This Is AuburnElectronic Theses and Dissertations

Browsing by Author "Hamilton, John"

Now showing items 1-15 of 15

An Adaptive Jam-Resistant Cross-Layer Protocol for Mobile Ad-Hoc Networks In Noisy Environments 

Kuhr, Mark G. (2009-03-10)
This dissertation contributes a jam-resistant communications protocol for use in a mobile ad-hoc network (MANET). Specific focus is given to the network layer routing of packets within a MANET. A MANET is a self-organizing ...

An Adaptive Single-Hop Medium Access Control Layer For Noisy Channels 

Sanders, Derek T. (2009-05-04)
The work presented in this dissertation is for a contribution to the data link layer and its responsibility of managing the physical channel in a mobile ad-hoc network (MANET). Wireless networks in general are susceptible ...

Alleviating Escape Panic Using Evolutionary Intelligence 

Darnell, Shelby (2006-05-15)
Reducing damage, danger, and panic by evolving room designs is possible with artificial intelligence. Escape panic, brought on by groups of people being in a life-threatening situation, increases the fatality rate and ...

Applications of GUI Usage Analysis 

Imsand, Eric (2008-05-15)
In the realm of computer security, a masquerade attack is a form of attack wherein the attacker deceives the victim, causing them to believe they are someone other than who they are. One particularly dangerous form of ...

Automatic Detection of Software Security Vulnerabilities in Executable Program Files 

Tevis, Jay-Evan (2005-08-15)
Secure programming describes those techniques that software developers use to provide security features in their applications. In addition to these techniques, software practitioners use static code security checkers to ...

Development of A Software Architecture Method for Software Product Families and its Application to the AubieSat Satellite Program 

O'Farrell, John Ryan (2009-11-13)
Software architecture methodologies are very useful in reusing software code from one product to another. In software product families, several similar products are developed by the same organization that share many features ...

Digital Forensic Detection and Disruption of JPEG Steganography 

Trawick, George (2010-07-28)
The use of digital media and internet communications has grown for business and personal use, and so has the use of digital communications by criminal and terrorist elements. Of particular interest in both criminal ...

Enhancing Host Based Intrusion Detection Systems with Danger Theory of Artificial Immune Systems 

Amer, Suhair (2008-05-15)
Rather than discriminating activity by belonging to self or non-self, danger theory extends its discrimination to be between non-self but harmless and self but harmful. The danger theory states that the system does not ...

Exploring the Integration of Model-based Formal Methods into Software Design Education 

Wang, Shuo (2005-12-15)
Proper design analysis is indispensable to assure quality and reduce emergent cost due to faulty software. Teaching proper design verification skills early during the pedagogical development of a software engineer is ...

A Gateway-Based Approach for Information Retrieval from Data-Centric Wireless Sensor Networks from IP Hosts 

Maharrey, Brandon (2010-11-11)
With applications ranging from environmental and health monitoring to military surveillance and inventory tracking, wireless sensor networks (WSNs) are changing the way we collect and use data and will be a major part of ...

Generic Reverse Engineering Architecture with Compiler and Compression Classification Components 

Torri, Stephen (2009-05-15)
As more and more applications, libraries, and other types of programs are being executed in untrusted environments they will be targets of attackers. These applications are exposed to malicious programs attempting to exploit ...

Quantitative Risk Assessment Model for Software Security in the Design Phase of Software Development 

Mkpong-Ruffin, Idongesit (2009-05-15)
Risk analysis is a process for considering possible risks and determining,which are the most significant for any particular effort. Determining which risks to address and the optimum strategy for mitigating said risks is ...

Regressing Object-Oriented Principles to Achieve Performance Gains on the Java Platform, Micro Edition 

Cook, Sean (2006-12-15)
Object-Oriented Programming is a software design method that models the characteristics of abstract or real objects using classes and objects [Sun Microsystems 2006b]. The Java language is intrinsically object-oriented; ...

A Software and Hardware System for the Autonomous Control and Navigation of a Trained Canine 

Britt, Winard (2009-07-20)
This dissertation demonstrates the autonomous command and navigation of a trained canine to multiple waypoints. A system is described consisting of a canine that can be guided autonomously to a number of waypoints by an ...

Using Genetic Programming to Quantify the Effectiveness of Similar User Cluster History as a Personalized Search Metric 

Eoff, Brian (2005-12-15)
Online search is the service that pushes the Internet. One must only look at the success of a company such as Google, an idea from a 1998 graduate research paper that has in 2005 not only become a wildly successful company, ...