Computer Science, Dept. of: Recent submissions
Now showing items 1-20 of 30
-
Periodic solutions of differential equations containing a parameter
(The Johns Hopkins University, 1953-12-18) -
On the role of first integrals in the perturbation of periodic solutions
(The Johns Hopkins University, 1955-04-01) -
Recent work on families of periodic solutions of differential equations
(The Johns Hopkins University, 1959-06-30) -
On local and global properties of convex sets and hypersurfaces
(The Johns Hopkins University, 1959-11) -
On a conjecture of Montgomery
(1957-06) -
Extensions of representations of lie groups II
(1957-08) -
On the fundamental group of a homogeneous space
(1957-06) -
Equivariant embeddings in euclidean space
(1957-03) -
Families of periodic solutions of systems having relatively invariant line integrals
(The Johns Hopkins University, 1954-06-20) -
On the perturbation of a periodic solution when the variational system has non-trivial periodic solutions
(The Johns Hopkins University, 1955-01-20) -
On existence in the large of solutions of hyperbolic partial differential equations
(The Johns Hopkins University, 1960-07) -
Classifying Network Protocol Implementation Versions: An OpenSSL Case Study
(2013-12-11)A new technique is presented for identifying the implementation version number of software that is used for Internet communications. While many programs may exchange version numbers, oftentimes only a small subset of them ... -
iSeeYou: Disabling the MacBook Webcam Indicator LED
(2013-12-11)The ubiquitous webcam indicator LED is an important privacy feature which provides a visual cue that the camera is turned on. We describe how to disable the LED on a class of Apple internal iSight webcams used in some ... -
Multi-Object Geodesic Active Contours (MOGAC): A Parallel Sparse-Field Algorithm for Image Segmentation
(2012-02-28)An important task for computer vision systems is to segment adjacent structures in images without producing gaps or overlaps. Multi-object Level Set Methods (MLSM) perform this task with the benefit of sub-pixel accuracy. ... -
Evaluation of Diagonal Confidence-Weighted Learning on the KDD Cup 1999 Dataset for Network Intrusion Detection Systems
(2011-02-03)In this study, I evaluate the performance of diagonal Confidence-Weighted (CW) online linear classification on the KDD Cup 1999 dataset for network intrusion detection systems (NIDS). This is a compatible relationship due ... -
Design and Implementation of Views: Isolated Perspectives of a File System
(2010-04-20)We present Views, a file system architecture that provides isolation between system components for the purposes of access control, regulatory compliance, and sandboxing. Views allows for discrete I/O entities, such as ... -
Pseudorandom Number Generators on Atmel AVR AT90USB1287 Microcontrollers
(2010-01-27)The purpose of this report is to provide exhaustive details of my Computer Security Architecture project this spring 2008 semester. Ultimately, the goal has been to prepare a document that an undergraduate student can ... -
Design and Implementation of Views: Isolated Perspectives of a File System for Regulatory Compliance
(2009-08-24)We present Views, a file system architecture designed to meet the role-based access control (RBAC) requirement of federal regulations, such as those in HIPAA. Views allows for discrete IO entities, such as users, groups or ...