A separation kernel can be used as the foundation of a high assurance system that enforces mandatory security policies. The contexts in which such separation kernels might be used include support for a distributed trusted path, high assurance routing, and for a multilevel secure mobile device that supports an extraordinary access partition for access to sensitive data during a crisis. Separation kernel requirements call for an audit subsystem that helps to enforce accountability policy by...

Topic: Kernel functions

77
77

Oct 5, 2015
10/15

by
Gawain, Theodore Henry.;Biblarz, Oscar.

texts

#
eye 77

#
favorite 0

#
comment 0

Title from cover

Topic: KERNEL FUNCTIONS.,APPROXIMATION THEORY.

3
3.0

Aug 8, 2022
08/22

by
Bergman, Stefan, 1898-1977

texts

#
eye 3

#
favorite 0

#
comment 0

x, 257 p. 26 cm

Topics: Conformal mapping, Kernel functions

Naval Postgraduate School

215
215

Jan 25, 2013
01/13

by
Gawain, Theodore Henry.;Biblarz, Oscar.

texts

#
eye 215

#
favorite 0

#
comment 0

Title from cover

Topics: KERNEL FUNCTIONS., APPROXIMATION THEORY.

In an environment with valuable information assets, the threat of subversion is real. Thus, systems must be built from the ground up to counter the level of sophistication and capital that is pitted against them. To build such systems, rigorous assurance criteria must be met. Currently for high assurance systems there is no publicly available example of their design and construction. The Trusted Computing Exemplar (TCX) Project is intended to make publicly available a high assurance component...

Topics: Kernel functions, Software engineering

The Least Privilege Separation Kernel (LPSK) is part of the Trusted Computing Exemplar (TCX) project. Separation kernels may be used to partition resources in support of the enforcement of mandatory security policies. The LPSK provides services that allow each subject to access resources configured as part of its domain. To ensure permanence of information the LPSK requires a storage hierarchy for its data resources. This thesis describes the design for a LPSK storage hierarchy based on...

Topics: Kernel functions, Electronic security systems

2
2.0

texts

#
eye 2

#
favorite 0

#
comment 0

vi, 412 p. : 26 cm

Topics: Machine learning, Algorithms, Kernel functions

9
9.0

Mar 30, 2022
03/22

by
Cristianini, Nello

texts

#
eye 9

#
favorite 1

#
comment 0

xiii, 189 p. : 26 cm

Topics: Support vector machines, Kernel functions

The Least Privilege Separation Kernel (LPSK) configuration vector defines the initial secure state and the operational configuration of the kernel, including its security policies. Enhancements made to the LPSK functional specification necessitated substantial changes to the configuration vector data format defined previously. Moreover, the earlier format used an ad-hoc syntax, which did not adhere to any standard. This work leverages Extensible Markup Language (XML) to standardize the...

Topics: Kernel functions, Machine learning, Pattern perception

3
3.0

May 18, 2022
05/22

by
Huang, Te-Ming

texts

#
eye 3

#
favorite 0

#
comment 0

xvi, 260 p. : 25 cm

Topics: Machine learning, Data mining, Kernel functions

6
6.0

Jun 4, 2021
06/21

by
Schochetman, Irwin E., 1939-

texts

#
eye 6

#
favorite 0

#
comment 0

v, 120 p. ; 26 cm

Topics: Banach spaces, Integral operators, Kernel functions

7
7.0

Oct 7, 2021
10/21

by
Nummelin, Esa

texts

#
eye 7

#
favorite 1

#
comment 0

xi, 156 p. ; 24 cm

Topics: Markov processes, Operator theory, Kernel functions

We study two different operational scenarios for a regional air ambulance service-company which has bases in Northern California. Two of these bases serve the land areas encompassed roughly in a circular area of radius 100 miles centered in Gilroy and Salinas, respectively; with a large part of their coverage areas reachable from either base. The base in Salinas currently operates one helicopter only from Thursday to Monday, whereas the base in Gilroy operates one helicopter 24/7. The company...

Topics: Helicopter ambulances, California, Kernel functions, Poisson processes

http://uf.catalog.fcla.edu/uf.jsp?st=UF022082550&ix=pm&I=0&V=D&pm=1

Topics: Harmonic functions, Kernel functions, Brownian motion processes.

286
286

May 29, 2011
05/11

by
Gonda, Steve R.; Tsao, Yow-Mi

texts

#
eye 286

#
favorite 0

#
comment 0

The International Space Station (ISS) will support several facilities dedicated to scientific research. One such facility, the Biotechnology Facility (BTF), is sponsored by the Microgravity Sciences and Applications Division (MSAD) and developed at NASA's Johnson Space Center. The BTF is scheduled for delivery to the ISS via Space Shuttle in April 2005. The purpose of the BTF is to provide: (1) the support structure and integration capabilities for the individual modules in which biotechnology...

Topics: KERNEL FUNCTIONS, COMPONENT RELIABILITY, SUPERCOMPUTERS, VOIDS, PROTOTYPES, MIGRATION

293
293

Jun 26, 2011
06/11

by
NON

texts

#
eye 293

#
favorite 0

#
comment 0

A manual compactor having two handles each pivoted at one end for movement through adjacent arcs toward and away from each other, such reciprocating activation motion being translated into rotary motion in a single direction by means of ratchet and pawl arrangements about the pivot shaft of each handle, and thenceforth to rotary motion of opposing screws one each of which is driven by each handle, which in turn act through ball nut structures to forcibly draw together plates with force...

Topics: KERNEL FUNCTIONS, WIRE, SINGULARITY (MATHEMATICS), FORMULATIONS, ELLIPTIC FUNCTIONS, JACOBI...

347
347

May 31, 2011
05/11

by
Wang, Z. J.; Liu, Ye

texts

#
eye 347

#
favorite 0

#
comment 0

Consider a mesh of unstructured triangular cells. Each cell is called a Spectral Volume (SV), denoted by Si, which is further partitioned into subcells named Control Volumes (CVs), indicated by C(sub i,j). To represent the solution as a polynomial of degree m in two dimensions (2D) we need N = (m1)(m2)/2 pieces of independent information, or degrees of freedom (DOFs). The DOFs in a SV method are the volume-averaged mean variables at the N CVs. For example, to build a quadratic reconstruction in...

Topics: COMPUTATIONAL GRIDS, COMPUTER PROGRAMS, PERFORMANCE, EFFICIENCY, KERNEL FUNCTIONS, COMPUTER SYSTEMS...

209
209

Jun 13, 2011
06/11

by
Shepherd, Willia

texts

#
eye 209

#
favorite 0

#
comment 0

I think the biggest single issue in addressing any of the problems that I have mentioned is we do not have a way to marshal the adequate academic and intellectual resources in this country to solve these problems. So I would suggest that the country take a look at some of the national educational institutes that we have in the military. There are eight or nine of them The National War College, Industrial College of the Armed Services, and so forth. We need to have a National Space Institute...

Topics: KERNEL FUNCTIONS, PRINCIPAL COMPONENTS ANALYSIS, LEAST SQUARES METHOD, CORRELATION,...

270
270

Jun 21, 2010
06/10

by
King, R. A.; Meisel, W. S

texts

#
eye 270

#
favorite 0

#
comment 0

Conversion of sequential machine into periodic one, with savings in logical elements

Topics: ABEL FUNCTION, CAUCHY-RIEMANN EQUATIONS, INTEGRAL EQUATIONS, KERNEL FUNCTIONS, DIFFERENTIAL...

329
329

Jun 26, 2011
06/11

by
Budnik, Frank; Morley, Trevo

texts

#
eye 329

#
favorite 0

#
comment 0

This paper reports on the navigation activities during Rosetta s Mars swing-by. It covers the Mars approach phase starting after a deterministic deep-space maneuver in September 2006, the swing-by proper on 25 February 2007, and ends with another deterministic deep-space maneuver in April 2007 which was also foreseen to compensate any navigation error. Emphasis is put on the orbit determination and prediction set-up and the evolution of the targeting estimates in the B-plane and their...

Topics: GRADIENTS, INTEGRALS, WIRE, KERNEL FUNCTIONS, MAGNETIC FIELDS, ELECTRIC FIELDS, VECTOR CURRENTS,...

Recent advances in data mining have integrated kernel functions with Bayesian probabilistic analysis of Gaussian distributions. These machine learning approaches can incorporate prior information with new data to calculate probabilistic rather than deterministic values for unknown parameters. This paper analyzes extensively a specific Bayesian kernel model that uses a kernel function to calculate a posterior beta distribution that is conjugate to the prior beta distribution. Numerical testing...

Topics: DTIC Archive, OKLAHOMA UNIV BOARD OF REGENTS NORMAN, *CLASSIFICATION, KERNEL FUNCTIONS,...

The classical approach to extreme value modelling for multivariate data is to assume that the joint distribution belongs to a multivariate domain of attraction. In particular, this requires that each marginal distribution be individually attracted to a univariate extreme value distribution. The domain of attraction condition may be phrased conveniently in terms of regular variation of the joint distribution on an appropriate cone. A more flexible model for data realizations of a random vector...

Topics: DTIC Archive, CORNELL UNIV ITHACA NY, *KERNEL FUNCTIONS, *MARKOV PROCESSES, MULTIVARIATE ANALYSIS,...

476
476

Jun 1, 2011
06/11

by
Volmer, Pau

texts

#
eye 476

#
favorite 0

#
comment 0

The Advanced Camera for Surveys ACS was launched aboard the Space Shuttle Columbia just before dawn on March 1, 2002. After successfully docking with the Hubble Space Telescope (HST), several components were replaced. One of the components was the Advanced Camera for Surveys built by Ball Aerospace & Technologies Corp. (BATC) in Boulder, Colorado. Over the life of the HST contract at BATC hundreds of employees had the pleasure of working on the concept, design, fabrication, assembly and...

Topics: VIBRATION, ANOMALIES, BEVEL GEARS, DESTRUCTIVE TESTS, KERNEL FUNCTIONS, QUANTUM MECHANICS,...

A least privilege separation kernel (LPSK) is part of a long-term project known as the Trusted Computing Exemplar (TCX). A major objective of the TCX is the creation of an open framework for high assurance development. A relatively new specification tool called Alloy has shown potential for high assurance development. We implemented the formal security policy model (FSPM) and the formal top level specification (FTLS) of the TCX LPSK in Alloy and concluded that Alloy has few limitations and is...

Topics: DTIC Archive, Phelps, David A, *SOFTWARE ENGINEERING, *ELECTRONIC SECURITY, COMPUTER PROGRAMS,...

This document contains the lecture presentation of the paper entitled Comparison of Two Kernels for the Modified Wigner Distribution Function, given at the Society of Photo-Optical Instrumentation Engineers International Symposium on Optical Applied Science and Engineering, Conference 1566 on Advanced Signal Processing Algorithms, Architectures, and Implementations, July 21-26, 1991, San Diego, California. We compare the modified Wigner distribution functions obtained via the Choi-Williams...

Topics: DTIC Archive, NAVAL UNDERWATER SYSTEMS CENTER NEW LONDON CT, *DISTRIBUTION FUNCTIONS, *KERNEL...

The objective of the Trusted Computing Exemplar (TCX) project is to construct a useful example of a high assurance component as a reference model for building high assurance systems. The targeted exemplar component is the Least Privilege Separation Kernel (LPSK). The LPSK currently exists in the form of a partially implemented prototype. With respect to support for external computer peripherals, the prototype LPSK currently supports visual display units (e.g., LCD monitors) for output and PS/2...

Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *COMMUNICATIONS PROTOCOLS, *KERNEL FUNCTIONS,...

The contract was concerned with the feasibility and utility of a 'kernelization' procedure for purposes of information retrieval. The leading section discusses, in general, the problems involved in the kernelization of complex English sentences; this section is the work of J. P. Thorne. The remainder is in the form of appendices. Appendix I contains a detailed report of the kernelization procedure; for this section S. I. Laszlo was largely responsible. Appendix II reports on a series of...

Topics: DTIC Archive, INDIANA UNIV AT BLOOMINGTON, *INFORMATION RETRIEVAL, COMPUTER PROGRAMMING, LANGUAGE,...

I am developing a prototype of a Linux remote disk block server whose purpose is to serve as a lower level component of a parallel file system. Parallel file systems are an important component of high performance supercomputers and clusters. Although supercomputer vendors such as SGI and IBM have their own custom solutions, there has been a void and hence a demand for such a system on Beowulf-type PC Clusters. Recently, the Parallel Virtual File System (PVFS) project at Clemson University has...

Topics: NASA Technical Reports Server (NTRS), KERNEL FUNCTIONS, COMPONENT RELIABILITY, SUPERCOMPUTERS,...

Nonlinear spectral mixing occurs when materials are intimately mixed. Intimate mixing is a common characteristic of granular materials such as soils. A linear spectral unmixing inversion applied to a nonlinear mixture will yield subpixel abundance estimates that do not equal the true values of the mixture's components. These aspects of spectral mixture analysis theory are well documented. Several methods to invert (and model) nonlinear spectral mixtures have been proposed. Examples include...

Topics: DTIC Archive, MITRE CORP MCLEAN VA, *HYPERSPECTRAL IMAGERY, *OPTICAL GLASS, KERNEL FUNCTIONS,...

On the basis of the recommendations of the Electronic Systems Division Computer Security Technology Panel (1972), The MITRE Corporation developed techniques for the design, implementation, and formal mathematical verification of a security kernel: a hardware and software mechanism to control access to information within a computer system. This three-volume report describes the design of a security kernel for Honeywell Information System's Multics computer system. This third volume gives a...

Topics: DTIC Archive, Woodward, J P, MITRE CORP BEDFORD MA, *DATA PROCESSING SECURITY, DIGITAL COMPUTERS,...

This report describes results of benchmark tests on the Origin 3000 system currently being installed at the NASA Ames National Advanced Supercomputing facility. This machine will ultimately contain 1024 R14K processors. The first part of the system, installed in November, 2000 and named mendel, is an Origin 3000 with 128 R12K processors. For comparison purposes, the tests were also run on lomax, an Origin 2000 with R12K processors. The BT, LU, and SP application benchmarks in the NAS Parallel...

Topics: NASA Technical Reports Server (NTRS), WORKLOADS (PSYCHOPHYSIOLOGY), COMPUTATIONAL FLUID DYNAMICS,...

We prove a sharp Mihlin-Hormander multiplier theorem for Schrodinger operators H on Rn. The method, which allows us to deal with general potentials, improves Hebisch's method relying on heat kernel estimates for positive potentials [22, 12].

Topics: DTIC Archive, SOUTH CAROLINA UNIV COLUMBIA DEPT OF MATHEMATICS, *SCHRODINGER EQUATION, ESTIMATES,...

296
296

Jun 1, 2011
06/11

by
Johnson, Wayne; Yamauchi, Gloria K.; Derby, Michael R.; Wadcock, Alan J

texts

#
eye 296

#
favorite 0

#
comment 0

Wind tunnel measurements and calculations of the aerodynamic interactions between two tiltrotor aircraft in helicopter mode are presented. The measured results include the roll moment and thrust change on the downwind aircraft, as a function of the upwind aircraft position (longitudinal, lateral, and vertical). Magnitudes and locations of the largest interactions are identified. The calculated interactions generally match the measurements, with discrepancies attributed to the unsteadiness of...

Topics: ALGORITHMS, KERNEL FUNCTIONS, METHODOLOGY, MATHEMATICAL MODELS, NORMAL DENSITY FUNCTIONS,...

11
11

texts

#
eye 11

#
favorite 1

#
comment 0

xiv, 415 p. : 26 cm

Topics: Engineering mathematics, Biomedical engineering -- Mathematics, Signal processing -- Mathematics,...

Roscoe is a multi-computer operating system running on a network of LSI-11 computers at the University of Wisconsin. This document describes Roscoe from the viewpoint of a user or a writer of user-level programs. All system service calls and library routines are described in detail. In addition, the command-line interpreter and terminal input conventions are discussed. Companion reports describe the purposes and concepts underlying the Roscoe project and give detailed accounts of the Roscoe...

Topics: DTIC Archive, Finkel,Raphael, WISCONSIN UNIV-MADISON MATHEMATICS RESEARCH CENTER, *COMPUTER...

In this paper we implement various linear and nonlinear subspace-based anomaly detectors for hyperspectral imagery. First, a dual window technique is used to separate the local area around each pixel into two regions - an inner-window region (IWR) and an outer-window region (OWR). Pixel spectra from each region are projected onto a subspace which is defined by projection bases that can be generated in several ways. Here we use three common pattern classification techniques (Principal Component...

Topics: DTIC Archive, ARMY RESEARCH LAB ADELPHI MD, *HYPERSPECTRAL IMAGERY, ANOMALIES, DETECTORS, KERNEL...

In this paper we propose a constructive method to build reproducing kernels. We define the notion of (V, f)-reproducing kernel, and prove that every reproducing kernel is a (V, f)-reproducing kernel. We study the minimal approximation by these (V, f)-reproducing kernels for different choices of V and f. Examples to which our results apply include curve and surface fitting.

Topics: DTIC Archive, Benbourhim, Mohammed-Najib, TOULOUSE-3 UNIV (FRANCE), *KERNEL FUNCTIONS,...

This second volume gives a formal, top-level specification of the primary subsystems of the kernel. The specification is a definition of the input-output behavior of the kernel. It is sufficiently detailed to allow its security, compatibility, and efficiency to be determined.

Topics: DTIC Archive, Withington, P T, MITRE CORP BEDFORD MA, *DATA PROCESSING SECURITY, COMPUTER PROGRAMS,...

In the eleventh quarter of the work effort, we focused on a) conducting experiments on realworld data sets using the developed algorithms, b) continued design/implementation of the Multiscale Heat-Kernel Coordinates (MHKC) algorithms with function estimation and c) packaging for releasing the software as open source. This report documents algorithm designs for the MHKC algorithms for visualization and function estimation. The project is currently on track--in the upcoming final quarter, we will...

Topics: DTIC Archive, APPLIED COMMUNICATION SCIENCES BASKING RIDGE NJ, *ALGORITHMS, *KERNEL FUNCTIONS,...

Given a linear space S (over some field), we attempt to determine the dimension of spaces of a certain form with a L a (finite) sequence of linear endomorphisms of S, i.e., a sequence in L(S).

Topics: DTIC Archive, DE Boor, Carl, WISCONSIN UNIV-MADISON CENTER FOR MATHEMATICAL SCIENCES, *KERNEL...

Many sequential decision-making problems related to multi-agent robotic systems can be naturally posed as Markov Decision Processes (MDPs). An important advantage of the MDP framework is the ability to utilize stochastic system models, thereby allowing the system to make sound decisions even if there is randomness in the system evolution over time. Unfortunately, the curse of dimensionality prevents most MDPs of practical size from being solved exactly. One main focus of the thesis is on the...

Topics: DTIC Archive, MASSACHUSETTS INST OF TECH CAMBRIDGE, *MARKOV PROCESSES, DECISION MAKING, THESES,...

Given a large un-transcribed corpus of speech utterances, we address the problem of how to select a good subset for word-level transcription under a given fixed transcription budget. We employ submodular active selection on a Fisher-kernel based graph over un-transcribed utterances. The selection is theoretically guaranteed to be near-optimal. Moreover, our approach is able to bootstrap without requiring any initial transcribed data, whereas traditional approaches rely heavily on the quality of...

Topics: DTIC Archive, WASHINGTON UNIV SEATTLE DEPT OF ELECTRICAL ENGINEERING, *SELECTION, *SPEECH...

656
656

May 23, 2011
05/11

by
Bousman, William G.; Young, Colin; Toulmay, Francois; Gilbert, Neil E.; Strawn, Roger C.; Miller, Judith V.; Maier, Thomas H.; Costes, Michel; Beaumier, Philipp

texts

#
eye 656

#
favorite 0

#
comment 0

Four lifting-line methods were compared with flight test data from a research Puma helicopter and the accuracy assessed over a wide range of flight speeds. Hybrid Computational Fluid Dynamics (CFD) methods were also examined for two high-speed conditions. A parallel analytical effort was performed with the lifting-line methods to assess the effects of modeling assumptions and this provided insight into the adequacy of these methods for load predictions.

Topics: COMPUTER INFORMATION SECURITY, SECURITY, VIRTUAL MEMORY SYSTEMS, KERNEL FUNCTIONS, BOUNDARIES,...

508
508

May 23, 2011
05/11

by
Treiman, Allan H.; Lindstrom, David J

texts

#
eye 508

#
favorite 0

#
comment 0

The Lafayette meteorite contains abundant iddingsite, a fine-grained intergrowth of smectite clay, ferrihydrite, and ionic salt minerals. Both the meteorite and iddingsite formed on Mars. Samples of iddingsite, olivine, and augite pyroxene were extracted from Lafayette and analyzed for trace elements by instrumental neutron activation. Our results are comparable to independent analyses by electron and ion microbeam methods. Abundances of most elements in the iddingsite do not covary...

Topics: VISCOELASTICITY, KERNEL FUNCTIONS, CREEP PROPERTIES, FORMALISM, THERMODYNAMICS, VISCOPLASTICITY,...

A wide range of machine learning problems, including astronomical inference about galaxy clusters, natural image scene classification, parametric statistical inference, and detection of potentially harmful sources of radiation, can be well-modeled as learning a function on (samples from) distributions. This thesis explores problems in learning such functions via kernel methods, and applies the framework to yield state-of-the-art results in several novel settings. One major challenge with this...

Topics: DTIC Archive, Sutherland,Dougal J, CARNEGIE-MELLON UNIV PITTSBURGH PA PITTSBURGH United States,...

We summarize the progress made during the period July through September 1996 for the DARPA contract 'Microlanguage-Based Specialization', part of the Synthetix Project. The main objective of the project is to design and implement microlanguages to support directed specialization of operating system kernels, to complement the inferred specialization in the Synthetix project. The key idea is to design a microlanguage tailored for each specific area that captures deep application semantics through...

Topics: DTIC Archive, Pu, Calton, OREGON GRADUATE INST BEAVERTON, *COMPUTER PROGRAMMING, *COMPUTATIONAL...

354
354

Jun 12, 2011
06/11

by
Frimer, Aryeh A.; Gilinsky-Sharon, Pessia; Gottlieb, Hugo E.; Meador, Mary Ann B.; Johnston, J. Christophe

texts

#
eye 354

#
favorite 0

#
comment 0

In depth NMR studies confirm that heating a 1:2 mixture of cis, cis, cis 3,6-diphenyltetrahydrophthalic anhydride (end cap 9c) with methylenedianiline at 316 C initially yields the corresponding highly congested cis, cis, cis 3,6-diphenyltetrahydrophthalic bisimide 11, which is converted at this temperature to the observed product, the less hindered trans, cis, trans isomer 12.

Topics: KERNEL FUNCTIONS, SIMULATORS, MATHEMATICAL MODELS, PERFORMANCE PREDICTION, COMPONENT REPORTS,...

The reproducing kernel functions for the Sard corner spaces B - corner p, q are integrated to obtain explicit expressions. The smoothness properties of these functions are discussed. (Author)

Topics: DTIC Archive, Franke,Richard, NAVAL POSTGRADUATE SCHOOL MONTEREY CALIF, *KERNEL FUNCTIONS,...

600
600

Jul 25, 2010
07/10

by
NON

texts

#
eye 600

#
favorite 0

#
comment 0

The National Space Strategy approved by the President and Congress in 1984 sets for NASA a major goal of conducting effective and productive space applications and technology programs which contribute materially toward United States leadership and security. To contribute to this goal, OAST supports the Nation's civil and defense space programs and overall economic growth. OAST objectives are to ensure timely provision of new concepts and advanced technologies, to support both the development of...

Topics: ADA (PROGRAMMING LANGUAGE), ERROR ANALYSIS, OPERATING SYSTEMS (COMPUTERS), QUALITY CONTROL,...

Some examples of linear ill-posed problems in engineering are given and a general class of regularization methods for ill-posed linear operator equations is studied. Rates of convergence for the general method are estabished under various assumptions on the data. Applications are given to a number of iterative and noniterative regularization algorithms. (Author)

Topics: DTIC Archive, Groetsch,C W, OHIO STATE UNIV RESEARCH FOUNDATION COLUMBUS, *INTEGRAL EQUATIONS,...