scispace - formally typeset
Search or ask a question
Institution

Mitre Corporation

CompanyBedford, Massachusetts, United States
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.


Papers
More filters
Patent
18 Nov 2010
TL;DR: In this article, a method for detecting a potential airborne conflict between an ownship and at least one intruder is proposed, which includes determining a relative motion trajectory of the own ship and the intruder, generating a plurality of resolution advisories based upon the determined relative motion trajectories and corresponding to respective motion dimensions of the ship, determining an alert time for each of the plurality of RAs responsive to the corresponding motion dimension and the determinedrelative motion trajectory, and transmitting at least the position of the RAs to the ownship or an aircraft control entity.
Abstract: Methods, systems, and computer program products for aircraft conflict detection and resolution are proposed. Embodiments of the present invention detect potential conflicts without a predetermined look-ahead time threshold and determine the time for issuing resolution alerts dynamically based on the relative movements of the aircraft. A method embodiment for detecting a potential airborne conflict between an ownship and at least one intruder includes, determining a relative motion trajectory of the ownship and the intruder, generating a plurality of resolution advisories based upon the determined relative motion trajectory and corresponding to respective motion dimensions of the ownship, determining an alert time for each of the plurality of RAs responsive to the corresponding motion dimension and the determined relative motion trajectory, and transmitting at least one of the plurality of RAs to at least one of the ownship or an aircraft control entity.

43 citations

Proceedings ArticleDOI
08 Feb 2009
TL;DR: This baseline study explores the control of a single agent with a multi-touch table with a physical robot agent using an adapted, previously studied, joystick-based interface and performs a detailed analysis of users' interaction styles.
Abstract: Recent developments in multi-touch technologies have exposed fertile ground for research in enriched human-robot interaction. Although multi-touch technologies have been used for virtual 3D applications, to the authors' knowledge, ours is the first study to explore the use of a multi-touch table with a physical robot agent. This baseline study explores the control of a single agent with a multi-touch table using an adapted, previously studied, joystick-based interface. We performed a detailed analysis of users' interaction styles with two complex functions of the multi-touch interface and isolated mismatches between user expectations and interaction functionality.

42 citations

Book
30 Nov 1999
TL;DR: The paper provides an overview of transaction processing needs and solutions in conventional DBMSs as background, explains the constraints introduced by multilevel security, and describes the results of research in multileVEL secure transaction processing, which includes research results and limitations in concurrency control, multilesvel transaction management, and secure commit protocols.
Abstract: Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been receiving a great deal of attention from the security community. Transaction processing in these systems requires modification of conventional scheduling algorithms and commit protocols. These modifications are necessary because preserving the usual transaction properties when transactions are executing at different security levels often conflicts with the enforcement of the security policy. Considerable effort has been devoted to the development of efficient, secure algorithms for the major types of secure DBMS architectures: kernelized, replicated, and distributed. An additional problem that arises uniquely in multilevel secure DBMSs is that of secure, correct execution when data at multiple security levels must be written within one transaction. Significant progress has been made in a number of these areas, and a few of the techniques have been incorporated into commercial trusted DBMS products. However, there are many open problems remain to be explored. This paper reviews the achievements to date in transaction processing for multilevel secure DBMSs. The paper provides an overview of transaction processing needs and solutions in conventional DBMSs as background, explains the constraints introduced by multilevel security, and then describes the results of research in multilevel secure transaction processing. Research results and limitations in concurrency control, multilevel transaction management, and secure commit protocols are summarized. Finally, important new areas are identified for secure transaction processing research.

42 citations

Patent
30 Sep 1992
TL;DR: An optical bypass switch for a fiber optic local area communications network (LAN) with a ring topology allows an optical signal carried on the ring to by pass a node, which includes terminal equipment and a stub cable associated with the switch as discussed by the authors.
Abstract: An optical bypass switch for a fiber optic local area communications network (LAN) with a ring topology allows an optical signal carried on the ring to by pass a node, which includes terminal equipment and a stub cable, associated with the switch. In a non-bypass mode, the optical signal is transmitted to and from the associated terminal. The switch assembly is remote from its associated terminal and includes optical couplers and associated optical receivers and activity detectors to produce electrical signals indicative of an optical input to and output from the terminal. Logic circuitry analyzes these signals and produces an appropriate drive signal for a switch controller. The remote switch has a local power supply and is preferably located at the junction of the ring and an associated, purely dielectric stub cable. The terminal can include a dual path transceiver and bridging equipment to provide cross links between terminals in the event of a link failure to complement the node failure protection of the bypass switch.

42 citations

Journal ArticleDOI
TL;DR: Fuzzy SDT generally reduced the computed false alarm rate for both the human and machine conflict systems, partly because conflicts just outside the conflict criterion used in conventional SDT, were defined by fuzzy SDT as a signal worthy of some attention.
Abstract: This paper applies fuzzy SDT (signal detection theory) techniques, which combine fuzzy logic and conventional SDT, to empirical data. Two studies involving detection of aircraft conflicts in air traffic control (ATC) were analysed using both conventional and fuzzy SDT. Study 1 used data from a preliminary field evaluation of an automated conflict probe system, the User Request Evaluation Tool (URET). The second study used data from a laboratory controller-in-the-loop simulation of Free Flight conditions. Instead of assigning each potential conflict event as a signal (conflict) or non-signal, each event was defined as a signal (conflict) to some fuzzy degree between 0 and 1 by mapping distance into the range [0, 1]. Each event was also given a fuzzy membership, [0, 1], in the set ‘response’, based on the perceived probability of a conflict or on the colour-coded alert severity. Fuzzy SDT generally reduced the computed false alarm rate for both the human and machine conflict systems, partly because conflict...

42 citations


Authors

Showing all 4896 results

NameH-indexPapersCitations
Sushil Jajodia10166435556
Myles R. Allen8229532668
Barbara Liskov7620425026
Alfred D. Steinberg7429520974
Peter T. Cummings6952118942
Vincent H. Crespi6328720347
Michael J. Pazzani6218328036
David Goldhaber-Gordon5819215709
Yeshaiahu Fainman5764814661
Jonathan Anderson5719510349
Limsoon Wong5536713524
Chris Clifton5416011501
Paul Ward5240812400
Richard M. Fujimoto5229013584
Bhavani Thuraisingham5256310562
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

83% related

Hewlett-Packard
59.8K papers, 1.4M citations

83% related

Carnegie Mellon University
104.3K papers, 5.9M citations

83% related

George Mason University
39.9K papers, 1.3M citations

83% related

Georgia Institute of Technology
119K papers, 4.6M citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20234
202210
202195
2020139
2019145
2018132