05.12.2012 Views

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

source code before the program run. The exhaustively detection is the detection of, not only the source code position where<br />

a Buffer-overflow emerges, but also the essential source code structure makes the Buffer-overflow vulnerability.<br />

Author<br />

Detection; Source Programs; Vulnerability<br />

20060002094 Yaskawa Information Systems Corp., Japan<br />

Log Management System Based on Distributed Database Using P2P Network<br />

Kamio, Masakazu; Ishida, Tsunetake; Hakoda, Takahisa; Journal of the National Institute of Information <strong>and</strong> Communications<br />

Technology. Special Issue on Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 53-63; In English; See also<br />

20060002073; Copyright; Avail.: Other Sources<br />

It is necessary to investigate the phenomena in order to perform the countermeasures to illegal access on computer<br />

network, <strong>and</strong> it is aimed against the logs from network nodes. Now these investigations <strong>and</strong> analysis greatly depend on<br />

network administrators with advanced technology. But the number of the nodes is increasing along with the computer network<br />

expansion, <strong>and</strong> the investigations are becoming more difficult. So we are researching <strong>and</strong> developing the log management<br />

system based on the distributed database, which enables efficient log management <strong>and</strong> analysis under the large-scale network<br />

environment.<br />

Author<br />

Computer Networks; Management Analysis; Network Analysis; Countermeasures; Management Systems<br />

20060002095 NTT Advanced Technology Corp., Tokyo, Japan<br />

The Mathematics Models <strong>and</strong> an Actual Proof Experiment for IP Traceback System<br />

Suzuki, Ayako; Matsushima, Ryu; Ohmuro, Manabu; Nishiyama, Shigeru; Ohmori, Keisuke; Kawabata, Mariko; Kai,<br />

Toshifumi; Journal of the National Institute of Information <strong>and</strong> Communications Technology. Special Issue on Information<br />

Security, Volume 52, Nos. 1/2; March/June 2005, pp. 65-74; In English; See also 20060002073; Copyright; Avail.: Other<br />

Sources<br />

IP traceback is a technique that searches DDoS attackers. There are many kinds of IP traceback methods. The performance<br />

of IP traceback system can mainly evaluate using a race time <strong>and</strong> the error rate of the trace result. In this paper, we propose<br />

mathematical models of typical IP traceback methods, which are ICMP, IPPM, HASH, <strong>and</strong> an UDP <strong>and</strong> AS traceback method<br />

newly proposed. And, we estimate the time required to trace. And, we analyze reliability features of these. False positive rate<br />

are evaluation parameters of the reliability. And, we analyze mathematical models. Then we compare the predicted value with<br />

the measured values using the actual large network for verification.<br />

Author<br />

Mathematical Models; Proving; Tracers; Error Detection Codes<br />

20060002157 Iowa Univ., Iowa City, IA, USA<br />

Convergence in Neural Memories<br />

Dasgupta, Soura; Ghosh, Anjan; Cuykendal, Robert; 1987 IEEE International Symposium on Circuits <strong>and</strong> Systems, Volume<br />

2; 1987, pp. 366-369; In English; See also 20060002103; Copyright; Avail.: Other Sources<br />

This paper considers convergence properties of the Hopfield retrieval algorithm for neural memory models. In this case,<br />

a memory stored in the network by an appropriate choice of connections is retrieved by setting the neural outputs to the binary<br />

pattern of the recall key (probe), <strong>and</strong> allowing the network to converge to a stable state. Precise conditions are developed<br />

which ensure that all stored memories are fixed points of the retrieval algorithm. Nest, an orthogonality-nearness criterion is<br />

obtained for a memory probe itself to be a stationary point, <strong>and</strong> thus outside the error-correcting capability of the memory.<br />

Finally, a local stability result quantifies the spatial relationship required for fast convergence.<br />

Author<br />

Convergence; Memory; Data Retrieval; Algorithms<br />

20060002160 Eidgenoessische Technische Hochschule, Zurich, Switzerl<strong>and</strong><br />

Programming, Analysis <strong>and</strong> Synthesis of Parallel Signal Processors<br />

Thaler, M.; Loeffler, Ch.; Moschytz, G. S.; 1987 IEEE International Symposium on Circuits <strong>and</strong> Systems, Volume 2; 1987,<br />

pp. 378-381; In English; See also 20060002103; Copyright; Avail.: Other Sources<br />

This paper describes a method for the programming <strong>and</strong> evaluation of parallel signal-processor architectures based on a<br />

data flow representation of signal-processing algorithms. The constant data flow, which is a special property of most<br />

139

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!