31 research outputs found
Extension and hardware implementation of the comprehensive integrated security system concept
Merged with duplicate record (10026.1/700) on 03.01.2017 by CS (TIS)This is a digitised version of a thesis that was deposited in the University Library. If you are the author please contact PEARL Admin ([email protected]) to discuss options.The current strategy to computer networking is to increase the accessibility that legitimate
users have to their respective systems and to distribute functionality. This creates a more
efficient working environment, users may work from home, organisations can make better
use of their computing power. Unfortunately, a side effect of opening up computer systems
and placing them on potentially global networks is that they face increased threats from
uncontrolled access points, and from eavesdroppers listening to the data communicated
between systems. Along with these increased threats the traditional ones such as
disgruntled employees, malicious software, and accidental damage must still be countered.
A comprehensive integrated security system ( CISS ) has been developed to provide
security within the Open Systems Interconnection (OSI) and Open Distributed Processing
(ODP) environments. The research described in this thesis investigates alternative methods
for its implementation and its optimisation through partial implementation within hardware
and software and the investigation of mechanismsto improve its security.
A new deployment strategy for CISS is described where functionality is divided amongst
computing platforms of increasing capability within a security domain. Definitions are given
of a: local security unit, that provides terminal security; local security servers that serve the
local security units and domain management centres that provide security service coordination
within a domain.
New hardware that provides RSA and DES functionality capable of being connected to Sun
microsystems is detailed. The board can be used as a basic building block of CISS,
providing fast cryptographic facilities, or in isolation for discrete cryptographic services.
Software written for UNIX in C/C++ is described, which provides optimised security
mechanisms on computer systems that do not have SBus connectivity.
A new identification/authentication mechanism is investigated that can be added to existing
systems with the potential for extension into a real time supervision scenario. The
mechanism uses keystroke analysis through the application of neural networks and genetic
algorithms and has produced very encouraging results.
Finally, a new conceptual model for intrusion detection capable of dealing with real time
and historical evaluation is discussed, which further enhances the CISS concept
Proceedings of the Second International Mobile Satellite Conference (IMSC 1990)
Presented here are the proceedings of the Second International Mobile Satellite Conference (IMSC), held June 17-20, 1990 in Ottawa, Canada. Topics covered include future mobile satellite communications concepts, aeronautical applications, modulation and coding, propagation and experimental systems, mobile terminal equipment, network architecture and control, regulatory and policy considerations, vehicle antennas, and speech compression
2004-2005 Louisiana Tech University Catalog
The Louisiana Tech University Catalog includes announcements and course descriptions for courses offered at Louisiana Tech University for the academic year of 2004-2005https://digitalcommons.latech.edu/university-catalogs/1010/thumbnail.jp
Space Communications: Theory and Applications. Volume 3: Information Processing and Advanced Techniques. A Bibliography, 1958 - 1963
Annotated bibliography on information processing and advanced communication techniques - theory and applications of space communication
2003-2004 Louisiana Tech University Catalog
The Louisiana Tech University Catalog includes announcements and course descriptions for courses offered at Louisiana Tech University for the academic year of 2003-2004.https://digitalcommons.latech.edu/university-catalogs/1011/thumbnail.jp
2001-2002 Louisiana Tech University Catalogs
The Louisiana Tech University Catalog includes announcements and course descriptions for courses offered at Louisiana Tech University for the academic year of 2001-2002.https://digitalcommons.latech.edu/university-catalogs/1013/thumbnail.jp
1967-1968; 1968-1969 Louisiana Polytechnic Institute Catalog
The Louisiana Polytechnic Institute Catalog includes announcements and course descriptions for courses offered at Louisiana Polytechnic Institute for the academic years of 1967-1968 and 1968-1969.https://digitalcommons.latech.edu/university-catalogs/1044/thumbnail.jp
Learning to adapt in dialogue systems : data-driven models for personality recognition and generation.
Dialogue systems are artefacts that converse with human users in order to achieve
some task. Each step of the dialogue requires understanding the user's input, deciding
on what to reply, and generating an output utterance. Although there are
many ways to express any given content, most dialogue systems do not take linguistic
variation into account in both the understanding and generation phases,
i.e. the user's linguistic style is typically ignored, and the style conveyed by the
system is chosen once for all interactions at development time. We believe that
modelling linguistic variation can greatly improve the interaction in dialogue systems,
such as in intelligent tutoring systems, video games, or information retrieval
systems, which all require specific linguistic styles. Previous work has shown that
linguistic style affects many aspects of users' perceptions, even when the dialogue
is task-oriented. Moreover, users attribute a consistent personality to machines,
even when exposed to a limited set of cues, thus dialogue systems manifest personality
whether designed into the system or not. Over the past few years, psychologists
have identified the main dimensions of individual differences in human
behaviour: the Big Five personality traits. We hypothesise that the Big Five provide
a useful computational framework for modelling important aspects of linguistic
variation. This thesis first explores the possibility of recognising the user's personality
using data-driven models trained on essays and conversational data. We then
test whether it is possible to generate language varying consistently along each
personality dimension in the information presentation domain. We present PERSONAGE:
a language generator modelling findings from psychological studies to
project various personality traits. We use PERSONAGE to compare various generation
paradigms: (1) rule-based generation, (2) overgenerate and select and (3)
generation using parameter estimation models-a novel approach that learns to
produce recognisable variation along meaningful stylistic dimensions without the
computational cost incurred by overgeneration techniques. We also present the
first human evaluation of a data-driven generation method that projects multiple
stylistic dimensions simultaneously and on a continuous scale
General Undergraduate Catalog, 1983-1984
Marshall University Undergraduate Course Catalog for the 1983-1984 academic year.https://mds.marshall.edu/catalog_1980-1989/1003/thumbnail.jp
Dordt College 1990-91 Catalog
Academic Catalog for 1990-91https://digitalcollections.dordt.edu/academic_catalogs/1030/thumbnail.jp