• Model the system security risk by an Attack Tree 

        Author(s):Poolsappasit, Nayot; Edwards, John; Ray, Indrajit
        Traditional Vulnerabilities scanners only give a list of vulnerabilities of the systems. This one dimensional information does not give analysts the perception of how exploits can be chained together and form more complex ...
      • Technology and history : bringing the past into the future 

        Author(s):Speaker, Ryan D.; Lyons, Linda
        Using photos, paintings, and other primary sources, students will discover World War I. This project is to demonstrate the importance of personal research, and to take a break from the monotony of textbook readings.
      • Measuring the robustness of resource allocations for distributed domputer systems in a stochastic dynamic environment 

        Author(s):Dewri, Rinku; Alqudah, Amin; Govindasamy, Sudha; Janovy, David; Sutton, Andrew; Ladd, Joshua; Prakash, Puneet; Renner, Timothy; Siegel, Howard Jay; Maciejewski, Anthony A.; Briceño, Luis D.; Smith, Jay; Shestak, Vladimir
        Heterogeneous distributed computing systems often must function in an environment where system parameters are subject to variations during operation. Robustness can be defined as the degree to which a system can function ...
      • For Your AMUSEment! : creating an online literary magazine to showcase student talent and achievement 

        Author(s):Johnson, Amanda; De Miranda, Michael Anthony
        This poster highlights/illustrates how technology can be integrated into an English Liberal Artsssroom using Publishing software. Designed for a high school level English student, students will express their school work, ...
      • Study of an iterative resource allocation technique to minimize machine completion times in a distributed computing system 

        Author(s):Oltikar, Mohana; Briceño, Luis D.; Maciejewski, Anthony A.; Siegel, Howard Jay
        Heterogeneous computing (HC) is the coordinated use of different types of machines, networks, and interfaces to maximize the combined performance and/or cost effectiveness. Heuristics for allocating resources in an HC ...
      • Integrating technology in the classroom : how technology can enhance social studies 

        Author(s):Perry, Lynsey Malia; De Miranda, Michael Anthony
        This poster highlights the integration of technology within the classroom, focusing on U.S. History as a content area.
      • Technology in music education 

        Author(s):Stahly, Robert; De Miranda, Michael Anthony
        This poster will examine the many uses of technology in the instruction of music.
      • WebCT in the classroom : taking the discussion to the Net 

        Author(s):Hoggarth, Sean; De Miranda, Michael Anthony
        I want to create a poster that showed how I would use a webCT sort of program to hold discussion, peer-editing, and how that would lead to publishing of a student's work.
      • Technology in English education 

        Author(s):Sullivan, Brianna; De Miranda, Michael Anthony
        This poster will demonstrate technology in english education. It will demonstrate how technology can be used when teaching Shakespeare.
      • Retrieval of surface-layer moisture fields using CSU radars 

        Author(s):Fritz, Jason; Chandrasekar, Chandra V.
        The surface-layer refractivity, i.e., the refractive index of air near the earth’s surface, can be retrieved from radar by examining the phase of stationary ground targets. The index of refraction is a function of pressure, ...
      • Trust based routing protocol in MANET 

        Author(s):Poolsappsit, Nayot; Chakraborty, Sudip; Indrajit, Ray
        Traditional network routing protocols find the shortest path by minimizing a cost over the paths. Number of hops is the most common metric to measure this cost of forwarding. However, this administrative cost metric is not ...
      • Automatic generation of bit-vector analyses using OpenAnalysis 

        Author(s):Hovland, Paul; Strout, Michelle; Behere, Shweta
        Effective program analysis is essential for program optimization, program understanding and error detection. Classic data-flow analysis techniques assume only scalar variables within a program. However, real programs consist ...
      • Good Samaritan Mini: Urban Search and Rescue Robot 

        Author(s):Hoover, Nathaniel David; Haygood, Nicholas John; Guthrie, Brian D.; Bernstein, Ian H.; Rector, Michael Holman; Maciejewski, Anthony A.
        Date Submitted:2006
        In the wake of disasters such as the 9/11 attacks, it becomes clear that immediate rescue efforts must take place in a way that doesn't put the lives of the rescue workers themselves at stake. It is situations like these ...
      • Active Sensing in an Urban Environment: Closing the Loop 

        Author(s):Barbosa, Patricia de Rezende; Li, Yun, 1970-; Chong, Edwin Kah Pin
        Date Submitted:2006
        When compared to tracking airborne targets, tracking ground targets on urban terrain brings a new set of challenges. Target mobility is constrained by road networks, and the quality of measurements is affected by dense ...
      • Integrating Multiple Knowledge Bases within Google Desktop 

        Author(s):Houser, John R.; Galvin, Peter; Hayne, Stephen C.; Smith, Charles A. P.
        Date Submitted:2006
        Google is clearly the preferred solution when searching for information. However, how does one search for information within proprietary knowledge bases? We believe that we can use the power of Google Desktop (GD) as a ...
      • Portfolio Management using Partially Observable Markov Decision Process 

        Author(s):Zahedi, Ramin; Chong, Edwin Kah Pin
        Date Submitted:2006
        Portfolio theory is concerned with how an investor should divide his wealth among different securities. This problem was first formulated by Markowitz in 1952. Since then, other more sophisticated formulations have been ...
      • Spin Wave Propagation in Non-uniform Magnetic Fields 

        Author(s):Kabatek, Michael J.; Tucker, James Derek; Patton, Carl E.; Wu, Mingzhong
        Date Submitted:2006
        There has been extensive work on spin wave dynamics in ferrite film structures for both fundamental understanding and device applications. However, all previous work has mainly involved spin wave propagation in spatially ...
      • Good Samaritan Robotics User Interface Team 

        Author(s):Tranby, Steven Michael; Schmitt, Josh C.; Robinson, Jonathan Shea; Goebel, Stephen Richard; Darbonne, Kenneth C.; Wilkins, Brent H.; Kaiser, Carl L.
        Date Submitted:2006
        This poster presents the topic of the user interface team for the Urban Search And Rescue (USAR) Robot, Good Samaritan, senior design project. The USAR senior design project consists of four teams: platform, robotic arm, ...
      • Opportunistic Scheduling for Wireless Networks 

        Author(s):Zhang, Zhi; Chong, Edwin Kah Pin
        Date Submitted:2006
        We consider the problem of downlink scheduling for multi-user OFDM (Orthogonal Frequency Division Multiplexing) systems. We derive optimal scheduling policies under three QoS/fairness constraints -- temporal fairness, ...