Now showing items 65-84 of 2899

    • A reduced Iwan model that includes pinning for bolted joint mechanics 

      Brake, M.R.W. (2017)
      Bolted joints are prevalent in most assembled structures; however, predictive models for their behavior do not exist. Calibrated models, such as the Iwan model, are able to predict the response of a jointed structure over ...
    • A Related-Key Cryptanalysis of RC4 

      Grosul, Alexander; Wallach, Dan S. (2000-06-08)
      In this paper we present analysis of the RC4 stream cipher and show that for each 2048-bit key there exists a family of related keys, differing in one of the byte positions. The keystreams generated by RC4 for a key and ...
    • A Resource Management Framework for Predictable Quality of Service in Web Servers 

      Aron, Mohit; Druschel, Peter; Iyer, Sitaram (2003-07-07)
      This paper presents a resource management framework for providing predictable quality of service (QoS) in Web servers. The framework allows Web server and proxy operators to ensure a probabilistic minimal QoS level, expressed ...
    • A Resource-Aware Streaming-based Framework for Big Data Analysis 

      Darvish Rouhani, Bita (2015-12-02)
      The ever growing body of digital data is challenging conventional analytical techniques in machine learning, computer vision, and signal processing. Traditional analytical methods have been mainly developed based on the ...
    • A review of parameters and heuristics for guiding metabolic pathfinding 

      Kim, Sarah M; Peña, Matthew I; Moll, Mark; Bennett, George N; Kavraki, Lydia E (2017-09-15)
      Abstract Recent developments in metabolic engineering have led to the successful biosynthesis of valuable products, such as the precursor of the antimalarial compound, artemisinin, and opioid precursor, ...
    • A sample realization approach for optimization of code division multiple access systems 

      Mandayam, Narayan B. T. (1994)
      Efforts in performance analysis of Code Division Multiple Access (CDMA) systems have concentrated on obtaining asymptotic approximations and bounds for system error probabilities. As such, these cannot capture the sensitivities ...
    • A Sample-Driven Call Stack Profiler 

      Fowler, Rob; Froyd, Nathan; Mellor-Crummey, John (2004-07-15)
      Call graph profiling reports measurements of resource utilization along with information about the calling context in which the resources were consumed. We present the design of a novel profiler that measures resource ...
    • A Security Analysis of My.MP3.com and the Beam-it Protocol 

      Stubblefield, Adam; Wallach, Dan S. (2000-03-08)
      My.MP3.com is a service that streams audio in the MP3 format to its users. In order to resolve copyright concerns, the service first requires that a user prove he or she owns the right to listen to a particular CD. The ...
    • A Set of Convolution Identities Relating the Blocks of Two Dixon Resultant Matrices 

      Chionh, Eng-Wee; Goldman, Ronald; Zhang, Ming (1999-06-16)
      Resultants for bivariate polynomials are often represented by the determinants of very big matrices. Properly grouping the entries of these matrices into blocks is a very effective tool for studying the properties of these ...
    • A Simple and Effective Caching Scheme for Dynamic Content 

      Cox, Alan; Rajamani, Karthick (2000-11-28)
      As web sites increasingly deliver dynamic content, the process of content generation at request time is becoming a severe limitation to web site throughput. Recent studies have shown that much of the dynamic content is, ...
    • A simple, fast dominance algorithm 

      Cooper, Keith D.; Harvey, Timothy J.; Kennedy, Ken (2006-01-11)
      The problem of finding the dominators in a control-flow graph has a long history in the literature. The original algorithms suffered from a large asymptotic complexity but were easy to understand. Subsequent work improved ...
    • A Simple, Practical Distributed Multi-Path Routing Algorithm 

      Chen, Johnny; Druschel, Peter; Subramanian, Devika (1998-07-16)
      We present a simple and practical distributed routing algorithm based on backward learning. The algorithm periodically floods \emscout packets that explore paths to a destination in reverse. Scout packets are small and of ...
    • A spectral encoding system based on planar waveguide integrated optics 

      Babich, Cooper Dominic (2001)
      The need for bandwidth at the access level has driven the development of many new multiple access schemes. This paper explores a spectral encoding scheme for Optical CDMA, in which bipolar communication is accomplished by ...
    • A storage architecture for data-intensive computing 

      Shafer, Jeffrey (2010)
      The assimilation of computing into our daily lives is enabling the generation of data at unprecedented rates. In 2008, IDC estimated that the "digital universe" contained 486 exabytes of data [9]. The computing industry ...
    • A study of opportunistic relaying MAC protocol 

      Chawathe, Rahul (2005)
      Recent studies have shown a considerable interest in the development of Medium Access and Control (MAC) protocols for multi-rate wireless networks. The approach of sending the packet to the farthest possible node along the ...
    • A study of the photodissociation dynamics of dimethylzinc and the implications for the growth of zinc selenide films 

      Elias, Joseph A. (1993)
      The dynamics of the ArF photodissociation of DMZn (dimethylzinc) have been studied. The implications of the results for the growth of ZnSe thin films are discussed. Time-resolved absorption profiles of ground state Zn and ...
    • A terahertz band-pass resonator based on enhanced reflectivity using spoof surface plasmons 

      Liu, Jingbo; Mendis, Rajind; Mittleman, Daniel M. (2013)
      We demonstrate a band-pass resonator in the terahertz (THz) range, based on a frequency-selective designer reflector. The resonator consists of a parallel-plate waveguide, a designed groove pattern cut into the output facet ...
    • A Timing Channel Spyware Robust to MAC Random Back-off 

      Alkabani, Yousra; Coleman, Todd; Kiyavash, Negar; Koushanfar, Farinaz (2010-03-02)
      This paper presents the design and implementation of spyware communication circuits built into the widely used Carrier Sense Multiple Access with collision avoidance (CSMA/CA) protocol. The spyware components are embedded ...
    • A Unified Framework for Multimodal IC Trojan Detection 

      Alkabani, Yousra; Koushanfar, Farinaz; Mirhoseini, Azalia (2010-02-02)
      This paper presents a unified formal framework for integrated circuits (IC) Trojan detection that can simultaneously employ multiple noninvasive measurement types. Hardware Trojans refer to modifications, alterations, or ...