Institution
Mitre Corporation
Company•Bedford, Massachusetts, United States•
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.
Topics: Air traffic control, National Airspace System, Information system, Air traffic management, Communications system
Papers published on a yearly basis
Papers
More filters
•
15 Feb 1994TL;DR: In this paper, a protocol for mixed voice and data access to a synchronous broadcast communications channel (116) is provided, which requires that a user determine whether a time slot is available.
Abstract: A protocol for mixed voice and data access to a synchronous broadcast communications channel (116) is provided. Transmission on the broadcast communications channel (116) is by means of a plurality of time division frames, each such frame being defined by a plurality of time slots (210). The protocol requires that a user determine whether a time slot is available. If a slot is available, a user transmits a preamble (212) on the broadcast communications channel and then substantially simultaneously monitors the channel for determining whether a collision of the preamble has occurred. If a collision has occurred with a second user who has a higher priority, the first user reattempts to acquire an available time slot after a time delay, the time delay being equivalent to a random number of time slots. If on the other hand, the collision was with a second user of equal priority, both users will reattempt acquisition of available time slots after respective random time delays. The preambles of users of different priority are transmitted using a non-interfering code or modulation frequency, thereby allowing the higher priority user to continue transmission of the remaining fields which make up that user's information packet. Another key feature of the protocol is the use of the preamble (212) to identify voice users that are in silence periods, transmitting no data. Under these circumstances, the protocol permits data users to utilize such identified time slots when they are encountered, thereby increasing the throughput of the data communications system.
53 citations
••
28 Jun 1992TL;DR: The three-tiered discourse representation defined in (Luperfoy, 1991) is applied to multimodal human-computer interface (HCI) dialogues and evidence is presented to justify the added complexity of this three- tiered system over standard two-tierer representations.
Abstract: The three-tiered discourse representation defined in (Luperfoy, 1991) is applied to multimodal human-computer interface (HCI) dialogues. In the applied system the three tiers are (1) a linguistic analysis (morphological, syntactic, sentential semantic) of input and output communicative events including keyboard-entered command language atoms, NL strings, mouse clicks, output text strings, and output graphical events; (2) a discourse model representation containing one discourse object, called a peg, for each construct (each guise of an individual) under discussion; and (3) the knowledge base (KB) representation of the computer agent's 'belief' system which is used to support its interpretation procedures. I present evidence to justify the added complexity of this three-tiered system over standard two-tiered representations, based on (A) cognitive processes that must be supported for any non-idealized dialogue environment (e.g., the agents can discuss constructs not present in their current belief systems), including information decay, and the need for a distinction between understanding a discourse and believing the information content of a discourse; (B) linguistic phenomena, in particular, context-dependent NPs, which can be partially or totally anaphoric; and (C) observed requirements of three implemented HCI dialogue systems that have employed this three-tiered discourse representation.
53 citations
••
TL;DR: Thirty technology and research areas were compared for quantity production, and represented areas of emphasis by the PRC in physical, environmental, engineering, and life sciences.
52 citations
••
TL;DR: Computer and communications technologies and trends toward standardization, interoperability, and connectivity pose a growing security threat to Automatic Data Processing (ADP) and teecommunications systems that process sensitive or classified information.
Abstract: computer and communications technologies and trends toward standardization , interoperability, and connectivity pose a growing security threat to Automatic Data Processing (ADP) and te][ecommunications systems that process sensitive or classified information. The activation of a threat could result in: disclosure, modification, or destruction of' sensitive or classified information; modification to hardware or software; and/or nonavailability of the system services. ~F\" / / // / ,/ / /
52 citations
••
10 Jul 2006
TL;DR: This work proposes a new, less powerful nondeterminism-resolution mechanism for PIOAs, consisting of tasks and local schedulers, and illustrates the potential of the task-PIOA framework by outlining its use in verifying an oblivious transfer protocol.
Abstract: Modeling frameworks such as probabilistic I/O automata (PIOA) and Markov decision processes permit both probabilistic and nondeterministic choices. In order to use such frameworks to express claims about probabilities of events, one needs mechanisms for resolving the nondeterministic choices. For PIOAs, nondeterministic choices have traditionally been resolved by schedulers that have perfect information about the past execution. However, such schedulers are too powerful for certain settings, such as cryptographic protocol analysis, where information must sometimes be hidden. Here, we propose a new, less powerful nondeterminism-resolution mechanism for PIOAs, consisting of tasks and local schedulers. Tasks are equivalence classes of system actions that are scheduled by oblivious, global task sequences. Local schedulers resolve nondeterminism within system components, based on local information only. The resulting task-PIOA framework yields simple notions of external behavior and implementation, and supports simple compositionality results. We also define a new kind of simulation relation, and show it to be sound for proving implementation. We illustrate the potential of the task-PIOA framework by outlining its use in verifying an oblivious transfer protocol.
52 citations
Authors
Showing all 4896 results
Name | H-index | Papers | Citations |
---|---|---|---|
Sushil Jajodia | 101 | 664 | 35556 |
Myles R. Allen | 82 | 295 | 32668 |
Barbara Liskov | 76 | 204 | 25026 |
Alfred D. Steinberg | 74 | 295 | 20974 |
Peter T. Cummings | 69 | 521 | 18942 |
Vincent H. Crespi | 63 | 287 | 20347 |
Michael J. Pazzani | 62 | 183 | 28036 |
David Goldhaber-Gordon | 58 | 192 | 15709 |
Yeshaiahu Fainman | 57 | 648 | 14661 |
Jonathan Anderson | 57 | 195 | 10349 |
Limsoon Wong | 55 | 367 | 13524 |
Chris Clifton | 54 | 160 | 11501 |
Paul Ward | 52 | 408 | 12400 |
Richard M. Fujimoto | 52 | 290 | 13584 |
Bhavani Thuraisingham | 52 | 563 | 10562 |