Search
Now showing items 21-30 of 348
On symbolic analysis of cryptographic protocols
(Massachusetts Institute of Technology, 2005)
The universally composable symbolic analysis (UCSA) framework layers Dolev-Yao style symbolic analysis on top of the universally composable (UC) secure framework to construct computationally sound proofs of cryptographic ...
Multiple-user quantum optical communication
(Massachusetts Institute of Technology, 2005)
A fundamental understanding of the information carrying capacity of optical channels requires the signal and physical channel to be modeled quantum mechanically. This thesis considers the problems of distributing multi-party ...
Evolving circuits on a field programmable analog array using genetic programming
(Massachusetts Institute of Technology, 2005)
This thesis describes the design and implementation of the Genetic Programming Intrinsic Circuit (GPIC) design system. Inspired by a number of recent advances in the field of Evolvable Hardware, the intended purpose of ...
Lower bounds for embedding the Earth Mover Distance metric into normed spaces
(Massachusetts Institute of Technology, 2005)
This thesis presents a lower bounds for embedding the Earth Mover Distance (EMID) metric into normed spaces. The EMID is a metric over two distributions where one is a mass of earth spread out in space and the other is a ...
FireViz : a personal firewall visualizing tool
(Massachusetts Institute of Technology, 2005)
In this thesis, I present FireViz, a personal firewall visualizing tool. FireViz visually displays activities of a personal firewall in real time. The primary goal of FireViz is to educate typical computer users of the ...
A novel approach to IP traffic splitting using flowlets
(Massachusetts Institute of Technology, 2005)
TCP's burstiness is usually regarded as harmful, or at best, inconvenient. Instead, this thesis suggests a new perspective and examines whether TCP's burstiness is useful for certain applications. It claims that burstiness ...
Secure application partitioning for intellectual property protection
(Massachusetts Institute of Technology, 2005)
Intellectual property protection is a major concern for both hardware and software architects today. Recently secure platforms have been proposed to protect the privacy of application code and enforce that an application ...
Effect of varying gate-drain distance on the RF power performance of pseudomorphic high electron mobility transistors
(Massachusetts Institute of Technology, 2005)
AIGaAs/lnGaAs Pseudomorphic High Electron Mobility Transistors (PHEMTs) are widely used in satellite communications, military and commercial radar, cellular telephones, and other RF power applications. One key figure of ...
Design and analysis of a two-dimensional camera array
(Massachusetts Institute of Technology, 2005)
I present the design and analysis of a two-dimensional camera array for virtual studio applications. It is possible to substitute conventional cameras and motion control devices with a real-time, light field camera array. ...
Modeling and measurement of intermolecular interaction forces between cartilage ECM macromolecules
(Massachusetts Institute of Technology, 2005)
The mechanical properties of cartilage tissue depend largely on the macromolecules that make up its extracellular matrix (ECM). Aggrecan is the most abundant proteoglycan in articular cartilage. It is composed of a core ...