Search For:

Displaying 1-30 out of 30 total
Tool Contact Acceleration Feedback for Telerobotic Surgery
Found in: IEEE Transactions on Haptics
By William McMahan,Jamie Gewirtz,Dorsey Standish,Paul Martin,Jacquelyn A. Kunkel,Magalie Lilavois,Alexei Wedmid,David I. Lee,Katherine J. Kuchenbecker
Issue Date:July 2011
pp. 210-220
Minimally invasive telerobotic surgical systems enable surgeons to perform complicated procedures without large incisions. Unfortunately, these systems typically do not provide the surgeon with sensory feedback aside from stereoscopic vision. We have, thus...
 
Tracking Trash
Found in: IEEE Pervasive Computing
By Santi Phithakkitnukoon,Malima I. Wolf,Dietmar Offenhuber,David Lee,Assaf Biderman,Carlo Ratti
Issue Date:April 2013
pp. 38-48
Using active self-reporting tags, the authors followed 2,000 objects through Seattle's waste management system. By making the waste "removal chain" more transparent, they help reveal the disposal process of everyday objects, highlight...
 
Traceback Attacks in Cloud -- Pebbletrace Botnet
Found in: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)
By Wenjie Lin,David Lee
Issue Date:June 2012
pp. 417-426
Botmaster sets up Command and Control (C&C) server and stepping-stones in the Internet for stealing sensitive information from victim's machine. Clouds provide botmaster with an ideal environment of rich computing resources where he can easily depl...
 
Machine learning for implanted malicious code detection with incompletely specified system implementations
Found in: Network Protocols, IEEE International Conference on
By Yating Hsu,David Lee
Issue Date:October 2011
pp. 31-36
In 2009 UnrealIRCd 3.2.8.1, an IRC (Internet Relay Chat) server, was replaced by a version with a backdoor at its mirror sites. It was not detected until seven months later and it had caused irrevocable damages in IRC services. It is of vital importance an...
 
A Formal Methodology for Network Protocol Fingerprinting
Found in: IEEE Transactions on Parallel and Distributed Systems
By Guoqiang Shu,David Lee
Issue Date:November 2011
pp. 1813-1825
Network protocol fingerprinting refers to the process of identifying a protocol implementation by their input and output behaviors. It has been regarded as both a potential threat to network security and also as a useful mechanism for network management. E...
 
Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization
Found in: Network Protocols, IEEE International Conference on
By Yating Hsu, David Lee
Issue Date:October 2010
pp. 164-173
A major hurdle of formal analysis of protocol security properties is the well-known state explosion - a protocol system usually contains infinitely many or a formidable number of states. As a result, most of the analysis resorts to heuristics, such as stat...
 
Multi-HDCS: Solving DisCSPs with Complex Local Problems Cooperatively
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By David Lee, Inés Arana, Hatem Ahriz, Kit Hui
Issue Date:September 2010
pp. 295-302
We propose Multi-HDCS, a new hybrid approach for solving Distributed CSPs with complex local problems. In Multi-HDCS, each agent concurrently: (i) runs a centralised systematic search for its complex local problem; (ii) participates in a distributed local ...
 
Multi-Hyb: A Hybrid Algorithm for Solving DisCSPs with Complex Local Problems
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By David Lee, Inés Arana, Hatem Ahriz, Kit-Ying Hui
Issue Date:September 2009
pp. 379-382
A coarse-grained Distributed Constraint Satisfaction Problem (DisCSP) is a constraint problem where several agents, each responsible for solving one part (a complex local problem), cooperate to determine an overall solution. Thus, agents solve the overall ...
 
Network Court Protocol and Malicious Node Conviction
Found in: Network Protocols, IEEE International Conference on
By Na Li, David Lee
Issue Date:October 2007
pp. 336-337
A Network Court Protocol is designed for malicious node conviction based on information from network node accusing and testifying operations, which are formally modeled by algebraic operators. It is shown that the malicious node conviction is equivalent to...
 
Minutiae: A Formal Methodology for Accurate Protocol Fingerprinting
Found in: IEEE Workshop on Secure Network Protocols
By Guoqiang Shu, David Lee
Issue Date:October 2007
pp. 1-6
We study the new problem of network protocol fingerprinting, which has been recognized as both a threat to cyberspace privacy and a useful technique for intrusion detection. This paper provides the first taxonomy of fingerprint matching and discovery probl...
 
Hash Function Vulnerability Index and Hash Chain Attacks
Found in: IEEE Workshop on Secure Network Protocols
By David Lee
Issue Date:October 2007
pp. 1-6
A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it also poses threats to hash function one-way and collision-free properties. We investigate the complexity of breaking hash func...
 
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Found in: Distributed Computing Systems, International Conference on
By Guoqiang Shu, David Lee
Issue Date:June 2007
pp. 25
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as formal validation and black-box testing, are limited to checking the specification...
 
A Pragmatic Approach to Cooperative Communication
Found in: MILCOM
By David Lee, Keith Chugg
Issue Date:October 2006
pp. 1-7
Cooperative communication represents an effective way of introducing spatial diversity in wireless networks. Full performance gain of an ideal cooperative communication system requires the cooperating transmitters to form their signals such that the destin...
 
Dynamic Range Compression Using Hadamard Processing and Decorrelation Spreading
Found in: MILCOM
By David Lee, Randall Bahr
Issue Date:October 2006
pp. 1-6
We present an efficient usage of quantization bits applied to parallel input signals that are correlated each possessing average power varying over a large dynamic range. Our solution utilizes Hadamard-matrix processing (HMP) which consists of decorrelatio...
 
A Formal Approach for Passive Testing of Protocol Data Portions
Found in: Network Protocols, IEEE International Conference on
By David Lee, Dongluo Chen, Ruibing Hao, Raymond E. Miller, Jianping Wu, Xia Yin
Issue Date:November 2002
pp. 122
Passive testing is a process of detecting faults in a system under test by passively observing its input/output behaviors only without interrupting its normal operations, and proves to be a promising technique for network fault management. We study passive...
 
High Performance Communication Subsystem for Clustering Standard High-Volume Servers Using Gigabit Ethernet
Found in: High-Performance Computing in the Asia-Pacific Region, International Conference on
By Wenzhang Zhu, David Lee, Cho-Li Wang
Issue Date:May 2000
pp. 184
This paper presents an efficient communication subsystem, DP-II, for clustering standard high-volume (SHV) servers using Gigabit Ethernet. The DP-II employs several lightweight-messaging mechanisms to achieve low-latency and high-bandwidth communication. T...
 
An Automatic and Optimized Test Generation Technique Applying to TCP/IP Protocol
Found in: Automated Software Engineering, International Conference on
By Cédric Besse, Ana Cavalli, David Lee
Issue Date:October 1999
pp. 73
In this paper an automatic and optimized technique for test generation for communication protocol control and data portion is described; the goal is to minimize the number of tests with a guaranteed coverage. The test generation algorithm is applied to the...
 
Protocol Specification Using Parameterized Communicating Extended Finite Stte Machines - A Case Study of The ATM ABR Rate Control Scheme
Found in: Network Protocols, IEEE International Conference on
By David Lee, K. K. Ramakrishnan, W. Melody Moh, Udaya Shankar
Issue Date:November 1996
pp. 208
Formal specification is indispensable for computer-aided verification and testing of communication protocols. However, a large number of the practical protocols, including ATM, only has informal specifications, mostly in English, from which there are no ge...
 
Storing a dynamic sparse table
Found in: Foundations of Computer Science, Annual IEEE Symposium on
By Alfred V. Aho, David Lee
Issue Date:October 1986
pp. 55-60
We present a family of data structures that can process a sequence of insert, delete, and lookup instructions such that each lookup and deletion is done in constant worst-case time and each insertion is done in constant expected time. The amount of space u...
 
A distributed processing system for naval data communication networks
Found in: Managing Requirements Knowledge, International Workshop on
By Wesley W. Chu, Brandon Iffla, David Lee
Issue Date:June 1978
pp. 783
No summary available.
   
PhantomPen: virtualization of pen head for digital drawing free from pen occlusion & visual parallax
Found in: Proceedings of the 25th annual ACM symposium on User interface software and technology (UIST '12)
By David Lee, Joon Hyub Lee, KyoungHee Son, Seok-Hyung Bae
Issue Date:October 2012
pp. 331-340
We present PhantomPen, a direct pen input device whose pen head is virtualized onto the tablet display surface and visually connected to a graspable pen barrel in order to achieve digital drawing free from pen occlusion and visual parallax. As the pen barr...
     
Liveboard: a large interactive display supporting group meetings, presentations, and remote collaboration
Found in: Proceedings of the SIGCHI conference on Human factors in computing systems (CHI '92)
By Brent Welch, David Goldberg, David Lee, Elin Pedersen, Frank Halasz, John Tang, Ken Pier, Kim McCall, Rich Gold, Richard Bruce, Scott Elrod, William Janssen
Issue Date:May 1992
pp. 599-607
This paper describes the Liveboard, a large interactive display system. With nearly one million pixels and an accurate, multi-state, cordless pen, the Liveboard provides a basis for research on user interfaces for group meetings, presentations and remote c...
     
Efficient gateway synthesis from formal specifications
Found in: Proceedings of the conference on Communications architecture & protocols (SIGCOMM '91)
By Arun N. Netravali, David Lee, David M. Kristol, Krishan K. Sabnani
Issue Date:September 1991
pp. 406-415
The design of an inclusive session level protocol targeted at distributed applications on local networks is presented. The session protocol is motivated by the observation that application requirements, as well as network characteristics, for current and f...
     
Addressing colorectal cancer disparities: the identification of geographic targets for screening interventions in Miami-Dade County, Florida
Found in: Proceedings of the First ACM SIGSPATIAL International Workshop on Use of GIS in Public Health (HealthGIS '12)
By David Lee, Kevin Henry, Recinda Sherman
Issue Date:November 2012
pp. 19-26
This paper describes an analysis of spatial clustering of colorectal cancer (CRC) in Miami-Dade County, Florida. The objective was to identify geographically based targets for colorectal cancer screening interventions for Blacks and Hispanic Whites, two gr...
     
Putting the informal on the map: tools for participatory waste management
Found in: Proceedings of the 12th Participatory Design Conference: Exploratory Papers, Workshop Descriptions, Industry Cases - Volume 2 (PDC '12)
By David Lee, Dietmar Offenhuber
Issue Date:August 2012
pp. 13-16
Informal urban infrastructures are a challenging environment for participatory design, both from an organizational and technical perspective. In this paper we reflect on a recent research project involving participatory sensing and design of participatory ...
     
Cultural differences affecting quality and productivity in Western/Asian offshore software development
Found in: Proceedings of the 3rd International Conference on Human Computer Interaction (IndiaHCI '11)
By Andy Smith, David Lee, Mike Mortimer
Issue Date:April 2011
pp. 29-39
In this paper we present the results of a survey of Western and Asian software developers focusing on cultural differences in approaches to quality and productivity. It details significant differences in approaches to both quality and productivity. In disc...
     
Montage: a platform for physically navigating multiple pages of web content
Found in: Proceedings of the 27th international conference extended abstracts on Human factors in computing systems (CHI EA '09)
By Ben Congleton, David Lee, Erik C. Hofer, Mark S. Ackerman, Mark W. Newman, Sean A. Munson, Thomas A. Finholt
Issue Date:April 2009
pp. 1-4
Montage is a platform for rendering multiple pages of web content on large tiled displays (several desktop LCDs arranged in a spatially contiguous matrix). We discuss the advantages of data visualization using a newsstand metaphor, showing many content ite...
     
The art of designing robot faces: dimensions for human-robot interaction
Found in: Proceeding of the 1st ACM SIGCHI/SIGART conference on Human-robot interaction (HRI '06)
By Andrew Appleby, Chrystopher L. Nehaniv, David Lee, Kerstin Dautenhahn, Mike Blow
Issue Date:March 2006
pp. 331-332
As robots enter everyday life and start to interact with ordinary people [5]the question of their appearance becomes increasingly important. A user's perception of a robot can be strongly influenced by its facial appearance [6]. The dimensions and issues o...
     
Online minimization of transition systems (extended abstract)
Found in: Proceedings of the twenty-fourth annual ACM symposium on Theory of computing (STOC '92)
By David Lee
Issue Date:May 1992
pp. 264-274
We are given a transition system implicitly through a compact representation and wish to perform simultaneously reachability analysis and minimization without constructing first the whole system graph. We present an algorithm for this problem that applies ...
     
Testing finite state machines
Found in: Proceedings of the twenty-third annual ACM symposium on Theory of computing (STOC '91)
By David Lee, Mihalis Yannakakis
Issue Date:May 1991
pp. 476-485
View an n-vertex, m-edge undirected graph as an electrical network with unit resistors as edges. We extend known relations between random walks and electrical networks by showing that resistance in this network is intimately connected with the lengths of r...
     
 1