5,671 research outputs found
SAFIUS - A secure and accountable filesystem over untrusted storage
We describe SAFIUS, a secure accountable file system that resides over an
untrusted storage. SAFIUS provides strong security guarantees like
confidentiality, integrity, prevention from rollback attacks, and
accountability. SAFIUS also enables read/write sharing of data and provides the
standard UNIX-like interface for applications. To achieve accountability with
good performance, it uses asynchronous signatures; to reduce the space required
for storing these signatures, a novel signature pruning mechanism is used.
SAFIUS has been implemented on a GNU/Linux based system modifying OpenGFS.
Preliminary performance studies show that SAFIUS has a tolerable overhead for
providing secure storage: while it has an overhead of about 50% of OpenGFS in
data intensive workloads (due to the overhead of performing
encryption/decryption in software), it is comparable (or better in some cases)
to OpenGFS in metadata intensive workloads.Comment: 11pt, 12 pages, 16 figure
Thymoma with Myasthenia Gravis in Adolescent
Thymomas are exceedingly rare in the first 20 years of life, Thymic lesions comprise approximately 2–3% of all pediatric mediastinal tumors and include thymic cysts, hyperplasia, carcinoma, and thymomas. Fewer than 30 cases in children have been described in the literature. Thymomas in adults are commonly associated with other diseases, the most frequent being myasthenia gravis. However, this association has been rarely reported in childhood. These tumors are typically aggressive, with poor outcomes. We report a case of thymoma associated with myasthenia gravis in a 16-year-old girl and review the literature
Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots
The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring
system whose goal is to measure, detect, characterize, and track threats such
as distribute denial of service(DDoS) attacks and worms. To block the
monitoring system in the internet the attackers are targeted the ITM system. In
this paper we address flooding attack against ITM system in which the attacker
attempt to exhaust the network and ITM's resources, such as network bandwidth,
computing power, or operating system data structures by sending the malicious
traffic. We propose an information-theoretic frame work that models the
flooding attacks using Botnet on ITM. Based on this model we generalize the
flooding attacks and propose an effective attack detection using Honeypots
Supply and demand for cereals in Nepal, 2010–2030:
This paper attempts to estimate the future supply and demand for cereals in Nepal. While there has been considerable research in the past examining the agricultural sector in Nepal, to the best of our knowledge there has been no analysis of the supply-demand scenario for food grains in the country. The analysis undertaken in this paper attempts to bridge this gap in the literature by estimating supply and demand models for the three most important cereals in Nepal's food basket: rice, wheat, and maize. The supply projections have been carried out on the basis of a single-crop production function model using data for the period 1995–2008. For estimating the demand function and projecting future demand, data from the Nepal Living Standards Survey II (NLSS II), undertaken in the year 2003/04, are used.cereal supply, cereal demand,
NSF CAREER: Scalable Learning and Adaptation with Intelligent Techniques and Neural Networks for Reconfiguration and Survivability of Complex Systems
The NSF CAREER program is a premier program that emphasizes the importance the foundation places on the early development of academic careers solely dedicated to stimulating the discovery process in which the excitement of research enriched by inspired teaching and enthusiastic learning. This paper describes the research and education experiences gained by the principal investigator and his research collaborators and students as a result of a NSF CAREER proposal been awarded by the power, control and adaptive networks (PCAN) program of the electrical, communications and cyber systems division, effective June 1, 2004. In addition, suggestions on writing a winning NSF CAREER proposal are presented
Intelligent Sense-making for Smart Grid Stability
The power systems of the future - smart grids - will see an increase in both renewable energy sources and load demand, thus increasing the need for fast dynamic reconfiguration of system parameters to handle energy and load dispatches. Power systems will need to be monitored continuously to maintain stability under normal and abnormal operating conditions and when facing disturbances. a combination of system state prediction, dynamic power flow, system optimization, and solution stability checking will allow for a more reliable, affordable, efficient and clean power grid. the optimization and control systems on a smart grid will require a computational systems thinking capability to handle the uncertainties and variability that exist in a smart grid environment. the concept of sense-making based on computational intelligence methods, including neural networks, fuzzy logic and swarm intelligence, as well as online measurements from a smart grid to provide \u27situational\u27 awareness in the context of stability, is introduced in this paper. © 2011 IEEE
- …