scispace - formally typeset
Search or ask a question
Institution

Mitre Corporation

CompanyBedford, Massachusetts, United States
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.


Papers
More filters
Proceedings ArticleDOI
20 Nov 2000
TL;DR: An approach to supporting quality-of-service (QoS) in a dynamic network environment by implementing a new protocol called dynamic RSVP (dRSVP), which is an extension to RSVP.
Abstract: This paper presents an approach to supporting Quality of Service (QoS) in a dynamic network environment. With this approach, resource reservations represent ranges, and applications adapt to an allocated level of QoS provided by the network at some point within the requested range. To explore this approach, we have implemented a new protocol called dynamic RSVP (dRSVP), which is an extension to RSVP.

86 citations

Posted Content
TL;DR: An overview of the experimental techniques, measurement modalities, and diverse applications of the Quantum Diamond Microscope (QDM) can be found in this article, which employs a dense layer of fluorescent nitrogen-vacancy (NV) color centers near the surface of a transparent diamond chip on which a sample of interest is placed.
Abstract: We provide an overview of the experimental techniques, measurement modalities, and diverse applications of the Quantum Diamond Microscope (QDM). The QDM employs a dense layer of fluorescent nitrogen-vacancy (NV) color centers near the surface of a transparent diamond chip on which a sample of interest is placed. NV electronic spins are coherently probed with microwaves and optically initialized and read out to provide spatially resolved maps of local magnetic fields. NV fluorescence is measured simultaneously across the diamond surface, resulting in a wide-field, two-dimensional magnetic field image with adjustable spatial pixel size set by the parameters of the imaging system. NV measurement protocols are tailored for imaging of broadband and narrowband fields, from DC to GHz frequencies. Here we summarize the physical principles common to diverse implementations of the QDM and review example applications of the technology in geoscience, biology, and materials science.

86 citations

Journal ArticleDOI
TL;DR: This work describes the observation and logging processes and presents an overview of the results of the long-term observations of a number of users of one desktop application, and presents the method of providing individualized instruction to each user by employing a newkind of user model and a new kind of expert model.
Abstract: Information technology has recently become the medium in which much professional office work is performed. This change offers an unprecedented opportunity to observe and record exactly how that work is performed. We describe our observation and logging processes and present an overview of the results of our long-term observations of a number of users of one desktop application. We then present our method of providing individualized instruction to each user by employing a new kind of user model and a new kind of expert model. The user model is based on observing the individual's behavior in a natural environment, while the expert model is based on pooling the knowledge of numerous individuals. Individualized instructional topics are selected by comparing an individual's knowledge to the pooled knowledge of her peers.

85 citations

Journal ArticleDOI
TL;DR: A general method of constructing a drive workload representative of a real workload is described, in which a synthetic program in which the characteristics can be varied by varying the appropriate parameters is used.
Abstract: A general method of constructing a drive workload representative of a real workload is described. The real workload is characterized by its demands on the various system resources. These characteristics of the real workload are obtained from the system accounting data. The characteristics of the drive workload are determined by matching the joint probability density of the real workload with that of the drive workload. The drive workload is realized by using a synthetic program in which the characteristics can be varied by varying the appropriate parameters. Calibration experiments are conducted to determine expressions relating the synthetic program parameters with the workload characteristics. The general method is applied to the case of two variables, cpu seconds and number of I/O activities; and a synthetic workload with 88 jobs is constructed to represent a month's workload consisting of about 6000 jobs.

85 citations

Patent
21 Mar 1979
TL;DR: In this paper, the contention listen-while-talk (LWT) protocol is used for unslotted radio frequency multiple access (RFMA) communications with a plurality of remote terminals coupled to a communications bus.
Abstract: OF THE DISCLOSURE An unslotted radio frequency multiple access bus communications system employing a contention listen-while-talk (LWT) protocol. The system includes a plurality of remotely located terminals coupled to a communications bus. The bus includes a pair of oppositely directed, unidirectional signal paths which are connected at one end so that one path is an inbound path to that end and the second is an outbound path from that end. Each of the remote terminals includes a bus interface unit (BIU) coupled to both the inbound and outbound paths at the remote location. Each BIU is adapted to transmit and receive modulated carrier signals on the inbound and outbound paths, respectively. When a terminal wishes to send a message to another terminal, the terminal's BIU initially performs an rf carrier sensing operation to make an initial determination as to whether or not any other subscriber is transmitting on the inbound path. In the event no carrier is detected, the BIU confirms this determination by first beginning to transmit a message packet modulated on a carrier signal and addressed to the desired receiving terminal on the inbound path, and then monitoring the outbound path during a collision window. If the transmitted message is received intact by the transmitting terminal within this collision window, the transmitting terminal's BIU determines that no collision has taken place between its message and a message sent by another terminal or noise, and that the transmitting terminal has gained access to the bus Thereafter, the BIU may transmit any remaining portion of its message packet on the inbound path However, in the event a collision is detected, the transmitting terminal's BIU aborts its transmission and then backs off for a random time period before again attempting to gain access to the bus and transmit its message.

85 citations


Authors

Showing all 4896 results

NameH-indexPapersCitations
Sushil Jajodia10166435556
Myles R. Allen8229532668
Barbara Liskov7620425026
Alfred D. Steinberg7429520974
Peter T. Cummings6952118942
Vincent H. Crespi6328720347
Michael J. Pazzani6218328036
David Goldhaber-Gordon5819215709
Yeshaiahu Fainman5764814661
Jonathan Anderson5719510349
Limsoon Wong5536713524
Chris Clifton5416011501
Paul Ward5240812400
Richard M. Fujimoto5229013584
Bhavani Thuraisingham5256310562
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

83% related

Hewlett-Packard
59.8K papers, 1.4M citations

83% related

Carnegie Mellon University
104.3K papers, 5.9M citations

83% related

George Mason University
39.9K papers, 1.3M citations

83% related

Georgia Institute of Technology
119K papers, 4.6M citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20234
202210
202195
2020139
2019145
2018132