The Advanced Encryption Standard (AES) is the new standard for cryptography and has gained wide support as a means to secure digital data. Hence, it is beneficial to develop an implementation of AES that has a high throughput. SIMD technology is very effective in increasing the performance of some cryptographic...
Hardware cryptography offers a reliable way to provide security for data that is sent over networks. Security processors have taken the stage in the movement for secure computing. Some of the more prominent security processors belong to the S1 family created by Motorola. The primary goal of this thesis is...
WebGen is a software tool for generating Web scripts automatically for a Web-based database application. In this project, access control, AJAX support, and editable-and-insertable table mechanisms were added to WebGen. With our access control mechanism, an access-control level can be specified for each table. In access control level 1, for...
Current database systems apply access control mostly on tables and columns.
However, many applications require access control on individual rows in database
tables. Therefore, we have implemented a row-based access control mechanism. In
our model for access control, object groups, in addition to user groups, are used to
reduce the...
The stupendous growth in wireless and mobile devices in the recent years has prompted researchers to look at innovative approaches that enable effective use of the available resources. In this thesis, we propose a medium access control (MAC) protocol, referred to as EM-MAC, that enables wireless devices with multi-channel access...
Distributed Version Control Systems (DVCS) have seen an increase in popularity relative to traditional Centralized Version Control Systems (CVCS). Yet we know little on whether VCS tools meet the needs of software developers when managing software change or whether developers are benefitting from the extra power of DVCS. Without such...
Prioritization techniques are used to schedule test cases to execute in a specific order to maximize some objective function. There are a variety of possible objective functions, such as a function that measures how quickly faults can be detected within the testing process, or a function that measures how fast...
Test case prioritization techniques schedule test cases for regression testing in an order that increases their ability to meet some performance goal. One performance goal, rate of fault detection, measures how quickly faults are detected within the testing process. The APFD metric had been proposed for measuring the rate of...
A simple package of routines that can be easily implemented
in small minicomputers used in process control, was developed to
simulate dynamic systems and computer control of simple dynamic
systems found in the process industries.
Two different systems, a gas absorber and a fifth-order
transfer function were chosen as processes...
The application of the personal computer in the area of real-time process control
is investigated. Background information is provided regarding factory automation and
process control. The current use of the PC in the factory for data acquisition is
presented along with an explanation of the advantages and disadvantages associated
with...