Kyle Foerster

Learn More
Using passwords to verify a user's identity is the most widely deployed method for electronic authentication. When system administrators need to recover lost passwords or test accounts for easily guessable passwords, it can require millions of hash function and string comparison operations. These operations can be computationally expensive but are easily(More)
A terrain avoidance extension based primarily on the requirements of Terrain Awareness and Warning Systems (TAWS) using US Geological Survey data was recently integrated into an autonomous airborne sense and avoid system (ABSAA) at the University of North Dakota’s Unmanned Aircraft Systems Engineering team (UASE). Given the native capabilities of a system(More)
  • 1