scispace - formally typeset
Search or ask a question
Institution

Mitre Corporation

CompanyBedford, Massachusetts, United States
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.


Papers
More filters
Journal ArticleDOI
TL;DR: Evidence for climate adaptation and its role in colonization of novel environments in the model species, Arabidopsis thaliana, and genotypic mean correlations of fitness across plantings suggest the genetic basis of fitness in Rhode Island differs between spring and autumn cohorts, and from previous fitness measurements in European field sites.
Abstract: Understanding the genetic mechanisms that contribute to range expansion and colonization success within novel environments is important for both invasion biology and predicting species-level responses to changing environments. If populations are adapted to local climates across a species' native range, then climate matching may predict which genotypes will successfully establish in novel environments. We examine evidence for climate adaptation and its role in colonization of novel environments in the model species, Arabidopsis thaliana. We review phenotypic and genomic evidence for climate adaptation within the native range and describe new analyses of fitness data from European accessions introduced to Rhode Island, USA, in spring and fall plantings. Accessions from climates similar to the Rhode Island site had higher fitness indicating a potential role for climate pre-adaptation in colonization success. A genomewide association study (GWAS), and genotypic mean correlations of fitness across plantings suggest the genetic basis of fitness in Rhode Island differs between spring and autumn cohorts, and from previous fitness measurements in European field sites. In general, these observations suggest a scenario of conditional neutrality for loci contributing to colonization success, although there was evidence of a fitness trade-off between fall plantings in Norwich, UK, and Rhode Island. GWAS suggested that antagonistic pleiotropy at a few specific loci may contribute to this trade-off, but this conclusion depended upon the accessions included in the analysis. Increased genomic information and phenotypic information make A. thaliana a model system to test for the genetic basis of colonization success in novel environments.

48 citations

Journal ArticleDOI
TL;DR: Information warfare defense must consider the whole process of attack, response, and recovery; prevention is just one phase; others are explained and then recovery is an equally important phase of information warfare defense.
Abstract: is of course necessary to take steps to prevent attacks from succeeding. At the same time, however, it is important to recognize that not all attacks can be averted at the outset. Attacks that succeed to some degree are unavoidable, and comprehensive support for identifying and responding to attacks is required [1]. Information warfare defense must consider the whole process of attack, response, and recovery. This requires a recognition of the multiple phases of the information warfare process. Prevention is just one phase; we explain others and then focus on the oft-Recent exploits by hackers have drawn attention to the importance of defending against potential information warfare. Defense and civil institutions rely so heavily on their information systems and networks that attacks that disable them could be devastating. Yet, as hacker attacks have demonstrated , protective mechanisms are fallible. Features and services that must be in place to carry out needed, legitimate functions can be abused by being used in unexpected ways to provide an avenue of attack. Further, an attacker who penetrates one system can use its relationships with other systems on the network to compromise them as well. Experiences of actual attacks have led to the recognition of the need to detect and react to attacks that succeed in breaching a system's protective mechanisms. Prevention and detection receive most of the attention, but recovery is an equally important phase of information warfare defense.

47 citations

Journal ArticleDOI
TL;DR: This paper demonstrates via simulation that the nanodevices and nanofabrication techniques developed recently for general-purpose nanocomputers also might be applied with substantial benefit to implement less complex nanocircuits targeted at specific applications.
Abstract: Designs and simulation results are given for two small, special-purpose nanoelectronic circuits. The area of special-purpose nanoelectronics has not been given much consideration previously, though much effort has been devoted to the development of general-purpose nanoelectronic systems, i.e., nanocomputers. This paper demonstrates via simulation that the nanodevices and nanofabrication techniques developed recently for general-purpose nanocomputers also might be applied with substantial benefit to implement less complex nanocircuits targeted at specific applications. Nanocircuits considered here are a digital controller for the leg motion on an autonomous millimeter-scale robot and an analog nanocircuit for amplification of signals in a tiny optoelectronic sensor or receiver. Simulations of both nanocircuit designs show significant improvement over microelectronic designs in metrics such as footprint area and power consumption. These improvements are obtained from designs employing nanodevices and nanofabrication techniques that already have been demonstrated experimentally. Thus, the results presented here suggest that such improvements might be realized in the near term for important, special-purpose applications.

47 citations

Journal ArticleDOI
01 Oct 2019
TL;DR: It is shown that predictable sequence numbers in these frames can allow an adversary to track Apple devices across space and time, defeating existing anti-tracking techniques such as MAC address randomization.
Abstract: We investigate Apple's Bluetooth Low Energy (BLE) Continuity protocol, designed to support interoperability and communication between iOS and macOS devices, and show that the price for this seamless experience is leakage of identifying information and behavioral data to passive adversaries. First, we reverse engineer numerous Continuity protocol message types and identify data fields that are transmitted unencrypted. We show that Continuity messages are broadcast over BLE in response to actions such as locking and unlocking a device's screen, copying and pasting information, making and accepting phone calls, and tapping the screen while it is unlocked. Laboratory experiments reveal a significant flaw in the most recent versions of macOS that defeats BLE Media Access Control (MAC) address randomization entirely by causing the public MAC address to be broadcast. We demonstrate that the format and content of Continuity messages can be used to fingerprint the type and Operating System (OS) version of a device, as well as behaviorally profile users. Finally, we show that predictable sequence numbers in these frames can allow an adversary to track Apple devices across space and time, defeating existing anti-tracking techniques such as MAC address randomization.

47 citations

Proceedings ArticleDOI
18 Jun 1995
TL;DR: Three signaling schemes are analyzed for their potential implementation in a high-speed multi-switch all-optical network and results obtained identify the signaling scheme to be implemented on an all- optical networking testbed.
Abstract: Three signaling schemes are analyzed for their potential implementation in a high-speed multi-switch all-optical network. This investigation is of interest because important characteristics of all-optical high-speed networks were not considered in the design of signaling protocols currently implemented in today's networks. Equations for throughput and delay are derived for the three schemes and comparisons are performed. Results obtained identify the signaling scheme to be implemented on an all-optical networking testbed.

47 citations


Authors

Showing all 4896 results

NameH-indexPapersCitations
Sushil Jajodia10166435556
Myles R. Allen8229532668
Barbara Liskov7620425026
Alfred D. Steinberg7429520974
Peter T. Cummings6952118942
Vincent H. Crespi6328720347
Michael J. Pazzani6218328036
David Goldhaber-Gordon5819215709
Yeshaiahu Fainman5764814661
Jonathan Anderson5719510349
Limsoon Wong5536713524
Chris Clifton5416011501
Paul Ward5240812400
Richard M. Fujimoto5229013584
Bhavani Thuraisingham5256310562
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

83% related

Hewlett-Packard
59.8K papers, 1.4M citations

83% related

Carnegie Mellon University
104.3K papers, 5.9M citations

83% related

George Mason University
39.9K papers, 1.3M citations

83% related

Georgia Institute of Technology
119K papers, 4.6M citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20234
202210
202195
2020139
2019145
2018132