scispace - formally typeset
Search or ask a question
Institution

Mitre Corporation

CompanyBedford, Massachusetts, United States
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.


Papers
More filters
Journal ArticleDOI
TL;DR: The primary goal of the MITRE compartmented mode workstation (CMW) project was to articulate the security requirements that workstations must meet to process highly classified intelligence data, and a prototype was implemented which demonstrated that workStations could meet the requirements in an operationally useful manner while still remaining binary compatible with off-the-shelf software.
Abstract: The primary goal of the MITRE compartmented mode workstation (CMW) project was to articulate the security requirements that workstations must meet to process highly classified intelligence data As a basis for the validity of the requirements developed, a prototype was implemented which demonstrated that workstations could meet the requirements in an operationally useful manner while still remaining binary compatible with off-the-shelf software The security requirements not only addressed traditional security concerns but also introduced concepts in areas such as labeling and the use of a trusted window management system The CMW labeling paradigm is based on associating two types of security labels with objects: sensitivity levels and information labels Sensitivity levels describe the levels at which objects must be protected Information labels are used to prevent data overclassification and also provide a mechanism for associating with data those markings that are required for accurate data labeling, but which play no role in access control decisions The use of a trusted window manager allows users to easily operate at multiple sensitivity levels and provides a convenient mechanism for communicating security information to users in a relatively unobtrusive manner >

58 citations

Journal ArticleDOI
TL;DR: In this article, the authors provide a comprehensive tutorial on the receiving and scattering properties of antennas, in conjunction with circuit calculations and numerical simulations that illustrate the fundamental concepts of how antennas behave as both receivers and scatterers of electromagnetic fields and power.
Abstract: A tutorial discussion on the receiving and scattering properties of antennas is presented. The objective of this work is to provide a comprehensive tutorial overview of the subject, in conjunction with circuit calculations and numerical simulations that illustrate the fundamental concepts of how antennas behave as both receivers and scatterers of electromagnetic fields and power. The paper begins with a discussion of the basic concepts associated with antenna impedance, as these are fundamental to understanding the antenna's receiving and scattering properties, particularly over a wide range of frequencies, where the circuit properties of the antenna differ. The definitions of aperture efficiency, absorption efficiency, and the validity of using either a Thevenin or Norton equivalent circuit to determine both received and total scattered power are discussed. Circuit circulations and numerical simulations, determining both total received and scattered powers, are presented for a number of antennas, including a straight-wide dipole, a circular loop, a reflector-backed dipole, and a Yagi antenna. We show that Thevenin and Norton equivalent circuits have limited validity when used to determine the total power scattered by a basic antenna element such as the dipole and loop. For the general antenna, these equivalent circuit models are not valid for determining the total scattered power.

58 citations

Proceedings ArticleDOI
Fatma Dandashi1
11 Mar 2002
TL;DR: A method for judging the reusability of C++ code components and for assessing indirect quality attributes from the direct attributes measured by an automated tool was demonstrated, providing empirical evidence that the two sets of quality attributes, direct and indirect, do correlate.
Abstract: A method for judging the reusability of C++ code components and for assessing indirect quality attributes from the direct attributes measured by an automated tool was demonstrated. The method consisted of two phases. The first phase identified and analytically validated a set of measurements for assessing direct quality attributes based on measurement theory. An automated tool was used to compute actual measures for a repository of C++ classes. A taxonomy relating reuse, indirect quality attributes, and measurements identified and validated during the first part of this research was defined. The second phase consisted of identifying and validating a set of measurements for assessing indirect quality attributes. A case study of the feasibility of applying direct measurements to assess the indirect quality attributes was conducted. The comparison and analysis of indirect quality attributes measured by human analysis with direct quality attributes measured by the automated tool provided empirical evidence that the two sets of quality attributes, direct and indirect, do correlate.

58 citations

Journal ArticleDOI
TL;DR: In this paper, the effects of network topologies in the propagation of evasive behavior have been investigated and it was shown that tax evaders are more likely to declare all their income in networks with higher levels of centrality across the agents, especially when faced with large penalties proportional to their incomes.

58 citations

Journal ArticleDOI
TL;DR: How use of a user model containing plans makes interfaces more intelligent and interactive (by providing an intelligent assistant that supports such tasks as advice generation, task completion, context-sensitive responses, error detection and recovery) is clarified.
Abstract: Plan recognition is an active research area in automatic reasoning, as well as a promising approach to engineering interfaces that can exploit models of user's plans and goals. Much research in the field has focused on the development of plan recognition algorithms to support particular user/system interactions, such as found in naturally occurring dialogues. However, two questions have typically remained unexamined: 1) exactly what kind of interface tasks can knowledge of a user's plans be used to support across communication modalities, and 2) how can such tasks in turn constrain development of plan recognition algorithms? In this paper we present a concrete exploration of these issues. In particular, we provide an assessment of plan recognition, with respect to the use of plan recognition in enhancing user interfaces. We clarify how use of a user model containing plans makes interfaces more intelligent and interactive (by providing an intelligent assistant that supports such tasks as advice generation, task completion, context-sensitive responses, error detection and recovery). We then show how interface tasks in turn provide constraints that must be satisfied in order for any plan recognizer to construct and represent a plan in ways that efficiently support these tasks. Finally, we survey how interfaces are fundamentally limited by current plan recognition approaches, and use these limitations to identify and motivate current research. Our research is developed in the context of CHECS, a plan-based design interface.

58 citations


Authors

Showing all 4896 results

NameH-indexPapersCitations
Sushil Jajodia10166435556
Myles R. Allen8229532668
Barbara Liskov7620425026
Alfred D. Steinberg7429520974
Peter T. Cummings6952118942
Vincent H. Crespi6328720347
Michael J. Pazzani6218328036
David Goldhaber-Gordon5819215709
Yeshaiahu Fainman5764814661
Jonathan Anderson5719510349
Limsoon Wong5536713524
Chris Clifton5416011501
Paul Ward5240812400
Richard M. Fujimoto5229013584
Bhavani Thuraisingham5256310562
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

83% related

Hewlett-Packard
59.8K papers, 1.4M citations

83% related

Carnegie Mellon University
104.3K papers, 5.9M citations

83% related

George Mason University
39.9K papers, 1.3M citations

83% related

Georgia Institute of Technology
119K papers, 4.6M citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20234
202210
202195
2020139
2019145
2018132