This collection represents a series of “Technical Reports” produced by members of the Department of Computer Science (formerly the Department of Mathematics and Computer Science) since 1986. They include material deemed by the faculty to be worthy of public release; in some cases, Technical Reports were later revised and published in the archival literature. Prior to September 2020, the series was also a venue for release of some PhD dissertations, MS theses, and undergraduate honors theses.
Prior to the year 2000, reports were numbered in the form PCS-TRyy-nnn, where yy was the 2-digit year (19yy), and nnn was a sequence number. “PCS” stood for “paper in computer science”; for the earliest reports, the pdf contains a scan of the original paper document or a distillation of the original Postscript file. In rare cases, the first three letters (“PCS”) was occasionally “DCS”, for a diskette, or “TCS" for a tape; most of these have been transferred to archive files and made available here.
Starting in the year 2000, new reports were numbered in the form TRyyyy-nnn, with sequence number nnn continuous across years. In 2021 we expanded the number format to to TRyyyy-nnnn, since the sequence numbers exceeded 999.
For more information about the Dartmouth Computer Science Technical Report series, please contact Computer.Science.Department@Dartmouth.EDU.
Submissions from 2005
The Theory of Trackability with Applications to Sensor Networks, Valentino Crespi, George Cybenko, and Guofei Jiang
Managing Access Control in Virtual Private Networks, Twum Djin
An Untethered, Electrostatic, Globally Controllable MEMS Micro-Robot: Supplementary videos, Bruce R. Donald, Christopher G. Levey, Craig D. McGray, Igor Paprotny, and Daniela Rus
A Steerable, Untethered, 250x60 micron MEMS Mobile Micro-Robot, Bruce R. Donald, Christopher G. Levey, Craig D. McGray, Igor Paprotny, and Daniela Rus
An O(n^{5/2} log n) Algorithm for the Rectilinear Minimum Link-Distance Problem in Three Dimensions (Extended Abstract), Robert Scot Drysdale, Clifford Stein, and David P. Wagner
Boolean operations with two dimensional segment trees, Robert Scot Drysdale and David P. Wagner
How hard is it to cheat in the Gale-Shapley Stable Matching Algorithm, Chien-Chung Huang
More Efficient Secure Function Evaluation Using Tiny Trusted Third Parties, Alexander Iliev and Sean Smith
Towards Tiny Trusted Third Parties, Alexander Iliev and Sean Smith
Efficiently Implementing a Large Number of LL/SC Objects, Prasad Jayanti and Srdjan Petrovic
A Combined Routing Method for Ad hoc Wireless Networks, Zhenhui Jiang
Classifying the Mobility of Users and the Popularity of Access Points, Minkyong Kim and David Kotz
Department of Computer Science Activity 1998-2004, David Kotz
Master’s thesis proposal: computation reuse in stacking and unstacking, Anne Loomis
Natural Image Statistics for Digital Image Forensics, Siwei Lyu
SHEMP: Secure Hardware Enhanced MyProxy, John Marchesini and Sean Smith
High-Throughput Inference of Protein-Protein Interaction Sites from Unassigned NMR Data by Analyzing Arrangements Induced By Quadratic Forms on 3-Manifolds, Ramgopal R. Mettu, Ryan H. Lilien, and Bruce Randall Donald
Efficient Wait-Free Algorithms for Implementing LL/SC Objects, Srdjan Petrovic
On-line Metasearch, Pooling, and System Evaluation, Robert A. Savell
Graphical Models of Residue Coupling in Protein Families, John Thomas, Naren Ramakrishnan, and Chris Bailey-Kellogg
Improving Large-Scale Network Traffic Simulation with Multi-Resolution Models, Guanhua Yan
On the Design of an Immersive Environment for Security-Related Studies, Yougu Yuan
Performance Evaluation of Distributed Security Protocols Using Discrete Event Simulation, Meiyuan Zhao
Aggregated Path Authentication for Efficient BGP Security, Meiyuan Zhao, Sean W. Smith, and David M. Nicol
Submissions from 2004
The Kerf toolkit for intrusion analysis, Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Daniela Rus, and Brett Tofel
A Survey of WPA and 802.11i RSN Authentication Protocols, Kwang-Hyun Baek, Sean W. Smith, and David Kotz
Parallel Out-of-Core Sorting: The Third Way, Geeta Chaudhry
Solar: Building A Context Fusion Network for Pervasive Computing, Guanling Chen
A Case Study of Four Location Traces, Guanling Chen and David Kotz
Application-controlled loss-tolerant data dissemination, Guanling Chen and David Kotz
Dependency management in distributed settings, Guanling Chen and David Kotz
Mobile Agents Simulation with DaSSF, Nikita E. Dubrovsky
Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act, Hany Farid
Discrete-Time Fractional Differentiation from Integer Derivatives, Hany Farid
Heterogeneous Self-Reconfiguring Robotics, Robert Charles Fitch
Greenpass Client Tools for Delegated Authorization in Wireless Networks, Nicholas C. Goffee
Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms, Robert S. Gray, David Kotz, Calvin Newport, Nikita Dubrovsky, Aaron Fiske, Jason Liu, Christopher Masone, Susan McGrath, and Yougu Yuan
Composing a Well-Typed Region, Chris Hawblitzel, Heng Huang, and Lea Wittie
Problems with the Dartmouth wireless SNMP data collection, Tristan Henderson and David Kotz
The Changing Usage of a Mature Campus-wide Wireless Network, Tristan Henderson, David Kotz, and Ilya Abyzov
Efficient Wait-Free Implementation of Multiword LL/SC Variables, Prasad Jayanti and Srdjan Petrovic
Greenpass RADIUS Tools for Delegated Authorization in Wireless Networks, Sung Hoon Kim
Technological Implications for Privacy, David Kotz
Experimental evaluation of wireless simulation assumptions, David Kotz, Calvin Newport, Robert S. Gray, Jason Liu, Yougu Yuan, and Chip Elliott
PPL: a Packet Processing Language, Eric G. Krupski
Probabilistic Disease Classification of Expression-Dependent Proteomic Data from Mass Spectrometry of Human Serum, Ryan H. Lilien, Hany Farid, and Bruce R. Donald
Identification of Novel Small Molecule Inhibitors of Core-Binding Factor Dimerization by Computational Screening against NMR Molecular Ensemble, Ryan H. Lilien, Mohini Sridharan, and Bruce R. Donald
Automatic Image Orientation Determination with Natural Image Statistics, Siwei Lyu
Mercer Kernels for Object Recognition with Local Features, Siwei Lyu
Secure Hardware Enhanced MyProxy: A Ph.D. Thesis Proposal, John Marchesini and David Kotz
Keyjacking: The Surprising Insecurity of Client-side SSL, John Marchesini, S W. Smith, and Meiyuan Zhao
Access Control in a Distributed Decentralized Network: An XML Approach to Network Security using XACML and SAML, Paul J. Mazzuca
Secure Context-sensitive Authorization, Kazuhiro Minami and David Kotz
Spatial Multipath Location Aided Routing, Soumendra Nanda
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth, Sidharth Nazareth and Sean W. Smith
Simulating mobile ad hoc networks: a quantitative evaluation of common MANET simulation models, Calvin Newport
Enhancing Expressiveness of Speech through Animated Avatars for Instant Messaging and Mobile Phones, Joseph E. Pechter
Synchronizing Keyframe Facial Animation to Multiple Text-to-Speech Engines and Natural Voice with Fast Response Time, William H. Pechter
Statistical Tools for Digital Image Forensics, Alin C. Popescu
Exposing Digital Forgeries by Detecting Duplicated Image Regions, Alin C. Popescu and Hany Farid
Testing the Greenpass Wireless Security System, Kimberly S. Powell
Efficient Wait-Free Implementation of Atomic Multi-Word Buffer, Rachel B. Ringel
Scheduling Pipelined, Multi-Threaded Programs in Linux, Brunn W. Roysden
Greenpass: Flexible and Scalable Authorization for Wireless Networks, Sean Smith, Nicholas C. Goffee, Sung Hoon Kim, Punch Taylor, Meiyuan Zhao, and John Marchesini
Evaluating next-cell predictors with extensive Wi-Fi mobility data, Libo Song, David Kotz, Ravi Jain, and Xiaoning He
A Secure Network Node Approach to the Policy Decision Point in Distributed Access Control, Geoffrey H. Stowe
A Holesome File System, Darren Erik Vengroff and David Kotz
Performance Evaluation of a Resource Discovery Service, Jue Wang
A meeting detector and its applications, Jue Wang, Guanling Chen, and David Kotz
Type-Safe Operating System Abstractions, Lea Wittie
Submissions from 2003
Investigation of Third Party Rights Service and Shibboleth Modification to Introduce the Service, Sanket Agrawal
Flexible and Scalable Public Key Security for SSH, Yasir Ali
Distributed planning and control for modular robots with unit-compressible modules, Zack Butler and Daniela Rus
Stupid Columnsort Tricks, Geeta Chaudhry and Thomas H. Cormen
Relaxing the Problem-Size Bound for Out-of-Core Columnsort, Geeta Chaudhry, Elizabeth A. Hamon, and Thomas H. Cormen
Power Conservation in the Network Stack of Wireless Sensors, Michael De Rosa
MEMS for Infosecurity, Bruce R. Donald, Craig McGray, and Daniela Rus
Enhancing Asynchronous Parallel Computing, Elizabeth Anne Hamon
Formal Properties of Linear Memory Types, Heng Huang, Lea Wittie, and Chris Hawblitzel
Privacy-enhanced credential services, Alex Iliev and Sean Smith
Efficient and Practical Constructions of LL/SC Variables, Prasad Jayanti and Srdjan Petrovic
Electronic Documents and Digital Signatures, Kunal Kain
The mistaken axioms of wireless-network research, David Kotz, Calvin Newport, and Chip Elliott
3D-Structural Homology Detection via Unassigned Residual Dipolar Couplings, Christopher James Langmead and Bruce Randall Donald
An Improved Nuclear Vector Replacement Algorithm for Nuclear Magnetic Resonance Assignment, Christopher James Langmead and Bruce Randall Donald
High-Throughput 3D Homology Detection via NMR Resonance Assignment, Christopher James Langmead and Bruce Randall Donald
Persistence and Prevalence in the Mobility of Dartmouth Wireless Network Users, Clara Lee
802.11b Wireless Network Visualization and Radiowave Propagation Modeling, Chris Lentz
A Subgroup Algorithm to Identify Cross-Rotation Peaks Consistent with Non-Crystallographic Symmetry, Ryan H. Lilien, Chris Bailey-Kellogg, Amy C. Anderson, and Bruce R. Donald
Digital Art Forensics, Siwei Lyu, Daniel Rockmore, and Hany Farid
Bear: An Open-Source Virtual Secure Coprocessor based on TCPA, Rich MacDonald, Sean Smith, John Marchesini, and Omen Wild
Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear, John Marchesini, Sean Smith, Omen Wild, and Rich MacDonald
Keyjacking: Risks of the Current Client-side Infrastructure, John Marchesini, S W. Smith, and Meiyuan Zhao
Billiards Adviser as a Search in a Continuous Domain with Significant Uncertainty, Thomas Mueller
SPADE: SPKI/SDSI for Attribute Release Policies in a Distributed Environment, Sidharth P. Nazareth
Efficient Security for BGP Route Announcements, David M. Nicol, Sean W. Smith, and Meiyuan Zhao
Discrete-Event Fluid Modeling of Background TCP Traffic, David M. Nicol and Guanhua Yan
Efficient I/O for Computational Grid Applications, Ron A. Oldfield
Trusted S/MIME Gateways, Mindy J. Pereira
An Analysis of Convergence Properties of the Border Gateway Protocol Using Discrete Event Simulation, Brian J. Premore