Robert Grant

Learn More
Hydra is a flexible wireless network testbed being developed at UT Austin. Our focus is networks that support multiple wireless hops and where the network, especially the MAC, takes advantage of sophisticated PHY techniques, such as OFDM and MIMO. We argue that for this domain simulation alone is not adequate and that working prototypes are needed to(More)
Wonsoo Kim, Owais Khan, Kien T. Truong, Soon-Hyeok Choi, Robert Grant, Hyrum K. Wright, Ketan Mandke, Robert C. Daniels, Robert W. Heath, Jr., Scott M. Nettles Wireless Networking and Communications Group (WNCG) Department of Electrical and Computer Engineering The University of Texas at Austin 1 University Station C0803, Austin, TX 78712-0240 Email: {wkim,(More)
Transport Layer Security (TLS) and its precursor Secure Sockets Layer (SSL) are the most widely deployed protocol to establish secure communication over insecure Internet Protocol (IP) networks. Providing a secure session layer on top of TCP, TLS is frequently the first defense layer encountered by adversaries who try to cause loss of confidentiality by(More)
Background: Software agents are becoming increasingly common in the engineering of software systems. We explore the use of humans in creating benchmarks for the evaluation of software agents. In our case studies, we address the domain of instructable software agents (e-students) as proposed by the Bootstrapped Learning project [Oblinger, 2006]. Aim: Our aim(More)
INTRODUCTION A family history of appendicitis has been reported to increase the likelihood of the diagnosis in children and in a retrospective study of adults. We compare positive family history with the diagnosis of acute appendicitis in a prospective sample of adults. METHODS We conducted a prospective observational study of a convenience sample of 428(More)
An increasing number of military systems are being developed using service orientation. Some of the features that make service orientation appealing, like loose coupling, dynamism and composition-oriented system construction, make securing service-based systems more complicated. We have been developing technologies for Advanced Protected Services (APS) to(More)
The Bootstrapped Learning (BL) project is an attempt to create software agents (e-students) that are instructable by human teachers through natural instruction methods [Oblinger, 2006]. In this paper, we present an introduction to BL and three years of case studies investigating the use of human subjects in evaluating e-students. In our studies we(More)
Mobile devices performing mission-critical functions at the tactical edge, such as those employed by first responders, military personnel, and law enforcement, operate in environments that are vastly different from enterprise computing environments. In spite of the differences in resource availability, threat models, vulnerabilities, information formats,(More)