Learn More
In this paper, we present an approach to detecting novel cyber attacks though a form of program diversification, similar to the use of n-version programming for fault tolerant systems. Building on extensive previous and ongoing work by others on the use of code clones in a wide variety of areas, our Functionally Equivalent Variants using Information(More)
In this paper we present the features of a new physical device prototyping platform called Microsoft .NET Gadgeteer along with our initial experiences using it to teach computer science in high schools. Gadgeteer makes it easy for newcomers to electronics and computing to plug together modules with varied functionality and to program the resulting system's(More)
Time series data has been exploited for use with Case Based Reasoning (CBR) in many applications. We present a novel application of CBR that combines intelligent tutoring using Augmented Reality (AR) and prediction. The MonitAR system, presented in this paper, is intended for use as an intelligent guidance system for astronauts conducting complex procedures(More)
Vacuum circuit breakers are commonly applied to the primary circuit to switch Ladle Melt Furnaces (LMF) transformers in melt shop applications which support rolling mill operations. Because of the well documented phenomenon of switching transients induced on the line of the furnace transformer due to the opening and closing of the vacuum circuit breaker(More)
Vacuum Circuit Breakers (VCBs) are commonly applied to the primary circuit to switch ladle melt furnace (LMF) transformers in melt shop applications that support rolling mill operations. Because of the well-documented phenomenon of switching transients induced on the line of the furnace transformer due to the opening and closing of the VCB, most LMFs in(More)
  • 1