- Full text PDF available (10)
The Extensible Architecture for the Analysis and Generation of Linked Simulations (EAAGLES) software is a framework for the design of robust, scalable, virtual, constructive, stand-alone, and distributed simulation applications. Its design integrates concepts from both virtual and constructive simulations to achieve an optimal blend of both. The Simulation… (More)
This paper analyzes two existing methods for securing Git repositories, Git-encrypt and Git-crypt, by comparing their performance relative to the default Git implementation. Securing a Git repository is necessary when the repository contains sensitive or restricted data. This allows the repository to be stored on any third-party cloud provider with… (More)
Quantum key distribution (QKD) exploits the laws of quantum physics to generate shared secret cryptographic keys and can detect eavesdroppers during the key generation process. However, previous QKD research has focused more on theory than practice.
Data quality challenges in distributed live-virtual-constructive test environments.
Since the 1980s, researchers have designed a variety of robot control architectures intending to imbue robots with some degree of autonomy. A recently developed architecture, the Unified Behavior Framework (UBF), implements a variation of the three-layer architecture with a reactive controller to rapidly make behavior decisions. Additionally, the UBF… (More)
— Quantum Key Distribution (QKD) is a next-generation security technology that exploits the properties of quantum mechanics to enable two parties to generate an unconditionally secure shared secret key. QKD is novel because its security is based upon the fundamental laws of quantum mechanics and not on computational complexity. QKD systems are composed of… (More)
—QKD is an innovative technology which exploits the laws of quantum mechanics to generate and distribute unconditionally secure cryptographic keys. While QKD offers the promise of unconditionally secure key distribution, real world systems are built from non-ideal components which necessitates the need to model and understand the impact these non-idealities… (More)