There are many students involved with CMC projects.
Here are some of those involved as of June 2007.
More students are listed on the PKI lab page and the Sensor Networks Group.
Former students are listed on the alumni page.
Zhenhui Jiang, M.S. in Computer Science.
Currently at SYSTRA Consulting in Lebanon, NH.
Zhenhui Jiang completed his M.S. thesis on "A Combined Routing Method
for Ad hoc Wireless Networks", in which he proposes a way for a MANET
to switch routing protocols on the fly (while continuing to route
packets). He recently began work as a programmer at SYSTRA
Consulting in Lebanon, NH.
Qun Li, Ph.D in Computer Science
Currently an Assistant Professor at the College of William and Mary in Williamsburg,VA.
Qun Li completed his Ph.D thesis in 2004, "Mobility and Communication in Sensor Networks", and is now an assistant professor of computer science at the College of William and Mary in Williamsburg, VA. His thesis considered the duality between two important issues in sensor network research: communication and mobility. It builds on the infrastructure of power-aware communication and global clock synchronization and shows the duality between communication and mobility can be achieved to enhance each other's quality and efficiency.
Soumendra Nanda, M.S in Computer Science Currently a Ph.D candidate at Dartmouth College.
Soumendra completed his M.S thesis in 2004, "Spatial Multipath Location Aided Routing" under Dr. Robert S Gray, and is now working on his PhD thesis under Dr. David Kotz. His thesis considered the use of three dimensional space and multipath/ alternate path routing strategies for mobile ad hoc networks.
Jue Wang, M.S in Computer Science
Currently an Assistant Professor at the College of William and Mary in Williamsburg,VA.
Jue Wang completed her M.S. thesis in 2004, "Performance Evaluation of a Resource Discovery Service", in which she evaluated the scalability and performance of the naming system in Solar. Solar is Guanling Chen's middleware that supports context-aware applications.
Daniel Bilar, Ph.D in Engineering Science, Thayer School of Engineering Now on the computer science faculty at Oberlin College, Ohio.
Daniel is a graduate of Brown University (BA 1995, Computer Science), Cornell University (MEng 1997, Operations Research and Industrial Engineering) and Dartmouth College (PhD 2003, Engineering Sciences). Dartmouth College filed a provisional patent for his PhD thesis work ("Quantitative Risk Analysis of Computer Networks", Prof. G. Cybenko advisor) which addresses the problem of risk opacity of software on wired and wireless computer networks. His approach has used a novel combination of statistical risk analysis, vulnerability assessment and automated analysis of vulnerability databases. He is a SANS GIAC Systems and Network Auditor Advisory Board member.
- Jon Bredin, Ph.D headed for Colorado College.
Market-based Control of Mobile-agent Systemis
Jon used ideas from economics to develop a market-based approach to the allocation of resources in a distributed system. In his approach, computations are mobile agents that need to jump from host to host to reach the resources they need. They must pay for the computation time they use at each host. The resulting market is an efficient mechanism for fair, distributed allocation of computational resources. In the fall Jon will be a professor in the Mathematics and Computer Science department at Colorado College.
- Michael Corr, M.S. Now at SRI International.
Michael designed and built a collection of small sensor modules, each with a small processor and RF network link. When turned on, his modules quickly identify their neighbors in the ad-hoc wireless network and use a novel GPS-based routing algorithm to communicate their sensor readings to a central collection point.
- Jon Howell, Ph.D in Computer Science. Now at Consystant Technologies.
Naming and sharing resources across administrative boundaries.
Jon developed a new infrastructure for secure distributed authorization, in a system he calls Snowflake. As computers become more ubiquitous and mobile, it will be increasingly necessary for them to access remote resources, whether on servers or on other mobile devices. It is important for the system to ensure that only authorized access is permitted. The idea is to allow users to share resources in a secure way. Alice can delegate authority over some of her resources to Bob, but only regarding certain forms of access. Furthermore, Bob can delegate some of that authority to Charlie, perhaps placing additional restrictions. This transitive restricted delegation is fully auditable, which means that the resource owner can later see who is trying to use the resource, and through what chain of people they obtained the authority.The system avoids any central authorization servers, and does not require all delegators to be present to verify each access, so the system fits well in the fluid networks so common in mobile computing.
- Brian Brewington, Ph.D. in Engineering. Now at Photonex.
Monitoring Information Sources under Low-Bandwidth Conditions.
A person must often maintain current knowledge of some changing information source. For example, a saleswoman in the field must see all new orders and memos relating to her area of operation. If the information source does not provide change notifications, she must keep repeating the same queries. Unfortunately, since she is using a mobile computer and wireless network, she might have extremely limited computational resources with which to make these queries. Bandwidth, in particular, might prohibit her from making fixed-interval queries to all the information sources that she might like.
What is needed is an algorithm that will automatically schedule the queries according to some estimate of (1) the importance of each information source and (2) how fast each information source is changing. Brian developed several such algorithms. Although he considered the problem of a search engine trying to maintain an up-to-date index of the Web, his algorithms are generally applicable to any bandwidth-constrained information-monitoring application, and should work well in a mobile-computing domain. Brian devised a formal framework for what it means for an observer to be "up-to-date" with respect to a particular information source, gathered empirical data about the speed with which the World Wide Web changes, and developed several algorithms for efficiently monitoring the Web. At Dartmouth, we hope to apply these same algorithms to the task of monitoring a distributed set of wireless sensors during a military operation.
- Bor Gray, Ph.D in Computer Science
Dr. Bob Gray, Adjunct Assistant Professor of Department of Computer Science
Bob Gray, now a senior engineer at BAE Systems' Advanced Information Technology Division in Arlington,
Virginia, was until 2004 a research engineer at the Institute for Security Technology Studies at Dartmouth
College. His research interests include mobile agents and other forms of mobile code, information-retrieval
tools for law-enforcement personnel, honeypots and other deception technologies, and mobile ad hoc networks
(MANETs). His current work at BAE Systems focuses on defending MANETs against purposeful attack. Bob received
a B.S. in Computer Science from the University of Vermont in 1993 and a Ph.D in Computer Science from
Dartmouth College in 1997.
Jeff Fielding '08 (Kotz)
Ruslan Dimov '08 (Kotz)
Dana Malajian '10 (Kotz)
Ilya Abyzov '05
Nikita Dubrovsky, A.B in Computer Science
Currently working at Appian Corportation,VA.
Nikita Dubrovsky graduated in 2004 with an honors A.B. degree in computer science, based on his senior thesis, "Mobile Agents Simulation with DaSSF", which presents a simple mobile-agent simulation that can provide quick information on the performance and scalability of a generic information retrieval (IR) mobile-agent system under different network configurations.
Calvin Newport, A.B in Computer Science Currently a Graduate Student in CS at MIT.
Cal Newport graduated in 2004 with an honors A.B. degree in computer science, based on his senior thesis, "Simulating mobile ad hoc networks: a quantitative evaluation of common MANET simulation models". His work, which explored the relationship between simulation and experimental results in ad hoc wireless networks, provided the basis for two papers recently presented at MSWiM. Cal is now a graduate student in computer science at MIT.
Alexander V. Barsamian, B.A in Computer Science
Currently working as a Software Programmer for Medical Media Systems in West Lebanon,NH.
Alexander worked with Sean Smith on an analysis of the trust and privacy issues surrounding software attestation and a prototype of a solution that addresses those issues using NSA Security-Enhanced Linux and the Trusted Computing Group's Trusted Platform Module. His senior thesis was titled "Software Compartmentalization and Attestation Using SELinux and the TPM/TCPA".
Michael DeRosa, B.A.in Computer Science, Now a Graduate Student in CS at CMU
Mike worked with Bob Gray on ad-hoc routing algorithms for wireless sensor networks,
for his senior honors thesis project
Power Conservation in the Network Stack of Wireless Sensors
. Much attention has been given to the construction of power-conserving
protocols and techniques, as battery life is the one factor that
prevents successful wide-scale deployment of such networks. These
techniques concentrate on the optimization of network behavior, as
the wireless transmission of data is the most expensive operation
performed by a sensor node. Very little work has been published on
the integration of such techniques, and their suitability to various
application domains. His thesis presents an exhaustive power
consumption analysis of network stacks constructed with common
algorithms, to determine the interactions between such algorithms and
the suitability of the resulting network stack for various
applications. Mike also worked as a Research Associate at ISTS for a year after graduation before joing the graduate program at CMU
Amanda Eubanks, B.A. Headed for a firm in Florida.
Amanda started work with the CMC in her first year, developing mobile agent
applications with Debbie Chyi. She did an internship
at Handspring. In her senior year she worked with the
Clara Lee, B.A.in Computer Science Now at Google.
Clara's senior honors thesis analyzed data collected over three
months of 2002 to measure the persistence and prevalence of users of
the Dartmouth wireless network. For her honors thesis
Persistence and Prevalence in the Mobility of Dartmouth Wireless Network Users,she studied patterns of wireless-user mobility. She found that most of the users of
Dartmouth's network have short association times and a high rate of
mobility. This observation fits with the predominantly student
population of Dartmouth College, because students do not have a fixed
workplace and are moving to and from classes all day.
Ammar Khalid, B.A. Now at Morgan-Stanley.
- Kobby Essien, B.A. headed for UPenn.
Kobby helped to
deploy all of the hardware and software necessary to trace the activity of the
wireless network over the fall term, and then to write the software necessary
to crunch the data. He went on to complete a senior thesis in computational
biology, and Fall 2002 he begins a Ph.D program in bioengineering at the
University of Pennsylvania.
- Chris Masone, B.A. headed for CS Ph.D program at Dartmouth.
Chris was awarded High Honors
for his work in the Solar project, in which he developed a small language and
run-time system that can define "roles" in terms of the changing context. A
role is a set of users who should be granted certain access rights associated
with that role. For example, one might define a role called "room213" whose
membership should be defined to be any user currently located in room 213.
Then services, such as the projector, the room lights, and the sound system,
might grant access only to users in role "room213".
- Abe White, B.A., founder of SolarMetric
Abe was awarded High Honors
for his work in the Solar project, in which he studied the fundamental
performance of Solar's event-distribution mechanism, and added an extensible
framework to allow events to be distributed in a variety of formats,
particularly XML. Abe has founded his own company to develop and market his
Java persistence software tools.
Ammar developed a secure, scalable directory service for mobile users, and applied it to the mobile voice-over-IP application developed by Ayorkor. Chief among its goals was protecting the privacy of mobile users, so that a stalker cannot track the IP address (and thus the location) of a moving user. For his work, Ammar was awarded High Honors and shared the Kemeny Prize for Computing
Ayorkor Mills-Tettey, B.A. now in the Thayer M.E. program.
Ayorkor extended the H.323 telephony protocols so that a voice-over-IP conversation can continue even as the mobile user's computer roams from access point to access point, and from IP subnet to IP subnet, changing IP addresses. For her work, Ayorkor was awarded High Honors and shared the Kemeny Prize for Computing.
Arun Mathias, B.A. Now at Handspring, Inc.
Arun implemented the first application for Guanling Chen's Solar system. His SmartReminder application reminds its user of upcoming appointments depending on the current location and the location of the next appointment. For his work, Arun was awarded High Honors and shared the Kemeny Prize for Computing.
Pablo Stern, B.A. Now at Microsoft.
Pablo used SNMP and an IP sniffer to trace the activity of the new campus wireless network, to characterize the way that people use the network. For his work, Pablo was awarded High Honors.
Some of the 2001 graduates and their research advisor. From left to right, Ammar Khalid, Arun Mathias, Ayorkor Mills-Tettey, Professor Dave Kotz, and Pablo Stern
Jay Artz, B.A. Now at Vignette Corporation.
Jay's senior honors thesis aimed to create a personal radio. The goal was to develop a prototype of a next-generation digital radio, that receives audio content over a wireless digital network, caches it in the player device, and plays the content that the user wants, when she wants it. The user chooses when to listen to news, weather, or music, can skip stories or songs that are uninteresting, and can provide feedback that allows the system to learn the user's tastes.
Debbie Chyi, B.A. Now at Handspring, Inc.
Debbie's senior honors thesis project was on Windows CE, using equipment donated by Microsoft Research. Her goal was to create a personal mobile agent that would live on a wired computer and act as a proxy between a person using a wireless hand-held device, and the rest of the Internet. The agent would move from host to host in the wired network to remain close to the owner. It would act as an extended cache, retaining information too large to fit in the hand-held device, and as a filter, discarding or delaying incoming messages that are not appropriate for the users' current situation (as determined by the time and their calendar).
Flora Wan, B.A.
Flora developed a low-cost bit-error-rate measurement device for commercial off-the-shelf (COTS) Amplitude Shift Keyed (ASK) transceivers. The pseudo-random-number generator, synchronization and bit-calculation routines written in assembly code reside in two 8-bit microprocessors, one for the transmitter and one for the receiver, respectively. The COTS processors cost about $5 a piece.
Copyright © 2005--2008 Dartmouth College. All rights reserved.