Christopher J. Kenna

Learn More
—The last few years have witnessed a growing consensus around the notion that many papers discussing wireless network simulation are plagued by issues that weaken their scientific value. A number of articles have shown evidence of this crisis of credibility and identified many of its causes. In this paper, we show that the methodology flaws in wireless(More)
In safety-critical cyber-physical systems, the usage of mul-ticore platforms has been hampered by problems due to interactions across cores through shared hardware. The inability to precisely characterize such interactions can lead to worst-case execution time pessimism that is so great, the extra processing capacity of additional cores is entirely negated.(More)
Mixed-criticality scheduling algorithms, which attempt to reclaim system capacity lost to worst-case execution time pessimism , seem to hold great promise for multicore real-time systems, where such loss is particularly severe. However, the unique nature of these algorithms gives rise to a number of major challenges for the would-be implementer. This paper(More)
The evolution of multicore platforms has led to much recent work on multiprocessor scheduling techniques for soft real-time workloads. However, end users routinely run such work-loads atop general-purpose operating systems with seemingly good results, albeit typically on over-provisioned systems. This raises the question: when, if ever, is the use of an(More)
In safety-critical cyber-physical systems, the usage of mul-ticore platforms has been hampered by problems due to interactions across cores through shared hardware. The inability to precisely characterize such interactions can lead to worst-case execution time pessimism that is so great, the extra processing capacity of additional cores is entirely negated.(More)
We explain botnets and the motivation of attackers utilizing botnets with a focus on SSH brute force attacks. To analyze their behavior, we perform a case study of 71 computers at a small computer science department at a public university in the United States over a period of four months. We first justify that a subset of the hosts appearing in the attack(More)
  • 1