Learn More
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the proliferation of anonymous communication systems on the Internet has posed significant challenges to providing such traceback capability. In this paper, we develop a new class of flow(More)
Invited Paper We often encounter in distributed systems the need to model, access, and manage state. This state may be, for example, data in a purchase order, service level agreements representing resource availability, or the current load on a computer. We introduce two closely related approaches to modeling and manipulating state within a Web services(More)
The OASIS Web Services Notification (WSN) family of specifications defines a standard interoperable protocol through which Web services can disseminate events. We present here a summary of three WSN specification documents that are currently available: WS-Base Notification, WS-Topics, and WS-Brokered Notification. We conclude with a brief discussion on the(More)
Four approaches to the investigation of connections between language by hand and language by eye are described and illustrated with studies from a decade-long research program. In the first approach, multigroup structural equation modeling is applied to reading and writing measures given to typically developing writers to examine unidirectional and(More)
First and second graders who were good and poor handwriters completed three writing tasks: writing letters of alphabet in order from memory, letter copying in a passage, and composing on provided topics. A coding scheme was used to evaluate these dimensions of legibility: spacing between words and between letters within words, alignment (letter placement on(More)
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there is little systematic analysis of the Quality of Service (QoS) for such privacy preserving systems. In this paper, we initiate the effort to study the QoS of Tor, a popular and(More)
Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers' behaviors and design new defenses. A virtual honeypot can emulate multiple honeypots on one physical machine and provide great flexibility in representing one or more networks of machines. But when attackers recognize a(More)
This article presents research-based examples of effective instructional approaches for improving the quality of the content of stories and essays written by students with learning disabilities. We also describe recent research on handwriting and spelling (transcription skills) and show how instruction in these areas affects overall writing quality.(More)
Anonymity technologies such as mix networks have gained increasing attention as a way to provide communication privacy. Mix networks were developed for message-based applications such as e-mail, but researchers have adapted mix techniques to low-latency flow-based applications such as anonymous Web browsing. Although a significant effort has been directed(More)
This study examined the effectiveness of a highly explicit, teacher-directed instructional routine used to teach three planning strategies for writing to fourth and fifth graders with learning disabilities. In comparison to peers who received process writing instruction, children who were taught the three planning strategies-goal setting, brainstorming, and(More)