Douglas C. Sicker

Learn More
To date, there has yet to be a study that characterizes the usage of a real deployed anonymity service. We present observations and analysis obtained by participating in the Tor network. Our primary goals are to better understand Tor as it is deployed and through this understanding, propose improvements. In particular, we are interested in answering the(More)
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity is due in part to its perceived strong anonymity properties and its relatively low latency service. Low latency is achieved through Torâ s ability to balance the traffic load by optimizing Tor router selection to probabilistically favor routers with(More)
Network protocol designers, both at the physical and network level, have long considered interference and simultaneous transmission in wireless protocols as a problem to be avoided. This, coupled with a tendency to emulate wired network protocols in the wireless domain, has led to artificial limitations in wireless networks. In this paper, we argue that(More)
Deployments of wireless LANs consisting of hundreds of 802.11 access points with a large number of users have been reported in enterprises as well as college campuses. However, due to the unreliable nature of wireless links, users frequently encounter degraded performance and lack of coverage. This problem is even worse in unplanned networks, such as the(More)
Functionalized compounds, which are difficult to produce by classical chemical synthesis, are of special interest as biotechnologically available targets. They represent useful building blocks for subsequent organic syntheses, wherein they can undergo stereoselective or regioselective reactions. “White Biotechnology” (as defined by the European Chemical(More)
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Attorney at the U.S. Department of Justice), in which it was pointed out that some of the network measurements that the computer scientists were thinking of making might potentially(More)
Overlay mix-networks are widely used to provide lowlatency anonymous communication services. It is generally accepted that, if an adversary can compromise the endpoints of a path through an anonymous mix-network, then it is possible to ascertain the identities of a requesting client and the responding server. However, theoretical analyses of anonymous(More)
In this paper we provide a thorough and up to date survey of path loss prediction methods, spanning more than 60 years of fairly continuous research. These methods take a variety of approaches to modeling the signal attenuation between wireless transceivers: purely theoretical models, empirically fitted (often statistical) models, deterministic ray-optical(More)
In this paper we present results from the first application of robust geostatistical modeling techniques to radio environment and coverage mapping of wireless networks. We perform our analysis of these methods with a case study mapping the coverage of a 2.5 GHz WiMax network at the University of Colorado, Boulder. Drawing from our experiences, we propose(More)
Recent developments in computer technology have enabled radio developers to accomplish in software what traditionally was performed with application-specific integrated circuits. A radio that has the core of its functionality implemented in software is called a software-defined radio. When an SDR has the capability to sense, reason, and dynamically adapt to(More)