, attacks targeting they are also surging. Existing mobile malware detection techniques, which are often...

    Provided By George Mason University

  • White Papers // Sep 2010

    Artificial Malware Immunization Based on Dynamically Assigned Sense of Self

    Computer malwares (e.g., botnets, rootkits and spyware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking the control flow of the infected system or program. Therefore, it is critically important to protect the mission critical systems from malicious control...

    Provided By George Mason University

  • White Papers // Oct 2009

    Towards a Framework for Group-Centric Secure Collaboration

    The concept of groups is a natural aspect of most collaboration scenarios. Group-centric Secure Information Sharing models (g-SIS) have been recently proposed in which users and objects are brought together to promote sharing and collaboration. Users may join, leave and re-join and objects may be added, removed and re-added. Furthermore,...

    Provided By George Mason University

  • White Papers // Jun 2009

    A Hybrid Enforcement Model for Group-Centric Secure Information Sharing

    Group-centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized group users may read and contribute new objects to the group. An important usability objective in g-SIS is to allow users to access group objects...

    Provided By George Mason University

  • White Papers // Sep 2010

    Unfolding The Allegory Behind Market Communication And Social Error And Correction

    One aspect of the present paper is to draw out the Adam Smith in Friedrich Hayek. The author suggests that common economic talk of market communication, market error and correction, and policy error and correction invokes a spectatorial being and appeals to our sympathy with such being. Behind such common...

    Provided By George Mason University

  • White Papers // Apr 2009

    Piecewise Planar City 3D Modeling From Street View Panoramic Sequences

    City environments often lack textured areas, contain repetitive structures, strong lighting changes and therefore are very difficult for standard 3D modeling pipelines. The authors present a novel unified framework for creating 3D city models which overcomes these difficulties by exploiting image segmentation cues as well as presence of dominant scene...

    Provided By George Mason University

  • White Papers // Jul 2010

    Providing Mobile Users' Anonymity in Hybrid Networks

    The authors present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices to connect to both WiFi and cellular networks. Unlike existing anonymity schemes, they consider all parties that can intercept communications between the mobile user and...

    Provided By George Mason University

  • White Papers // May 2009

    Digging Digg : Comment Mining, Popularity Prediction, and Social Network Analysis

    Using comment information available from Digg the authors define a co-participation network between users. They focus on the analysis of this implicit network, and study the behavioral characteristics of users. Using an entropy measure, the authors infer that users at Digg are not highly focused and participate across a wide...

    Provided By George Mason University

  • White Papers // Mar 2011

    Which Should We Try First? Ranking Information Resources Through Query Classification

    Users seeking information in distributed environments of large numbers of disparate information resources are often burdened with the task of repeating their queries for each and every resource. Invariably, some of the searched resources are more productive (yield more useful documents) than others, and it would be undoubtedly useful to...

    Provided By George Mason University

  • White Papers // Dec 2010

    Predicting Network Response Times Using Social Information

    Social networks and discussion boards have become a significant outlet where people communicate and express their opinion freely. Although the social networks themselves are usually well-provisioned, the participating users frequently point to external links to substantiate their discussions. Unfortunately, the sudden heavy traffic load imposed on the external, linked web...

    Provided By George Mason University

  • White Papers // Jun 2011

    NetGator: Malware Detection Through Program Interactive Proofs

    Exfiltration of data using internet-borne attacks has become a credible threat for organization and enterprises. History has shown that crafted targeted attacks and zero-day malware are capable of penetrating even the most sophisticated defenses. To make matters worse, intrusion detection systems that perform analysis of network traffic are dependent on...

    Provided By George Mason University

  • White Papers // May 2011

    Guided Exploration of the Architectural Solution Space in the Face of Uncertainty

    A system's early architectural decisions impact its properties (e.g., scalability, dependability) as well as stakeholder concerns (e.g., cost, time to delivery). Choices made early on are both difficult and costly to change, and thus it is paramount that the engineer gets them "Right". This leads to a paradox, as in...

    Provided By George Mason University

  • White Papers // Apr 2011

    GPU-Euler: Sequence Assembly Using GPGPU

    Advances in sequencing technologies have revolutionized the field of genomics by providing cost effective and high throughput solutions. In this paper, the authors develop a parallel sequence assembler implemented on general purpose Graphic Processor Units (GPUs). The authors' work was largely motivated by a growing need in the genomic community...

    Provided By George Mason University

  • White Papers // Nov 2010

    GeoMason: GeoSpatial Support for MASON

    MASON is a free, open-source Java-based discrete event multi-agent simulation toolkit that has been used to model network intrusions, unmanned aerial vehicles, nomadic migrations, and farmer/herder conflicts, among others. Many multi-agent models use georeferenced data which represent such things as road networks, rivers, vegetation coverage, population, and topology. However, MASON...

    Provided By George Mason University

  • White Papers // Jan 2011

    Life After Self-Healing: Assessing Post-Repair Program Behavior

    One promising technique for defending software systems against vulnerabilities involve the use of self-healing. Such efforts, however, carry a great deal of risk because they largely bypass the cycle of human-driven patching and testing used to vet both vendor and internally developed patches. In particular, it is difficult to predict...

    Provided By George Mason University

  • White Papers // Mar 2012

    Throughput Limits in Spectrum Sensing Cognitive Radio Networks Using Point Processes

    Spectrum sensing in cognitive wireless networks is important for Secondary nodes to avoid interference with the Primaries. In this paper, considering a spectrum sensing framework, the authors develop models for bounding interference levels from Secondary network to the Primary nodes. First, they assume that both networks are distributed according to...

    Provided By George Mason University

  • White Papers // Dec 2009

    An Empirical Investigation Into the Security of Phone Features in SIP-Based VoIP Systems

    Phone features, e.g., 911 call, voicemail, and Do Not Disturb, are critical and necessary for all deployed VoIP systems. In this paper, the authors empirically investigate the security of these phone features. They have implemented a number of attacks and experimented with VoIP services by leading VoIP service providers Vonage,...

    Provided By George Mason University

  • White Papers // Jan 2013

    Billing Attacks on SIP-Based VoIP Systems

    Billing is fundamental to any commercial VoIP services and it has direct impact on each individual VoIP subscriber. One of the most basic requirements of any VoIP billing function is that it must be reliable and trustworthy. From the VoIP subscriber's perspective, VoIP billing should only charge them for the...

    Provided By George Mason University

  • White Papers // Feb 2011

    Resilient Traffic Engineering in a Transit-Edge Separated Internet Routing

    The significant growth of Internet traffic and increase of routing tables require solutions to address Internet scalability and resiliency. A possible direction is to move away from the flat legacy Internet routing to hierarchical routing, separating edge networks from transit networks. In this paper, the authors study the extended traffic...

    Provided By George Mason University

  • White Papers // Jul 2012

    Security Margin Evaluation of SHA-3 Contest Finalists Through SAT-Based Attacks (Extension)

    In 2007, the U.S. National Institute of Standards and Technology (NIST) announced a public contest aiming at the selection of a new standard for a cryptographic hash function. In this paper, the security margin of five SHA-3 finalists is evaluated with an assumption that attacks launched on finalists should be...

    Provided By George Mason University

  • White Papers // Dec 2012

    Concurrent Object-Oriented Development with Behavioral Design Patterns

    The development of concurrent applications is challenging because of the complexity of concurrent designs and the hazards of concurrent programming. Architectural modeling using the Unified Modeling Language (UML) can support the development process, but the problem of mapping the model to a concurrent implementation remains. This paper addresses this problem...

    Provided By George Mason University

  • White Papers // Oct 2012

    Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs

    In this paper, the authors present a comprehensive comparison of all Round 3 SHA-3 candidates and the current standard SHA-2 from the point of view of hardware performance in modern FPGAs. Each algorithm is implemented using multiple architectures based on the concepts of iteration, folding, unrolling, pipelining, and circuit replication....

    Provided By George Mason University

  • White Papers // Jun 2012

    The Virtual Apprentice

    Over the past couple of decades, virtual humans have been attracting more and more attention. Many applications including, video games, movies, and various training and tutoring systems have benefited from work in this area. While the visual quality of virtual agents has improved dramatically, their intelligence and socialization still needs...

    Provided By George Mason University

  • White Papers // Mar 2012

    Crowd Distribution and Location Preference

    Most crowd simulators focus on navigation and agents flow. In this paper, the authors present another perspective which concentrates on the overall distribution of virtual agents and uses psychological preferences for choosing goal locations. Both observation and published theory indicate that most people prefer to maintain their personal space as...

    Provided By George Mason University

  • White Papers // Aug 2011

    Populations with Purpose

    There are currently a number of animation researchers that focus on simulating virtual crowds, but few are attempting to simulate virtual populations. Virtual crowd simulations tend to depict a large number of agents walking from one location to another as realistically as possible. The virtual humans in these crowds lack...

    Provided By George Mason University

  • White Papers // Aug 2010

    CAROSA: A Tool for Authoring NPCs

    Certainly Non-Player Characters (NPCs) can add richness to a game environment. A world without people (or at least humanoids) seems barren and artificial. People are often a major part of the setting of a game. Furthermore, watching NPCs perform and have a life out-side of their interactions with the main...

    Provided By George Mason University

  • White Papers // Jul 2010

    Constraints-Based Complex Behavior in Rich Environments

    In order to create a system capable of planning complex, constraints-based behaviors for an agent operating in a rich environment, two complementary frameworks were integrated. Linear Temporal Logic mission planning generates controllers that are guaranteed to satisfy complex requirements that describe reactive and possibly infinite behaviors. However, enumerating all the...

    Provided By George Mason University

  • White Papers // Apr 2010

    Functional Crowds

    Most crowd simulation research either focuses on navigating characters through an environment while avoiding collisions or on simulating very large crowds. The authors' work focuses on creating populations that inhabit a space as opposed to passing through it. Characters exhibit behaviors that are typical for their setting. They term these...

    Provided By George Mason University

  • White Papers // Jan 2012

    NSDMiner: Automated Discovery of Network Service Dependencies

    Enterprise networks today host a wide variety of network services, which often depend on each other to provide and support network-based services and applications. Understanding such dependencies is essential for maintaining the well-being of an enterprise network and its applications, particularly in the presence of network attacks and failures. In...

    Provided By George Mason University

  • White Papers // Nov 2011

    Groestl Tweaks and Their Effect on FPGA Results

    The authors have performed the first order analysis of the influence of the Round 3 tweaks in Groestl on the performance of this algorithm in FPGAs. Both Groestl-0 and the revised Groestl have been fully implemented in VHDL using two alternative architectures: quasi-pipelined and parallel. The results indicate that the...

    Provided By George Mason University

  • White Papers // Jun 2011

    Assessing Home Internet Users' Demand for Security: Will They Pay ISPs?

    One strategy for improving cyber security would be for Internet Service Providers (ISPs) to take a more active role in curtailing criminal behavior over the Internet. However, few ISPs today are offering robust security to their customers. They largely contend that home Internet users are unwilling to pay for improvements...

    Provided By George Mason University

  • White Papers // Apr 2011

    CapMan: Capability-Based Defense Against Multi-Path Denial of Service (DoS) Attacks in MANET

    This paper presents a capability-based security mechanism called CapMan. The authors' approach is designed to prevent Denial-of-Service (DoS) attacks on wireless communications, particularly against multi-path communication in Mobile Adhoc NETworks (MANETs). CapMan offers a mechanism for a per flow, distributed bandwidth control by all the participating nodes along multiple communication...

    Provided By George Mason University

  • White Papers // Sep 2011

    Capacity Bounds in Random Wireless Networks

    The authors consider a receiving node, located at the origin, and a Poisson point process that models the locations of the desired transmitter as well as the interferers. Interference is known to be non-Gaussian in this scenario. The capacity bounds for additive non-Gaussian channels depend on not only the power...

    Provided By George Mason University