Now showing items 1-10 of 54
Rail Surface Measurement And Multi-Scale Modeling Of Wheel-Rail Contact
(Amer Soc Mechanical Engineers, 2016-01-01)
Implementing an IPv6 Moving Target Defense on a Live Network
(Cyber-Physical Systems Virtual Organization, 2012)
The goal of our research is to protect sensitive communications, which are commonly used by government agencies, from eavesdroppers or social engineers. In prior work, we investigated the privacy implications of stateless ...
Towards Use And Reuse Driven Big Data Management
We propose a use and reuse driven big data management approach that fuses the data repository and data processing capabilities in a co-located, public cloud. It answers to the urgent data management needs from the growing ...
MAKER: An Ethnography of Maker and Hacker Spaces Achieving Diverse Participation
Some have hailed the emergence of maker spaces as an opportunity to broaden participation of underrepresented groups in science, technology, engineering, and math (STEM) education, engaging participants in open, creative, ...
Implementing Moving Target IPv6 Defense to Secure 6LoWPAN in the Internet of Things and Smart Grid
(ACM Press, 2014)
The growing momentum of the Internet of Things (IoT) has shown an increase in attack vectors within the security research community. We propose adapting a recent new approach of frequently changing IPv6 address assignment ...
CrowdLayout: Crowdsourced Design and Evaluation of Biological Network Visualizations
Biologists often perform experiments whose results generate large quantities of data, such as interactions between molecules in a cell, that are best represented as networks (graphs). To visualize these networks and ...
A Longitudinal Study of the Dimensions of Disciplinary Culture to Enhance Innovation and Retention among Engineering Students
The U.S. engineering educational system has been generally slow in developing pedagogies that successfully promote innovative behaviors. Although numerous sources recognize the growing scope and complexity of challenges ...
Reimagining Human Capacity For Location-Aware Aural Pattern Recognition: A Case For Immersive Exocentric Sonification
(Georgia Institute of Technology, 2018-06)
The following paper presents a cross-disciplinary snapshot of 21st century research in sonification and leverages the review to identify a new immersive exocentric approach to studying human capacity to perceive spatial ...
Personal Anomaly Detection and Smart-Phone Security
(Virginia Tech, 2010-04-22)
Mobile devices increasingly become the computing platform for networked applications such as Web and email. This development requires strong guarantees on the system integrity and data security of mobile devices against ...
Near-Optimal and Practical Algorithms for Graph Scan Statistics