Institution
Mitre Corporation
Company•Bedford, Massachusetts, United States•
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.
Topics: Air traffic control, National Airspace System, Information system, Air traffic management, Communications system
Papers published on a yearly basis
Papers
More filters
••
TL;DR: Evidence for climate adaptation and its role in colonization of novel environments in the model species, Arabidopsis thaliana, and genotypic mean correlations of fitness across plantings suggest the genetic basis of fitness in Rhode Island differs between spring and autumn cohorts, and from previous fitness measurements in European field sites.
Abstract: Understanding the genetic mechanisms that contribute to range expansion and colonization success within novel environments is important for both invasion biology and predicting species-level responses to changing environments. If populations are adapted to local climates across a species' native range, then climate matching may predict which genotypes will successfully establish in novel environments. We examine evidence for climate adaptation and its role in colonization of novel environments in the model species, Arabidopsis thaliana. We review phenotypic and genomic evidence for climate adaptation within the native range and describe new analyses of fitness data from European accessions introduced to Rhode Island, USA, in spring and fall plantings. Accessions from climates similar to the Rhode Island site had higher fitness indicating a potential role for climate pre-adaptation in colonization success. A genomewide association study (GWAS), and genotypic mean correlations of fitness across plantings suggest the genetic basis of fitness in Rhode Island differs between spring and autumn cohorts, and from previous fitness measurements in European field sites. In general, these observations suggest a scenario of conditional neutrality for loci contributing to colonization success, although there was evidence of a fitness trade-off between fall plantings in Norwich, UK, and Rhode Island. GWAS suggested that antagonistic pleiotropy at a few specific loci may contribute to this trade-off, but this conclusion depended upon the accessions included in the analysis. Increased genomic information and phenotypic information make A. thaliana a model system to test for the genetic basis of colonization success in novel environments.
48 citations
••
[...]
TL;DR: Information warfare defense must consider the whole process of attack, response, and recovery; prevention is just one phase; others are explained and then recovery is an equally important phase of information warfare defense.
Abstract: is of course necessary to take steps to prevent attacks from succeeding. At the same time, however, it is important to recognize that not all attacks can be averted at the outset. Attacks that succeed to some degree are unavoidable, and comprehensive support for identifying and responding to attacks is required [1]. Information warfare defense must consider the whole process of attack, response, and recovery. This requires a recognition of the multiple phases of the information warfare process. Prevention is just one phase; we explain others and then focus on the oft-Recent exploits by hackers have drawn attention to the importance of defending against potential information warfare. Defense and civil institutions rely so heavily on their information systems and networks that attacks that disable them could be devastating. Yet, as hacker attacks have demonstrated , protective mechanisms are fallible. Features and services that must be in place to carry out needed, legitimate functions can be abused by being used in unexpected ways to provide an avenue of attack. Further, an attacker who penetrates one system can use its relationships with other systems on the network to compromise them as well. Experiences of actual attacks have led to the recognition of the need to detect and react to attacks that succeed in breaching a system's protective mechanisms. Prevention and detection receive most of the attention, but recovery is an equally important phase of information warfare defense.
47 citations
••
TL;DR: This paper demonstrates via simulation that the nanodevices and nanofabrication techniques developed recently for general-purpose nanocomputers also might be applied with substantial benefit to implement less complex nanocircuits targeted at specific applications.
Abstract: Designs and simulation results are given for two small, special-purpose nanoelectronic circuits. The area of special-purpose nanoelectronics has not been given much consideration previously, though much effort has been devoted to the development of general-purpose nanoelectronic systems, i.e., nanocomputers. This paper demonstrates via simulation that the nanodevices and nanofabrication techniques developed recently for general-purpose nanocomputers also might be applied with substantial benefit to implement less complex nanocircuits targeted at specific applications. Nanocircuits considered here are a digital controller for the leg motion on an autonomous millimeter-scale robot and an analog nanocircuit for amplification of signals in a tiny optoelectronic sensor or receiver. Simulations of both nanocircuit designs show significant improvement over microelectronic designs in metrics such as footprint area and power consumption. These improvements are obtained from designs employing nanodevices and nanofabrication techniques that already have been demonstrated experimentally. Thus, the results presented here suggest that such improvements might be realized in the near term for important, special-purpose applications.
47 citations
••
01 Oct 2019TL;DR: It is shown that predictable sequence numbers in these frames can allow an adversary to track Apple devices across space and time, defeating existing anti-tracking techniques such as MAC address randomization.
Abstract: We investigate Apple's Bluetooth Low Energy (BLE) Continuity protocol, designed to support interoperability and communication between iOS and macOS devices, and show that the price for this seamless experience is leakage of identifying information and behavioral data to passive adversaries. First, we reverse engineer numerous Continuity protocol message types and identify data fields that are transmitted unencrypted. We show that Continuity messages are broadcast over BLE in response to actions such as locking and unlocking a device's screen, copying and pasting information, making and accepting phone calls, and tapping the screen while it is unlocked. Laboratory experiments reveal a significant flaw in the most recent versions of macOS that defeats BLE Media Access Control (MAC) address randomization entirely by causing the public MAC address to be broadcast. We demonstrate that the format and content of Continuity messages can be used to fingerprint the type and Operating System (OS) version of a device, as well as behaviorally profile users. Finally, we show that predictable sequence numbers in these frames can allow an adversary to track Apple devices across space and time, defeating existing anti-tracking techniques such as MAC address randomization.
47 citations
••
18 Jun 1995TL;DR: Three signaling schemes are analyzed for their potential implementation in a high-speed multi-switch all-optical network and results obtained identify the signaling scheme to be implemented on an all- optical networking testbed.
Abstract: Three signaling schemes are analyzed for their potential implementation in a high-speed multi-switch all-optical network. This investigation is of interest because important characteristics of all-optical high-speed networks were not considered in the design of signaling protocols currently implemented in today's networks. Equations for throughput and delay are derived for the three schemes and comparisons are performed. Results obtained identify the signaling scheme to be implemented on an all-optical networking testbed.
47 citations
Authors
Showing all 4896 results
Name | H-index | Papers | Citations |
---|---|---|---|
Sushil Jajodia | 101 | 664 | 35556 |
Myles R. Allen | 82 | 295 | 32668 |
Barbara Liskov | 76 | 204 | 25026 |
Alfred D. Steinberg | 74 | 295 | 20974 |
Peter T. Cummings | 69 | 521 | 18942 |
Vincent H. Crespi | 63 | 287 | 20347 |
Michael J. Pazzani | 62 | 183 | 28036 |
David Goldhaber-Gordon | 58 | 192 | 15709 |
Yeshaiahu Fainman | 57 | 648 | 14661 |
Jonathan Anderson | 57 | 195 | 10349 |
Limsoon Wong | 55 | 367 | 13524 |
Chris Clifton | 54 | 160 | 11501 |
Paul Ward | 52 | 408 | 12400 |
Richard M. Fujimoto | 52 | 290 | 13584 |
Bhavani Thuraisingham | 52 | 563 | 10562 |