SRI International

Displaying 1-4 of 4 results

  • White Papers // May 2011

    Towards Automated Collection of Application-Level Data Provenance

    Gathering data provenance at the operating system level is useful for capturing system-wide activity. However, many modern programs are complex and can perform numerous tasks concurrently. Capturing their provenance at this level, where processes are treated as single entities, may lead to the loss of useful intra-process detail. This can,...

    Provided By SRI International

  • White Papers // Jan 2010

    Chapter III: Optical Fiber for Communications

    The focus of this case is the invention and subsequent development of a method for making optical fibers that within 20 years displaced copper wire as the transmission medium of choice for most commercial applications in telecommunications systems and computer networks worldwide. Optical fibers about the size of a human...

    Provided By SRI International

  • White Papers // Oct 2008

    Formal Verification of Transportation Cyber Physical Systems

    Transportation cyber physical systems are now being designed using computer-aided control system design tools, such as Matlab. Analysis is currently supported only in the form of simulation. To increase confidence in the safety and reliability of the designed system and that too in the limited development time available, it is...

    Provided By SRI International

  • White Papers // Sep 2008

    Intrusion Monitoring in Process Control Systems

    To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and secure versions of process control network protocols have been increasingly adopted or proposed. Although system hardening and fixing known vulnerabilities of existing systems are crucial to secure...

    Provided By SRI International

  • White Papers // Sep 2008

    Intrusion Monitoring in Process Control Systems

    To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and secure versions of process control network protocols have been increasingly adopted or proposed. Although system hardening and fixing known vulnerabilities of existing systems are crucial to secure...

    Provided By SRI International

  • White Papers // Jan 2010

    Chapter III: Optical Fiber for Communications

    The focus of this case is the invention and subsequent development of a method for making optical fibers that within 20 years displaced copper wire as the transmission medium of choice for most commercial applications in telecommunications systems and computer networks worldwide. Optical fibers about the size of a human...

    Provided By SRI International

  • White Papers // Oct 2008

    Formal Verification of Transportation Cyber Physical Systems

    Transportation cyber physical systems are now being designed using computer-aided control system design tools, such as Matlab. Analysis is currently supported only in the form of simulation. To increase confidence in the safety and reliability of the designed system and that too in the limited development time available, it is...

    Provided By SRI International

  • White Papers // May 2011

    Towards Automated Collection of Application-Level Data Provenance

    Gathering data provenance at the operating system level is useful for capturing system-wide activity. However, many modern programs are complex and can perform numerous tasks concurrently. Capturing their provenance at this level, where processes are treated as single entities, may lead to the loss of useful intra-process detail. This can,...

    Provided By SRI International