Stephen W. Neville

Learn More
In computing clouds, it is desirable to avoid wasting resources as a result of under-utilization and to avoid lengthy response times as a result of over-utilization. In this paper, we propose a new approach for dynamic autonomous resource management in computing clouds. The main contribution of this work is two-fold. First, we adopt a distributed(More)
It has been shown that the radio channel impulse response for a pair of legitimate Ultra-wide band (UWB) transceivers can be used to generate secret keys for secure communications. Past proposed secret key generation algorithms under-exploited the available number of secret key bits from the radio channel. This paper proposes a new efficient method for(More)
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third parties are not be able to accurately estimate the state of the common channels. These properties allow generation of secret keys to support secure communications from UWB(More)
The wide-scale adoption of smart phones has begun to provide a pragmatic real-world deployment environments for mobile ad hoc networks, (i.e., as peer-to-peer game platforms, for emergency services, etc.). Such deployments are likely to occur with urban cores where device densities would easily exceed those that have traditionally been studied. Moreover,(More)
Supervisory Committee Dr. Issa Traore Supervisor Dr. Kin Fun Li Departmental Member Dr. Stephen W. Neville Departmental Member Weber-Jahnke, J.H. Outside Member Dr. John Mullins Additional Member Due to the dramatic increase in intrusion activities, the definition and evaluation of software security requirements have become important aspects of the(More)
Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB allows high levels of mutual information to be obtained by a given A and B through independent characterizations of their shared communication channel. This mutual information(More)
Wireless secret key generation (WKG) methods based on communications channel characterizations have gained significant interest as a mechanism for providing secure point-to-point communications. Ultra-wide band (UWB) WKG solutions provide an advantage over narrow- and wide-band approaches in that they can generate secure keys even when Alice and Bob, the(More)
Sentiment analysis of the text data available on the web either in the form of blogs or at social media sites such as Twitter, Facebook, and LinkedIn, offers information through which to assess people's perspective of products and services that are of interest to them. Consumers routinely scour the Internet to assess other user's reviews for a product or a(More)
Despite defensive advances, malicious software (malware) remains an ever present cyber-security threat. Cloud environments are far from malware immune, in that: i) they innately support the execution of remotely supplied code, and ii) escaping their virtual machine (VM) confines has proven relatively easy to achieve in practice. The growing interest in(More)
Simulation has become one of the dominant tools in wired and wireless network research. With the advent of cloud, grid, and cluster computing it has become feasible to use parallelization to perform richer larger-scale simulations. Moreover, the computing resources needed to perform statistically rigorous simulations are now easily obtainable. Although a(More)