Academia.eduAcademia.edu

Engineering

3,924,930 papers
3,051,880 followers
AI Powered
Engineering is the application of scientific and mathematical principles to design, develop, and analyze structures, machines, systems, and processes. It encompasses various disciplines, including civil, mechanical, electrical, and chemical engineering, aimed at solving practical problems and improving technology for societal benefit.
As a global feature of fingerprints, the orientation field is very important for automatic fingerprint recognition. Many algorithms have been proposed for orientation field estimation, but their results are unsatisfactory, especially for... more
We explore natural and calm interfaces for configuring ubiquitous computing environments. A natural interface should enable the user to name a desired configuration and have the system enact that configuration. Users should be able to use... more
In Active Capture applications, systems that direct human action, the system works with the user to achieve a common goal, for example, taking her picture and recording her name for inclusion on a department web page. The design of Active... more
He has written extensively on human-computer interaction and human factors in computing, including books, articles and editorial contributions and received the ACM CHI Lifetime Achievement Award in 2001 (http://www.cs.umd.edu/~ben).
DNS Security Extensions have been developed to add cryptographic protection to the Internet name resolution service. In this paper we report the results from our monitoring effort with early DNSSEC deployment trials and the lessons learned.
Characterizing the evolution of Internet topology is important to our understanding of the Internet architecture and its interplay with technical, economic and social forces. A major challenge in obtaining empirical data on topology... more
The Internet AS-level topology is a highly dynamic structure that evolves over time under diverse technical, economical and social forces. Up to now the few efforts on topology visualization have taken only static snapshots of the... more
A prefix hijack attack involves an attacker announcing victim networks' IP prefixes into the global routing system. As a result, data traffic from portions of the Internet can be diverted to attacker networks. Prefix hijack attacks are a... more
Path vector routing protocols such as the Border Gateway Protocol (BGP) are known to suffer from slow convergence following a change in the network topology or policy. Although a number of convergence enhancements have been proposed... more
In this paper we present a troubleshooting tool designed to identify a number of DNS configuration errors. These errors range from commonly seen misconfigurations that are well known among DNS operators, such as lame delegations, to less... more
Traditional routing protocol designs have focused solely on the functionality of the protocols and implicitly assume that all routing update messages received by a router carry valid information. However operational experience suggests... more
The Domain Name System (DNS) is an essential part of the Internet infrastructure and provides fundamental services, such as translating host names into IP addresses for Internet communication. The DNS is vulnerable to a number of... more
Protocol Boosters are functional elements, inserted and deleted from network protocol stacks on an as-needed basis. The Protocol Booster design methodology attempts to improve end-to-end networking performance by adapting protocols to... more
This brief paper outlines our strategies for providing a hardware and software solution to interfacing hosts to high-performance networks. Our prototype implementation connects an IBM RS/6000 to a SONET-based ATM network carrying data at... more
Quality of Service (QoS) guarantees for delay sensitive networked multimedia applications, such as teleoperation, must be application-to-application. We describe a set of services, a service kernel, required at the end points, for... more
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for distributed control has not been achieved in the mechanisms for... more
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does not see, so, effectively, everyone on the protected side is... more
Z is a softwares ystem designed to provide media-transparent network services on a collection of UNIX®m achines. These services are comprised of file transfer and command execution; Z preserves file ownership on remote transfer,a nd mores... more
We present techniques for analyzing the effect of ''copy-on-write'' page management strategies on the performance of UNIX fork() operations. The analysis techniques are applied on two workstations, the AT&T 3B2/310 TM and the... more
Software Design Laboratory is an undergraduate practicum in software design, which focuses on principles and practices of large-scale software design. Concepts and examples borrowed from elsewhere in Computer Science are applied to the... more
Byzantine and rational behaviors are increasingly recognized as unavoidable realities in today's cooperative services. Yet, how to design BAR-tolerant protocols and rigorously prove them strategy proof remains somewhat of a mystery:... more
We design and evaluate a lightweight route verification mechanism that enables a router to discover route failures and inconsistencies between advertised Internet routes and actual paths taken by the data packets. Our mechanism is... more
We present the first peer-to-peer data streaming application that guarantees predictable throughput and low latency in the BAR (Byzantine/Altruistic/Rational) model, in which nonaltruistic nodes can behave in ways that are self-serving... more
We describe a family of ÐÓ Ò protocols for assigning symmetric keys to Ò processes in a network so that each process can use its assigned keys to communicate securely with every other process. The -th protocol in our protocol family,... more
This paper describes a general approach to constructing cooperative services that span multiple administrative domains. In such environments, protocols must tolerate both Byzantine behaviors when broken, misconfigured, or malicious nodes... more
Pearling is an interactive technique for extracting the centerline and varying thickness of (hand-drawn) curves in images. It works in realtime, is capable of tracing complex curve networks, and supports gesture-driven interactive editing... more
We define b-compatibility for planar curves and propose three 2 ball morphing techniques (b-morphs) between pairs of b-3 compatible curves. B-morphs use the automatic ball-map 4 correspondence, proposed by Chazel et al. [11], from which 5... more
Climate change governance is an emerging topic in the citizen engagement discourse. This is an Expert Group Meeting (EGM) report focused on the socioeconomic impacts of climate change on citizen engagement that reciprocate creative... more
by Ben Lund and 
1 more
Unashamedly inspired by del.icio.us as we were, we felt there were some additional characteristics of academic reference lists that warranted a separate, tailored service catering to, and making the most of, the needs of the academic... more
Background: A region of chromosome 16 containing the fat mass/obesity associated 54 gene (FTO) is reproducibly associated with fat mass and body mass index, risk of obesity 55 and adiposity. 56
Observational epidemiological studies suffer from many potential biases, from confounding and from reverse causation, and this limits their ability to robustly identify causal associations. Several high-profile situations exist in which... more
This paper addresses two major challenges new product development teams face in making a product people want. The first challenge is to frame the design situation based on a real need of a customer. The second, less obvious, challenge is... more
Members of newly formed design teams have different frames – implicit values, goals, and assumptions – they each hold about what problems are important and how they are best addressed. In the early, informal phases of design projects,... more
Intelligent Multi-Classifier Design Methods for the Classification of Imbalanced Data Sets : Application to DNA Sequence analysis" by Romesh Ranawana, St. Cross College
All learning algorithms attempt to improve the accuracy of a classification system. However, the effectiveness of such a system is dependent on the heuristic used by the learning paradigm to measure performance. This paper demonstrates... more
The main challenge in handwritten character recognition involves the development of a method that can generate descriptions of the handwritten objects in a short period of time. Due to its low computational requirement, fuzzy logic is... more
The main challenge in handwritten character recognition involves the development of a method that can generate descriptions of the handwritten objects in a short period of time. Due to its low computational requirement, fuzzy logic is... more
Handwritten characters differ from person to person. Thus, when using traditional methods like Neural Networks and Image Processing techniques, extensive training of the system is needed. Due to this reason, an attempt was made to develop... more
Handwritten characters differ from person to person. Thus, when using traditional methods like Neural Networks and Image Processing techniques, extensive training of the system is needed. Due to this reason, an attempt was made to develop... more