This collection represents a series of “Technical Reports” produced by members of the Department of Computer Science (formerly the Department of Mathematics and Computer Science) since 1986. They include material deemed by the faculty to be worthy of public release; in some cases, Technical Reports were later revised and published in the archival literature. Prior to September 2020, the series was also a venue for release of some PhD dissertations, MS theses, and undergraduate honors theses.

Prior to the year 2000, reports were numbered in the form PCS-TRyy-nnn, where yy was the 2-digit year (19yy), and nnn was a sequence number. “PCS” stood for “paper in computer science”; for the earliest reports, the pdf contains a scan of the original paper document or a distillation of the original Postscript file. In rare cases, the first three letters (“PCS”) was occasionally “DCS”, for a diskette, or “TCS" for a tape; most of these have been transferred to archive files and made available here.

Starting in the year 2000, new reports were numbered in the form TRyyyy-nnn, with sequence number nnn continuous across years. In 2021 we expanded the number format to to TRyyyy-nnnn, since the sequence numbers exceeded 999.

For more information about the Dartmouth Computer Science Technical Report series, please contact Computer.Science.Department@Dartmouth.EDU.

Follow


Submissions from 2005

PDF

The Theory of Trackability with Applications to Sensor Networks, Valentino Crespi, George Cybenko, and Guofei Jiang

PDF

Managing Access Control in Virtual Private Networks, Twum Djin

Link

An Untethered, Electrostatic, Globally Controllable MEMS Micro-Robot: Supplementary videos, Bruce R. Donald, Christopher G. Levey, Craig D. McGray, Igor Paprotny, and Daniela Rus

PDF

A Steerable, Untethered, 250x60 micron MEMS Mobile Micro-Robot, Bruce R. Donald, Christopher G. Levey, Craig D. McGray, Igor Paprotny, and Daniela Rus

PDF

An O(n^{5/2} log n) Algorithm for the Rectilinear Minimum Link-Distance Problem in Three Dimensions (Extended Abstract), Robert Scot Drysdale, Clifford Stein, and David P. Wagner

Boolean operations with two dimensional segment trees, Robert Scot Drysdale and David P. Wagner

PDF

How hard is it to cheat in the Gale-Shapley Stable Matching Algorithm, Chien-Chung Huang

PDF

More Efficient Secure Function Evaluation Using Tiny Trusted Third Parties, Alexander Iliev and Sean Smith

PDF

Towards Tiny Trusted Third Parties, Alexander Iliev and Sean Smith

PDF

Efficiently Implementing a Large Number of LL/SC Objects, Prasad Jayanti and Srdjan Petrovic

PDF

A Combined Routing Method for Ad hoc Wireless Networks, Zhenhui Jiang

PDF

Classifying the Mobility of Users and the Popularity of Access Points, Minkyong Kim and David Kotz

PDF

Department of Computer Science Activity 1998-2004, David Kotz

PDF

Master’s thesis proposal: computation reuse in stacking and unstacking, Anne Loomis

PDF

Natural Image Statistics for Digital Image Forensics, Siwei Lyu

PDF

SHEMP: Secure Hardware Enhanced MyProxy, John Marchesini and Sean Smith

PDF

High-Throughput Inference of Protein-Protein Interaction Sites from Unassigned NMR Data by Analyzing Arrangements Induced By Quadratic Forms on 3-Manifolds, Ramgopal R. Mettu, Ryan H. Lilien, and Bruce Randall Donald

PDF

Efficient Wait-Free Algorithms for Implementing LL/SC Objects, Srdjan Petrovic

PDF

On-line Metasearch, Pooling, and System Evaluation, Robert A. Savell

PDF

Graphical Models of Residue Coupling in Protein Families, John Thomas, Naren Ramakrishnan, and Chris Bailey-Kellogg

PDF

Improving Large-Scale Network Traffic Simulation with Multi-Resolution Models, Guanhua Yan

PDF

On the Design of an Immersive Environment for Security-Related Studies, Yougu Yuan

PDF

Performance Evaluation of Distributed Security Protocols Using Discrete Event Simulation, Meiyuan Zhao

PDF

Aggregated Path Authentication for Efficient BGP Security, Meiyuan Zhao, Sean W. Smith, and David M. Nicol

Submissions from 2004

PDF

The Kerf toolkit for intrusion analysis, Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Daniela Rus, and Brett Tofel

PDF

A Survey of WPA and 802.11i RSN Authentication Protocols, Kwang-Hyun Baek, Sean W. Smith, and David Kotz

PDF

Parallel Out-of-Core Sorting: The Third Way, Geeta Chaudhry

PDF

Solar: Building A Context Fusion Network for Pervasive Computing, Guanling Chen

PDF

A Case Study of Four Location Traces, Guanling Chen and David Kotz

PDF

Application-controlled loss-tolerant data dissemination, Guanling Chen and David Kotz

PDF

Dependency management in distributed settings, Guanling Chen and David Kotz

PDF

Mobile Agents Simulation with DaSSF, Nikita E. Dubrovsky

PDF

Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act, Hany Farid

PDF

Discrete-Time Fractional Differentiation from Integer Derivatives, Hany Farid

PDF

Heterogeneous Self-Reconfiguring Robotics, Robert Charles Fitch

PDF

Greenpass Client Tools for Delegated Authorization in Wireless Networks, Nicholas C. Goffee

PDF

Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms, Robert S. Gray, David Kotz, Calvin Newport, Nikita Dubrovsky, Aaron Fiske, Jason Liu, Christopher Masone, Susan McGrath, and Yougu Yuan

PDF

Composing a Well-Typed Region, Chris Hawblitzel, Heng Huang, and Lea Wittie

PDF

Problems with the Dartmouth wireless SNMP data collection, Tristan Henderson and David Kotz

PDF

The Changing Usage of a Mature Campus-wide Wireless Network, Tristan Henderson, David Kotz, and Ilya Abyzov

PDF

Efficient Wait-Free Implementation of Multiword LL/SC Variables, Prasad Jayanti and Srdjan Petrovic

PDF

Greenpass RADIUS Tools for Delegated Authorization in Wireless Networks, Sung Hoon Kim

File

Technological Implications for Privacy, David Kotz

PDF

Experimental evaluation of wireless simulation assumptions, David Kotz, Calvin Newport, Robert S. Gray, Jason Liu, Yougu Yuan, and Chip Elliott

PDF

PPL: a Packet Processing Language, Eric G. Krupski

PDF

Probabilistic Disease Classification of Expression-Dependent Proteomic Data from Mass Spectrometry of Human Serum, Ryan H. Lilien, Hany Farid, and Bruce R. Donald

PDF

Identification of Novel Small Molecule Inhibitors of Core-Binding Factor Dimerization by Computational Screening against NMR Molecular Ensemble, Ryan H. Lilien, Mohini Sridharan, and Bruce R. Donald

PDF

Automatic Image Orientation Determination with Natural Image Statistics, Siwei Lyu

PDF

Mercer Kernels for Object Recognition with Local Features, Siwei Lyu

PDF

Secure Hardware Enhanced MyProxy: A Ph.D. Thesis Proposal, John Marchesini and David Kotz

PDF

Keyjacking: The Surprising Insecurity of Client-side SSL, John Marchesini, S W. Smith, and Meiyuan Zhao

PDF

Access Control in a Distributed Decentralized Network: An XML Approach to Network Security using XACML and SAML, Paul J. Mazzuca

PDF

Secure Context-sensitive Authorization, Kazuhiro Minami and David Kotz

PDF

Spatial Multipath Location Aided Routing, Soumendra Nanda

PDF

Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth, Sidharth Nazareth and Sean W. Smith

PDF

Simulating mobile ad hoc networks: a quantitative evaluation of common MANET simulation models, Calvin Newport

PDF

Enhancing Expressiveness of Speech through Animated Avatars for Instant Messaging and Mobile Phones, Joseph E. Pechter

PDF

Synchronizing Keyframe Facial Animation to Multiple Text-to-Speech Engines and Natural Voice with Fast Response Time, William H. Pechter

PDF

Statistical Tools for Digital Image Forensics, Alin C. Popescu

PDF

Exposing Digital Forgeries by Detecting Duplicated Image Regions, Alin C. Popescu and Hany Farid

PDF

Testing the Greenpass Wireless Security System, Kimberly S. Powell

PDF

Efficient Wait-Free Implementation of Atomic Multi-Word Buffer, Rachel B. Ringel

PDF

Scheduling Pipelined, Multi-Threaded Programs in Linux, Brunn W. Roysden

PDF

Greenpass: Flexible and Scalable Authorization for Wireless Networks, Sean Smith, Nicholas C. Goffee, Sung Hoon Kim, Punch Taylor, Meiyuan Zhao, and John Marchesini

Evaluating next-cell predictors with extensive Wi-Fi mobility data, Libo Song, David Kotz, Ravi Jain, and Xiaoning He

PDF

A Secure Network Node Approach to the Policy Decision Point in Distributed Access Control, Geoffrey H. Stowe

PDF

A Holesome File System, Darren Erik Vengroff and David Kotz

PDF

Performance Evaluation of a Resource Discovery Service, Jue Wang

PDF

A meeting detector and its applications, Jue Wang, Guanling Chen, and David Kotz

PDF

Type-Safe Operating System Abstractions, Lea Wittie

Submissions from 2003

PDF

Investigation of Third Party Rights Service and Shibboleth Modification to Introduce the Service, Sanket Agrawal

PDF

Flexible and Scalable Public Key Security for SSH, Yasir Ali

PDF

Distributed planning and control for modular robots with unit-compressible modules, Zack Butler and Daniela Rus

PDF

Stupid Columnsort Tricks, Geeta Chaudhry and Thomas H. Cormen

PDF

Relaxing the Problem-Size Bound for Out-of-Core Columnsort, Geeta Chaudhry, Elizabeth A. Hamon, and Thomas H. Cormen

PDF

Power Conservation in the Network Stack of Wireless Sensors, Michael De Rosa

MEMS for Infosecurity, Bruce R. Donald, Craig McGray, and Daniela Rus

PDF

Enhancing Asynchronous Parallel Computing, Elizabeth Anne Hamon

PDF

Formal Properties of Linear Memory Types, Heng Huang, Lea Wittie, and Chris Hawblitzel

PDF

Privacy-enhanced credential services, Alex Iliev and Sean Smith

PDF

Efficient and Practical Constructions of LL/SC Variables, Prasad Jayanti and Srdjan Petrovic

PDF

Electronic Documents and Digital Signatures, Kunal Kain

PDF

The mistaken axioms of wireless-network research, David Kotz, Calvin Newport, and Chip Elliott

PDF

3D-Structural Homology Detection via Unassigned Residual Dipolar Couplings, Christopher James Langmead and Bruce Randall Donald

PDF

An Improved Nuclear Vector Replacement Algorithm for Nuclear Magnetic Resonance Assignment, Christopher James Langmead and Bruce Randall Donald

PDF

High-Throughput 3D Homology Detection via NMR Resonance Assignment, Christopher James Langmead and Bruce Randall Donald

PDF

Persistence and Prevalence in the Mobility of Dartmouth Wireless Network Users, Clara Lee

PDF

802.11b Wireless Network Visualization and Radiowave Propagation Modeling, Chris Lentz

PDF

A Subgroup Algorithm to Identify Cross-Rotation Peaks Consistent with Non-Crystallographic Symmetry, Ryan H. Lilien, Chris Bailey-Kellogg, Amy C. Anderson, and Bruce R. Donald

PDF

Digital Art Forensics, Siwei Lyu, Daniel Rockmore, and Hany Farid

PDF

Bear: An Open-Source Virtual Secure Coprocessor based on TCPA, Rich MacDonald, Sean Smith, John Marchesini, and Omen Wild

PDF

Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear, John Marchesini, Sean Smith, Omen Wild, and Rich MacDonald

PDF

Keyjacking: Risks of the Current Client-side Infrastructure, John Marchesini, S W. Smith, and Meiyuan Zhao

PDF

Billiards Adviser as a Search in a Continuous Domain with Significant Uncertainty, Thomas Mueller

PDF

SPADE: SPKI/SDSI for Attribute Release Policies in a Distributed Environment, Sidharth P. Nazareth

PDF

Efficient Security for BGP Route Announcements, David M. Nicol, Sean W. Smith, and Meiyuan Zhao

PDF

Discrete-Event Fluid Modeling of Background TCP Traffic, David M. Nicol and Guanhua Yan

PDF

Efficient I/O for Computational Grid Applications, Ron A. Oldfield

PDF

Trusted S/MIME Gateways, Mindy J. Pereira

PDF

An Analysis of Convergence Properties of the Border Gateway Protocol Using Discrete Event Simulation, Brian J. Premore