scispace - formally typeset
Search or ask a question
Institution

Mitre Corporation

CompanyBedford, Massachusetts, United States
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.


Papers
More filters
Book ChapterDOI
01 Jan 1998
TL;DR: This work describes a new method that was both simple and surprisingly successful: data dictionary and catalog information was dumped to unformatted text; then off-the-shelf information retrieval software estimated string similarity, generated candidate matches, and provided the interface.
Abstract: Determining attribute correspondences is a difficult, time-consuming, knowledge-intensive part of database integration. We report on experiences with tools that identified candidate correspondences, as a step in a large scale effort to improve communication among Air Force systems. First, we describe a new method that was both simple and surprisingly successful: Data dictionary and catalog information were dumped to unformatted text; then off-the-shelf information retrieval software estimated string similarity, generated candidate matches, and provided the interface. The second method used a different set of clues, such as statistics on database populations, to compute separate similarity metrics (using neural network techniques). We report on substantial use of the first tool, and then report some limited initial experiments that examine the two techniques’ accuracy, consistency and complementarity.

92 citations

Journal ArticleDOI
TL;DR: Models for projecting software defects from analyses of Ada designs are described, motivated by the need for technology to analyze designs for their likely effect on software quality.
Abstract: Models for projecting software defects from analyses of Ada designs are described. The research is motivated by the need for technology to analyze designs for their likely effect on software quality. The models predict defect density based on product and process characteristics. Product characteristics are extracted from a static analysis of Ada subsystems, focusing on context coupling, visibility, and the import-export of declarations. Process characteristics provide for effects of reuse level and extent of changes. Multivariate regression analyses were conducted with empirical data from industry/government-developed projects: 16 Ada subsystems totaling 149000 source lines of code. The resulting models explain 63-74% of the variation in defect density of the subsystems. Context coupling emerged as a consistently significant variable in the models. >

92 citations

Proceedings ArticleDOI
04 May 1992
TL;DR: A denial-of-service protection base (DPB) is characterized as a resource monitor closely related to a TCB, supporting a waiting-time policy for benign processes.
Abstract: A denial-of-service protection base (DPB) is characterized as a resource monitor closely related to a TCB, supporting a waiting-time policy for benign processes. Resource monitor algorithms and policies can be stated in the context of a state-transition model of a resource allocation system. Probabilistic waiting-time policies are suggested in addition to the finite- and maximum-waiting-time policies. The model supports concurrency, multiprocessing and networking. A simple example of a DPB is given, as a feasibility and consistency check on the definitions. >

92 citations

Proceedings ArticleDOI
06 Oct 2014
TL;DR: An overview of the resources of the NCR is provided which may be especially helpful for DoD PMs to find the best approach for testing the cyberspace resiliency of their systems under development.
Abstract: The National Cyber Range (NCR) is an innovative Department of Defense (DoD) resource originally established by the Defense Advanced Research Projects Agency (DARPA) and now under the purview of the Test Resource Management Center (TRMC). It provides a unique environment for cyber security testing throughout the program development life cycle using unique methods to assess resiliency to advanced cyberspace security threats. This paper describes what a cyber security range is, how it might be employed, and the advantages a program manager (PM) can gain in applying the results of range events. Creating realism in a test environment isolated from the operational environment is a special challenge in cyberspace. Representing the scale and diversity of the complex DoD communications networks at a fidelity detailed enough to realistically portray current and anticipated attack strategies (e.g., Malware, distributed denial of service attacks, cross-site scripting) is complex. The NCR addresses this challenge by representing an Internet-like environment by employing a multitude of virtual machines and physical hardware augmented with traffic emulation, port/protocol/service vulnerability scanning, and data capture tools. Coupled with a structured test methodology, the PM can efficiently and effectively engage with the Range to gain cyberspace resiliency insights. The NCR capability, when applied, allows the DoD to incorporate cyber security early to avoid high cost integration at the end of the development life cycle. This paper provides an overview of the resources of the NCR which may be especially helpful for DoD PMs to find the best approach for testing the cyberspace resiliency of their systems under development.

92 citations

Patent
25 Aug 2004
TL;DR: In this paper, a Broadcast News Editor and Broadcast News Navigator system analyzes, select, condense, and then present news summaries, which enables not only viewing a hierarchical table of contents of the news, but also summaries tailored to individual needs.
Abstract: A technique for automated analysis of multimedia, such as, for example, a news broadcast. A Broadcast News Editor and Broadcast News Navigator system analyze, select, condense, and then present news summaries. The system enables not only viewing a hierarchical table of contents of the news, but also summaries tailored to individual needs. This is accomplished through story segmentation and proper name extraction which enables the use of common information retrieval methodologies, such as Web browsers. Robust segmentation processing is provided using multistream analysis on imagery, audio, and closed captioned stream cue events according to a finite state model indicative of the presentation class.

92 citations


Authors

Showing all 4896 results

NameH-indexPapersCitations
Sushil Jajodia10166435556
Myles R. Allen8229532668
Barbara Liskov7620425026
Alfred D. Steinberg7429520974
Peter T. Cummings6952118942
Vincent H. Crespi6328720347
Michael J. Pazzani6218328036
David Goldhaber-Gordon5819215709
Yeshaiahu Fainman5764814661
Jonathan Anderson5719510349
Limsoon Wong5536713524
Chris Clifton5416011501
Paul Ward5240812400
Richard M. Fujimoto5229013584
Bhavani Thuraisingham5256310562
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

83% related

Hewlett-Packard
59.8K papers, 1.4M citations

83% related

Carnegie Mellon University
104.3K papers, 5.9M citations

83% related

George Mason University
39.9K papers, 1.3M citations

83% related

Georgia Institute of Technology
119K papers, 4.6M citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20234
202210
202195
2020139
2019145
2018132