Institution
Mitre Corporation
Company•Bedford, Massachusetts, United States•
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.
Papers published on a yearly basis
Papers
More filters
•
18 Nov 2010TL;DR: In this article, a method for detecting a potential airborne conflict between an ownship and at least one intruder is proposed, which includes determining a relative motion trajectory of the own ship and the intruder, generating a plurality of resolution advisories based upon the determined relative motion trajectories and corresponding to respective motion dimensions of the ship, determining an alert time for each of the plurality of RAs responsive to the corresponding motion dimension and the determinedrelative motion trajectory, and transmitting at least the position of the RAs to the ownship or an aircraft control entity.
Abstract: Methods, systems, and computer program products for aircraft conflict detection and resolution are proposed. Embodiments of the present invention detect potential conflicts without a predetermined look-ahead time threshold and determine the time for issuing resolution alerts dynamically based on the relative movements of the aircraft. A method embodiment for detecting a potential airborne conflict between an ownship and at least one intruder includes, determining a relative motion trajectory of the ownship and the intruder, generating a plurality of resolution advisories based upon the determined relative motion trajectory and corresponding to respective motion dimensions of the ownship, determining an alert time for each of the plurality of RAs responsive to the corresponding motion dimension and the determined relative motion trajectory, and transmitting at least one of the plurality of RAs to at least one of the ownship or an aircraft control entity.
43 citations
••
08 Feb 2009TL;DR: This baseline study explores the control of a single agent with a multi-touch table with a physical robot agent using an adapted, previously studied, joystick-based interface and performs a detailed analysis of users' interaction styles.
Abstract: Recent developments in multi-touch technologies have exposed fertile ground for research in enriched human-robot interaction. Although multi-touch technologies have been used for virtual 3D applications, to the authors' knowledge, ours is the first study to explore the use of a multi-touch table with a physical robot agent. This baseline study explores the control of a single agent with a multi-touch table using an adapted, previously studied, joystick-based interface. We performed a detailed analysis of users' interaction styles with two complex functions of the multi-touch interface and isolated mismatches between user expectations and interaction functionality.
42 citations
•
30 Nov 1999
TL;DR: The paper provides an overview of transaction processing needs and solutions in conventional DBMSs as background, explains the constraints introduced by multilevel security, and describes the results of research in multileVEL secure transaction processing, which includes research results and limitations in concurrency control, multilesvel transaction management, and secure commit protocols.
Abstract: Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been receiving a great deal of attention from the security community. Transaction processing in these systems requires modification of conventional scheduling algorithms and commit protocols. These modifications are necessary because preserving the usual transaction properties when transactions are executing at different security levels often conflicts with the enforcement of the security policy. Considerable effort has been devoted to the development of efficient, secure algorithms for the major types of secure DBMS architectures: kernelized, replicated, and distributed. An additional problem that arises uniquely in multilevel secure DBMSs is that of secure, correct execution when data at multiple security levels must be written within one transaction. Significant progress has been made in a number of these areas, and a few of the techniques have been incorporated into commercial trusted DBMS products. However, there are many open problems remain to be explored. This paper reviews the achievements to date in transaction processing for multilevel secure DBMSs. The paper provides an overview of transaction processing needs and solutions in conventional DBMSs as background, explains the constraints introduced by multilevel security, and then describes the results of research in multilevel secure transaction processing. Research results and limitations in concurrency control, multilevel transaction management, and secure commit protocols are summarized. Finally, important new areas are identified for secure transaction processing research.
42 citations
•
30 Sep 1992TL;DR: An optical bypass switch for a fiber optic local area communications network (LAN) with a ring topology allows an optical signal carried on the ring to by pass a node, which includes terminal equipment and a stub cable associated with the switch as discussed by the authors.
Abstract: An optical bypass switch for a fiber optic local area communications network (LAN) with a ring topology allows an optical signal carried on the ring to by pass a node, which includes terminal equipment and a stub cable, associated with the switch. In a non-bypass mode, the optical signal is transmitted to and from the associated terminal. The switch assembly is remote from its associated terminal and includes optical couplers and associated optical receivers and activity detectors to produce electrical signals indicative of an optical input to and output from the terminal. Logic circuitry analyzes these signals and produces an appropriate drive signal for a switch controller. The remote switch has a local power supply and is preferably located at the junction of the ring and an associated, purely dielectric stub cable. The terminal can include a dual path transceiver and bridging equipment to provide cross links between terminals in the event of a link failure to complement the node failure protection of the bypass switch.
42 citations
••
TL;DR: Fuzzy SDT generally reduced the computed false alarm rate for both the human and machine conflict systems, partly because conflicts just outside the conflict criterion used in conventional SDT, were defined by fuzzy SDT as a signal worthy of some attention.
Abstract: This paper applies fuzzy SDT (signal detection theory) techniques, which combine fuzzy logic and conventional SDT, to empirical data. Two studies involving detection of aircraft conflicts in air traffic control (ATC) were analysed using both conventional and fuzzy SDT. Study 1 used data from a preliminary field evaluation of an automated conflict probe system, the User Request Evaluation Tool (URET). The second study used data from a laboratory controller-in-the-loop simulation of Free Flight conditions. Instead of assigning each potential conflict event as a signal (conflict) or non-signal, each event was defined as a signal (conflict) to some fuzzy degree between 0 and 1 by mapping distance into the range [0, 1]. Each event was also given a fuzzy membership, [0, 1], in the set ‘response’, based on the perceived probability of a conflict or on the colour-coded alert severity. Fuzzy SDT generally reduced the computed false alarm rate for both the human and machine conflict systems, partly because conflict...
42 citations
Authors
Showing all 4896 results
Name | H-index | Papers | Citations |
---|---|---|---|
Sushil Jajodia | 101 | 664 | 35556 |
Myles R. Allen | 82 | 295 | 32668 |
Barbara Liskov | 76 | 204 | 25026 |
Alfred D. Steinberg | 74 | 295 | 20974 |
Peter T. Cummings | 69 | 521 | 18942 |
Vincent H. Crespi | 63 | 287 | 20347 |
Michael J. Pazzani | 62 | 183 | 28036 |
David Goldhaber-Gordon | 58 | 192 | 15709 |
Yeshaiahu Fainman | 57 | 648 | 14661 |
Jonathan Anderson | 57 | 195 | 10349 |
Limsoon Wong | 55 | 367 | 13524 |
Chris Clifton | 54 | 160 | 11501 |
Paul Ward | 52 | 408 | 12400 |
Richard M. Fujimoto | 52 | 290 | 13584 |
Bhavani Thuraisingham | 52 | 563 | 10562 |