Publications

Architecture Technology Corporation staff actively participate in the academic community, publishing conference papers, journal articles, and books, as well as serving on the organizing committees of several conferences. Publications from the last several years include:

Books

R. S. Ramanujan and J. A. K. Baker, editors, Trends in Tactical Networking, Digital Systems Press, New York, 2011, 152 pages, ISBN: 978-0-9833424-2-7.

J. A. K. Baker and K. J. Thurber, Developing Computer Systems Requirements, Digital Systems Press, New York, 2011, 146 pages, ISBN: 978-0-9833424-0-3.

F. Adelstein, S. Gupta, G. G. Richard III, and L. Schwiebert, Fundamentals of Mobile and Pervasive Computing, McGraw-Hill Professional, New York, 2005, 404 pages, ISBN: 0071412379.

Conference and Journal Papers

2016

D. Charan and R. Ramanujan, “INEshield: Multicase Anti-Replay Technology for Inline Network Encryptors (INEs),” Proceedings of the 2016 IEEE Military Communications Conference (MILCOM 2016), November 2016.

2015

B. Trent, F. Pozzo, R. Ramanujan, R. Riley, P. O’Neill, C. Banner, and G. Heinen, “DYNAMICS: Inverse Mission Planning for Dedicated Aerial Communications Platforms,” Proceedings of the 2015 IEEE Military Communications Conference (MILCOM 2015), October 2015.

R. Ramanujan, J. Wu, D. Charan, N. Bahr, T. Bouvin, B. Burnett, C. Webster, B. Thompson, N. Rowe, and M. Harnett, “Efficient End-to-End IP Multicast in Crypto-Partitioned Networks,” Proceedings of the 2015 IEEE Military Communications Conference (MILCOM 2015), October 2015.

B. Burnett, J. Al-Gharaibeh, B. Trent, R. Ramanujan, and H. Bloss, “HART: Hybrid Autonomous Router for Tactical Networks,” Proceedings of the 2015 IEEE Military Communications Conference (MILCOM 2015), October 2015.

2014

J. Wu, S. Schneider, R. Ramanujan, and M. Rambo, “ADNS IPv6 Transition Architecture and Analysis,” Proceedings of the 2014 IEEE Military Communications Conference (MILCOM 2014), October 2014.

2013

C. Webster, M. Kaddoura, B. Burnett, and R. Ramanujan, “AppShielder: A Software Applique Implementing GMSEC Security Services,” Proceedings of the IEEE Classified US Military Communications Conference (CUMC), November 2013.

2011

M. Kaddoura, B. Trent, R. Ramanujan, and G. Hadynski, “BGP-MX: Border Gateway Protocol with Mobility Extensions,” Proceedings of the 2011 IEEE Military Communications Conference (MILCOM 2011), October 2011.

H. Inoue, F. Adelstein, and R. A. Joyce, “Visualization in Testing a Digital Forensics Tool,” Proceedings of the 2011 Digital Forensics Research Conference, August 2011.

H. Inoue, F. Adelstein, M. Donovan, and S. Brueckner, “Automatically Bridging the Semantic Gap Using a C Interpreter,” Proceedings of the 2011 Annual Symposium on Information Assurance, June 2011.

2010

K. McVearry, “Pedigree Management and Assessment Framework (PMAF),” Provenance and Annotation of Data and Processes (Proceedings of the Third International Provenance and Annotation Workshop, IPAW 2010), Lecture Notes in Computer Science (LNCS), Vol. 6378, pp. 174–181, June 2010.

2009

M. Kaddoura and R. Ramanujan, “IQSM: An End-to-End IntServ QoS Signaling Mechanism for Crypto-Partitioned Networks,” Proceedings of the 2009 IEEE Military Communications Conference (MILCOM 2009), October 2009.

A. Somayaji, Y. Li, H. Inoue, J. M. Fernandez, and R. Ford, “Evaluating Security Products with Clinical Trials,” 2nd Workshop on Cyber Security Experimentation and Test (CSET ’09), August 2009.

F. Adelstein and C. Marceau, “Snapshot Filtering Based On Resource-Usage Profiles,” Proceedings of the IEEE Systematic Approaches to Digital Forensic Engineering Workshop (IEEE/SADFE ’09), May 2009.

J. Wu, Y. Kim, R. Marotz, R. Ramanujan, and J. Tyra, “Logical Network Boundary Controller,” Proceedings of the IEEE Cybersecurity Applications & Technology Conference for Homeland Security, March 2009.

R. Ramanujan, B. Burnett, and J. Wu, “Anticipatory Information Pre-Positioning System (AIPS),” Proceedings of the 2009 IEEE Aerospace Conference, March 2009.

2008

R. A. Joyce, J. Powers, and F. Adelstein, “MEGA: A Tool For Mac OS X Operating System and Application Forensics,” Proceedings of the 2008 Digital Forensic Research Workshop (DFRWS), Digital Investigation, 5 (2008) S83-S90, August 2008.

A. Hijazi, H. Inoue, P. van Oorschot, A. Matrawy, and A. Somayaji, “Discovering Packet Structure through Lightweight Hierarchical Clustering,” Proceedings of the 2008 IEEE International Conference on Communications (ICC 2008), May 2008.

R. Ramanujan, B. Burnett, C. Sanders, and J. Wu, “Geographically Targeted Information Dissemination System (GeoTIDeS),” Proceeding of the 2008 IEEE Aerospace Conference, March 2008.

J. Bonney, G. Bowering, R. Marotz, and K. Swanson, “Hardware-in-the-Loop Emulation of Mobile Wireless Communication Environments,” Proceedings of the 2008 IEEE Aerospace Conference, March 2008.

2007

H. Inoue, D. Jansens, A. Hijazi, and A. Somayaji, “NetADHICT: A Tool for Understanding Network Traffic,” Proceedings of the 21st Large Installation Systems Administration Conference (LISA ’07), November 2007.

B. Burnett, G. Bowering, R. Hagelstrom, D. Tate, and R. Ramanujan, “Multi-Radio Nodes for Mobile Mesh Networks for Emergency Response and Battle Command Systems,” Proceedings of the 2007 IEEE Military Communications Conference (MILCOM 2007), October 2007.

F. Adelstein and R. A. Joyce, “File Marshal: Automatic Extraction of Peer-to-Peer Data,” Proceedings of the 7th Digital Forensics Research Workshop (DFRWS), August 2007.

J. Horrocks, M. McVeigh, J. Snow, D. Ball, and N. Schmidt, “Availability is Inadequate, A New Paradigm for Specifying NAS-level RMA Requirements,” Parts 1–3, Journal of Air Traffic Control, Vol. 49 No. 2, Summer 2007.

J. Figueroa and K. J. Swanson, “An Operational Evaluation of the Final Approach Runway Occupancy Signal at Long Beach Airport,” Proceedings of the 2007 IEEE Integrated Communications, Navigation, and Surveillance Conference (ICNS), May 2007.

R. A. Joyce and J. P. Cormier, “iFUSE: A Development Environment for Composable, Easy-to-Assemble Information Transforms,” Proceedings of the 2007 SPIE Symposium on Defense and Security, April 2007.

M. M. Gioioso, S. D. McCullough, J. P. Cormier, C. Marceau, and R. A. Joyce, “PMAF: Pedigree Management and Assessment in a Net-Centric Environment,” Proceedings of the 2007 SPIE Symposium on Defense and Security, April 2007.

R. Carl, K. Swanson, J. Bonney, and B. Trent, “Transport Protocols in the Tactical Network Environment,” Proceedings of the 2007 IEEE Aerospace Conference, March 2007.

2006

C. Marceau and M. Stillerman, “Modular Behavior Profiles in Systems with Shared Libraries,” Proceedings of the 2006 International Conference on Information and Communications Security (ICICS ’06), Lecture Notes in Computer Science (LNCS), Vol. 4307, December 2006.

J. Figueroa and K. Swanson, “An Operational Evaluation of the Final Approach Runway Occupancy Signal,” AIAA ATIO Conference, September 2006.

M. Kaddoura, “A QoS-Aware Mobility Management Mechanism,” 2nd ACIS International Workshop on Self-Assembling Wireless Networks, June 2006.

J. P. Cormier, “A Paradigm Shift in E-Mail Treatment,” Proceedings of the 2006 International Symposium on Technology and Society, June 2006.

N. Schmidt, K. Swanson, and J. Figueroa, “An Operational Evaluation of the Final Runway Occupancy Signal,” Proceedings of the 2006 IEEE Integrated Communications, Navigation, and Surveillance Conference (ICNS), May 2006.

V. Roussev, G. Richard III, and D. Tingstrom, “dRamDisk: Efficient RAM Sharing on a Commodity Cluster,“ Proceedings of the 25th IEEE International Performance Computing and Communications Conference, April 2006.

K. Swanson and J. Judt, “CompreX: Further Developments in XML Compression,” Proceedings of the 2006 IEEE Aerospace Conference, March 2006.

F. Adelstein, “Live Forensics: Diagnosing Your System Without Killing it First,” Communications of the ACM, 49(2):63–66, February 2006.

The Common Digital Evidence Storage Format Working Group (F. Adelstein, B. Carrier, E. Casey, S. Garfinkel, C. Hosmer, J. Kornblum, J. Lyle, M. Rogers, and P. Turner), “Standardizing Digital Evidence Storage,” Communications of the ACM, 49(2):67–68, February 2006.

2005

C. Marceau and R. Joyce, “Empirical Privilege Profiling,” Proceedings of the 2005 New Security Paradigms Workshop (NSPW 2005), September 2005.

F. Adelstein, Y. Gao, and G. G. Richard III, “Automatically Creating Realistic Targets for Digital Forensics Investigation,” Proceedings of the Fifth Digital Forensics Research Workshop (DFRWS 2005), August 2005.

M. Bickford and D. Guaspari, “A Programming Logic for Distributed Systems,” ATC-NY Technical Report, 2005.

M. Bickford and R. L. Constable, “A Causal Logic of Events in Formalized Computational Type Theory,” Cornell University Technical Report, 2005.

M. Bickford, R. L. Constable, J. Y. Halpern, and S. Petride, “Knowledge-Based Synthesis of Distributed Systems Using Event Structures,” Logic for Programming, Artificial Intelligence, and Reasoning (Franz Baader and Andreo Voronsky, editors), LNCS 3452, pp. 449–465. Springer-Verlag, 2005.

M. Kaddoura, R. Ramanujan, and S. Schneider, “Routing Optimization Techniques for Wireless Ad Hoc Networks,” 1st ACIS International Workshop on Self-Assembling Wireless Networks, May 2005.

K. Swanson and J. Judt, “XML Compression and the Airborne Internet,” Proceedings of the 2005 IEEE Integrated Communications, Navigation, and Surveillance Conference (ICNS), May 2005.

C. Marceau, J. Hanna, S. D. McCullough, A. Popli, and M. Stillerman, “A Peer-to-Peer Architecture for Secure Data Storage With Query,” Proceedings of the SPIE 6249, Defense Transformation and Network-Centric Systems, April 2005.

K. Swanson and J. Judt, “CompreX: XML Compression applied to the Airborne Internet,” 2005 IEEE Aerospace Conference, March 2005.

J. Wu, R. Ramanujan, S. Kudige, T. Nguyen, and C. Sanders, “Agent Based Network Services,” Proceedings of the 2005 IEEE Military Communications Conference (MILCOM 2005), October 2005.

F. Adelstein, P. Alla, R. A. Joyce, and G. G. Richard III, “Physically Locating Wireless Intruders,” Journal of Universal Computer Science, 11(1), January 2005.

2004

M. Kaddoura and S. Schneider, “SEEHOC: Scalable and Robust End-to-End Header Compression Techniques for Wireless Ad Hoc Networks,” IEEE GLOBECOM Wireless Ad Hoc and Sensor Networks Workshop, November 2004.

J. Figueroa and K. Swanson, “A Demonstration of the Final Approach Runway Occupancy Signal,” Proceedings of the 2004 IEEE Integrated Communications, Navigation, and Surveillance Conference (ICNS), May 2004.

K. Swanson and D. Hicok, “Airport Surface Surveillance Service—an Alternate Approach,” Proceedings of the 2004 IEEE Integrated Communications, Navigation, and Surveillance Conference (ICNS), May 2004.

2003

R. Ramanujan, M. Kaddoura, J. Wu, C. Sanders, and K. Millikin, “VPNshield: Protecting VPN Services from Denial-of-Service (DoS) Attacks,” 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), May 2003.

R. Ramanujan, S. Kudige, and T. Nguyen, “Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA),” 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), May 2003.

2002

R. Ramanujan, S. Kudige, T. Nguyen, and F. Adelstein, “Intrusion-Resistant Ad Hoc Wireless Networks,” Proceedings of the 2002 IEEE Military Communications Conference (MILCOM 2002), October 2002.

R. Ramanujan, M. Kaddoura, J. Wu, K. Millikin, D. Harper, and D. Baca, “Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks,” Proceeding of the 2002 IEEE International Conference on Networking (Networks 2002), August 2002.

J. Budenske, “Expectation Verification Checking via Investigation of On-line Data Sources,” Proceedings of the 2002 International Conference on Artificial Intelligence (IC-AI 2002), June 2002.

J. Budenske, “Flight Plan Monitoring using Agent-Based Technology,” 2nd Annual NASA Integrated Communications, Navigation, and Surveillance Workshop, May 2002.

K. Millikin and R. Ramanujan, “Geographically Targeted Information Dissemination Services (GeoTIDeS),” 2nd Annual NASA Integrated Communications, Navigation, and Surveillance Workshop, May 2002.

J. Budenske, R. Ramanujan J. Bonney, K. Millikin, and O. S. Sands, “Space Network Architecture Technologies,” Proceedings of the 2002 IEEE Aerospace Conference, March 2002.

2001

J. Budenske, J. Judt, and J. Newhouse, “Distance Learning Using a WWW Lesson Composer, Presenter, & Organizer,” Proceedings of the 2001 AACE WebNet World Conference on the WWW and the Internet (WebNet 2001), October 2001.

A. Streigel, R. Ramanujan, and J. Bonney, “A Protocol Independent Internet Gateway for Ad Hoc Wireless Networks,” Proceedings of the 26th IEEE Conference on Local Computer Networks (LCN 2001), October 2001.

J. Budenske, J. Newhouse, J. Bonney, and J. Wu, “Agent-Based Schedule Validation and Verification,” Proceedings of the 2001 IEEE International Conference on Systems, Man, and Cybernetics, October 2001.

M. Bickford, C. Kreitz, R. van Renesse, and X. Liu, “Proving Hybrid Protocols Correct,” Proceedings of 14th International Conference on Theorem Proving in Higher Order Logics (TPHOLs 2001), LNCS 2152, pp.105-120, September 2001.

S. Schneider, J. Bonney, and R. Ramanujan, “Modeling and Simulation of a Distributed Intelligent Agent Based Network Fault Diagnosis Technique,” OPNETWORK 2001, August 2001.

J. Budenske and J. Newhouse, “Multi-Agent Allocation of Resources to Multiple Dynamic Tasks,” Proceedings of the 2001 International Conference on Artificial Intelligence (IC-AI 2001), June 2001.

X. Liu, R. van Renesse, M. Bickford, C. Kreitz, and R. L. Constable, “Protocol Switching: Exploiting Meta-Properties,” Proceedings of the International Workshop on Applied Reliable Group Communication (WARGC 2001), April 2001.

2000

M. Bickford, “Verifying a Pipelined Microprocessor,” Proceedings of the 19th Digital Avionics Systems Conferences (DASC), vol. 1, pp. 1A5/1–1A5/8, October 2000.

D. Guaspari and D. Naydich, D, “Analysis of Real-Time Code by Model Checking,” Proceedings of the 19th Digital Avionics Systems Conferences (DASC), vol. 1, pp. 1D5/1–1D5/8, October 2000.

R. Ramanujan, A. Ahamad, J. Bonney, R. Hagelstrom, and K. Thurber, “Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA),” Proceedings of the 2000 IEEE Military Communications Conference (MILCOM 2000), October 2000.

J. Budenske, J. Judt, J. Bonney, and J. Newhouse, “Applying Technology to Science and Technology Literacy in the Classroom,” Proceedings of the 2000 AACE WebNet World Conference on the WWW and the Internet (WebNet 2000), October 2000.

J. Budenske, J. Bonney, A. Ahamad, R. Ramanujan, D. F. Hougen, and N. Papanikolopoulos, “Nomadic Routing Applications for Wireless Networking in a Team of Miniature Robots,” Proceedings of the IEEE Conference on Systems, Man, and Cybernetics, October 2000.

J. Budenske, J. Judt, J. Bonney, and J. Newhouse, “A Science and Technology Literacy Browser,” Proceedings of the IEEE Conference on Systems, Man, and Cybernetics, October 2000.

C. Marceau, “Characterizing the Behavior of a Program Using Multiple-Length N-Grams,” Proceedings of the 2000 New Security Paradigms Workshop (NSPW 2000), September 2000.

J. Budenske, J. Bonney, J. Wu, J. Newhouse, M. Gini, and M. Reilly, “Multi-Agent Planning, Execution and Monitoring,” Proceedings of the 2000 International Conference on Artificial Intelligence (IC-AI 2000), June 2000.

R. S. Ramanujan, R. Hagelstrom, M. Kaddoura, S. Takkella, K. Thurber, and J. Wu, “Active Network Services for Mobile Wireless Environments,” Proceedings of the SPIE 4037, Aerosense 2000 Conference, April 2000.

D. F. Hougen, S. Benjaafar, J. C. Bonney, J. R. Budenske, M. Dvorak, M. Gini, H. French, D. G. Krantz, P. Y. Li, F. Malver, B. Nelson, N. Papanikolopoulos, P. E. Rybski, S. A. Stoeter, R. Voyles, and K. B. Yesin, “A Miniature Robotic System for Reconnaissance and Surveillance,” Proceedings of the 2000 IEEE International Conference on Robotics and Automation, April 2000.

N. Papanikolopoulos, M. Gini, D. G. Krantz, B. Nelson, R. Voyles, D. F. Hougen, P. E. Rybski, S. A. Stoeter, K. B. Yesin, S. Benjaafar, and J. R. Budenske, “Team of Miniature Robots for Reconnaissance and Surveillance,” Winner of Best Video Award at the 2000 IEEE International Conference on Robotics and Automation, April 2000.

R. S. Ramanujan, S. Takkella, and K. Thurber, “MobiWeb: An Approach for Mobile Web Access over Satellite Links,” Proceedings of the 2000 IEEE Aerospace Conference, March 2000.

D. F. Hougen, J. Bonney, J. Budenske, M. Dvorak, M. Gini, D. Krantz, F. Malver, B. Nelson, N. Papanikolopoulos, P. Rybski, S. Stoeter, R. Voyles, and K. Yesin, “Reconfigureable Robots for Distributed Robotics,” Government Microcircuit Applications Conference (GOMAC 2000), March 2000.