NOTE: The Center for Mobile Computing is no longer active, and this web site represents a historical view of its activities from 1996-2008. Although there is still mobile-computing research underway at Dartmouth, we no longer update this web site. Please contact David Kotz with any inquiries about the CMC.
[About CMC] [Partners] [Projects] [Papers] [People] [News]
Professor
Denise Anthony, Sociology Department, Dartmouth
College
Denise Anthony is an Associate Professor in the Department of
Sociology at Dartmouth College, and Adjunctt Assistant Professor
in the Department of Community and Family Medicine at Dartmouth
Medical School. Dr. Anthony's research interests include
collective action processes, economic sociology, organizational
behavior and the sociology of health care. She studies mechanisms
for producing cooperation, trust, and social capital among
low-income entrepreneurs in micro-credit borrowing groups. She is
now beginning to explore how trust affects communication and
security in the digital environment of the Internet. She works
with the PKI-Lab and the Center for Mobile Computing to explore
the development and use of technology and institutional
infrastructure for secure communication within and across wired
and wireless computer networks. She is also studying
inter-organizational communication between industry and
government organizations during the national cyber-exercise,
Livewire, sponsored by the Institute for Security and Technology
Studies at Dartmouth. In health care, she has studied how
organizational incentives and communication networks affect
physician.s referral behavior and career satisfaction. In
addition, she is exploring institutional change in the health
care industry by studying variation in managed care practices
across the industry, and variation in hospital utilization norms
across regions with differing levels of health care intensity.
Prior to her appointment at Dartmouth, Denise was a Robert Wood
Johnson Health Policy Post-doctoral Scholar at the University of
Michigan from 1997-1999. She has a PhD in Sociology (1997) from
the University of Connecticut.
Professor Andrew
Campbell, Computer Science, Dartmouth College
Andrew T. Campbell is an Associate Professor of Computer Science
at Dartmouth College, having joined Dartmouth in 2005 after
several years in the COMET group at Columbia University. Andrew
is working on emerging architectures and programmability for
wireless networks. He received his PhD in Computer Science in
1996, and the NSF CAREER Award for his research in programmable
mobile networking in 1999.
Professor George
Cybenko, Thayer School of Engineering
George is the Dorothy and Walter Gramm Professor of Engineering
at Dartmouth College. He joined Dartmouth's Thayer School of
Engineering in the fall of 1992. Prior to joining Dartmouth, he
held positions at Tufts University and the University of Illinois
at Urbana-Champaign. Cybenko received the B.Sc. degree in
Mathematics from the University of Toronto and the M.Sc. and Ph.D
degrees in the Applied Mathematics of Electrical and Computer
Engineering from Princeton University in 1978. Cybenko was the
Kloosterman Distinguished Visiting Professor at Leiden
University, the Netherlands in 1996. He is the founding
Editor-in-Chief of IEEE/AIP Computing in Science and Engineering.
Cybenko has pioneered research in several areas: signal
processing, parallel computing, neurocomputing and mobile agent
systems. His current research interest is distributed information
systems.
Professor David
Kotz, Department of Computer Science
David Kotz is the coordinator of CMC activities.
David Kotz is a Professor of Computer Science at Dartmouth
College in Hanover NH. After receiving his A.B. in Computer
Science and Physics from Dartmouth in 1986, he completed his Ph.D
in Computer Science from Duke University in 1991. He returned to
Dartmouth to join the faculty in 1991, where he is now Professor
of Computer Science, Director of the Center for Mobile Computing,
and Executive Director of the Institute for Security Technology
Studies. His research interests include context-aware mobile
computing, pervasive computing, wireless networks, and intrusion
detection. He is a member of the ACM, IEEE Computer Society, and
USENIX associations, and of Computer Professionals for Social
Responsibility.
Professor Sean
Smith, Department of Computer Science
Associate Professor Smith has been working in information
security---attacks and defenses, for industry and
government---for over a decade. In graduate school, he worked
with the US Postal Inspection Service on postal meter fraud; as a
post-doc and staff member at Los Alamos National Laboratory, he
performed security reviews, designs, analyses, and briefings for
a wide variety of public-sector clients; at IBM T.J. Watson
Research Center, he designed the security architecture for (and
helped code and test) the IBM 4758 secure coprocessor, and
then led the formal modeling and verification work that earned it
the world's first FIPS 140-1 Level 4 security validation.
Dr. Smith has published numerous refereed papers; given
numerous invited talks; and been granted nine patents. His
security architecture is used in thousands of financial,
e-commerce, and rights managements installations world-wide.
In July 2000, Sean left IBM for Dartmouth since he was convinced that the academic education and research environment is a better venue for changing the world. His current work, as PI of the Dartmouth PKI Lab, investigates how to build trustable systems in the real world.
Sean was educated at Princeton (B.A., Mathematics) and CMU (M.S., Ph.D., Computer Science).
Apu Kapadia
Apu Kapadia received his PhD from the University of Illinois at
Urbana-Champaign and was the recipient of a four-year
High-Performance Computer Science Fellowship from the Department
of Energy. His doctoral research focused on trustworthy
communication and models for privacy in pervasive environments.
In October 2005, Apu joined ISTS as a Post-Doctoral Research
Fellow and is working with Profs. David Kotz and Sean Smith on
topics related to location privacy, mobile computing,
trust-worthy platforms, and public-key
infrastructures.
Yong Sheng Yong Sheng received
the B.S. degree in Computer Engineering (1992, from Beijing
University of Posts and Telecommunications (BUPT), Beijing,
China), and the M.S. degree in Computer Engineering (1996, from
BUPT). He finished his Ph.D in Computer Engineering in August
2006, working with George Cybenko at Dartmouth College, with a
dissertation entitled ``The Theory of Trackability and Robustness
for Process Detection''. Yong is currently a postdoc research
associate in the MAP team, a project of the Institute for
Security Technology Studies and the Center of Mobile Computing at
Dartmouth College. Yong's research interests include stochastic
modeling, detection and estimation theory, time series pattern
analysis, computer and network security, autonomic computing, and
collaborative signal processing for distributed sensor networks,
and data fusion.
Bennet Vance Bennet Vance was a
public school student in Hanover when computing arrived at
Dartmouth in the 1960s. Bennet soon acquired the habit of heading
over to the computation center after school to try out his latest
BASIC programs. His subsequent career as a software developer has
included stints at AT&T Bell Laboratories in New Jersey; at
True BASIC, the compiler company cofounded by Dartmouth computing
pioneers John Kemeny and Thomas Kurtz; and at the IBM Almaden
Research Center in Silicon Valley, where he helped extend IBM's
DB2 database system. Returning to Hanover in 2001, Bennet worked
in Dartmouth's Department of Psychological and Brain Sciences
before taking his current position with the CMC. He holds a
bachelor's degree in math from Yale and graduate degrees in
computer science from Stanford and from the OGI School of Science
& Engineering.
Jihwang Yeo Jihwang Yeo is a
programmer and administrator for CRAWDAD project, working with
Professors David Kotz and Tristan Henderson. His current work is
focused on providing the research community with a large wireless
network resource archive, e.g., data sets and tools. He was a
research assistant in MIND (Maryland Information and Network
Dynamics) lab at University of Maryland, where his primary
contribution was the development of a wireless monitoring
technique for the analysis and modeling of wireless traffic. His
professional career also includes developing XML/SOAP-database
gateway when he worked at the IBM Almaden Research Center in
summer 2001. He received a master's degree in Computer Science
from University of Maryland, College Park MD. He also holds a
bachelor's degree and another master's degree in Computer
Engineering from Seoul National University,Seoul,
Korea.
Vijay Bhuse, Postdoctoral Research Fellow, ISTS, 2007
Vijay received his B. Tech. in Computer
Engineering from Dr Babasaheb Ambedkar Technological University,
Lonere, India in 2000. He received his Ph. D. in Computer Science
from Western Michigan University in 2007. He designed lightweight
intrusion detection techniques for wireless sensor networks as
part of his Ph. D. dissertation. He joined ISTS as a
post-doctoral fellow in February 2007 and is working with Prof.
David Kotz and Prof. Andrew Campbell. He has 12 publications and
3 posters in the areas of intrusion detection for wireless sensor
networks, localization, security and privacy. He was an honorable
mention at a student research poster competition held at 7th
Annual Information Security Symposium (by CERIAS at Purdue
University). He was an honorable mention for an excellence in
research award at the Department of Computer Science, Western
Michigan University for two years 2004-2005 and 2005-2006. He did
internships at ABN Amro (Mumbai), Crompton Greaves (Mumbai) and
Manatron (Portage, MI). He is a member of UPE and served as a
vice president of the local chapter at Western Michigan
University in 2003-2004.
Vincent Berk, lecturer and research scientist at the Thayer School of Engineering
Ron Peterson, Senior Programmer
Cory Cornelius '07 Metrosense
Dan Peebles '07 Metrosense
Nikos Triandopoulos Postdoc
Tristan Henderson was a Research
Assistant Professor in the Department of Computer Science at
Dartmouth College in Hanover, NH. He holds an M.A. in Economics
from the University of Cambridge, and an M.Sc and Ph.D in
Computer Science from University College London. His research
interests include wireless networks, measurement, network
economics, and networked multimedia, with a particular interest
in distributed computer games. He is a member of the ACM, IEE,
IEEE and the Worshipful Company of Scientific Instrument Makers,
and serves on the Steering Committee for the International
Workshop on Network and System Support for Games.
Minkyong Kim, Postdoctoral Research Fellow, ISTS.
Minkyong Kim, a post-doc with Professor
David Kotz. Her research interests include wireless networks,
mobile computing, and distributed systems. For her Ph.D. degree,
she worked on designing a file system for mobile clients and
estimating network capacity for adaptive systems. She received
her Ph.D. in Computer Science and Engineering from the University
of Michigan. She got her B.S. and M.S. in Computer Engineering
from Seoul National University.
Kazuhiro Minami, Ph.D in Computer Science
Kazuhiro Minami recently completed his
Ph.D. thesis "Secure Context-sensitive Authorization", in which
he built and evaluated a distributed authorization system that
protects confidential policies and context information in each
administrative domain. Kazuhiro is now a postdoctoral research
associate at Institute for Security Technology Studies at
Dartmouth College, and will be a I3P Fellow at the Information
Trust Institute at University of Illinois at Urbana-Champaign for
the 2006-2007 academic year.
Dr. Zack Butler, PostDoc with Daniela Rus and a
PostDoctoral Fellow at the ISTS Dr. Zack Butler, a postdoc
with Daniela Rus and then an Postdoctoral Fellow at the Institute
for Security Technology Studies, spent his time at Dartmouth
focused on reconfigurable robotic systems and on sensor networks.
Indeed, he was involved with the cows project described in the
cover story. He is now an assistant professor of computer science
at the Rochester Institute of Technology (RIT).
Guanling Chen, Ph.D in Computer Science
Guanling Chen completed his Ph.D thesis in 2004, "Solar: Building
A Context Fusion Network for Pervasive Computing", in which he
built and evaluated a middleware framework to support
context-aware applications in pervasive computing. Solar is
flexible and allows applications to select distributed data
sources and compose them with customized data-fusion operators
into a directed acyclic information flow graph. Guanling was an
I3P Fellow at the Institute for Security Technology Studies at
Dartmouth College, and joined the University of Massachusetts
(Lowell) beginning Fall 2005.
Dr Geoff(Guofei) Jiang, PostDoc and Researcher Currently working at NEC Research.
Dr. Geoff (Guofei) Jiang spent several years as a postdoc and then senior research scientist at Dartmouth, working on many topics in mobile computing and computer security. He recently joined NEC Research in Princeton, where he leads the Robust and Secure System Group.
Udayan Deshpande
(Kotz)
Ming Li
(Kotz)
Soumendra Nanda
(Kotz)
Libo Song
(Kotz)
Keren Tan
(Kotz)
Glenn Nofsinger (Cybenko)
Zhenhui Jiang, M.S. in Computer Science. Currently at SYSTRA Consulting in Lebanon, NH.
Zhenhui Jiang completed his M.S. thesis on "A Combined Routing Method for Ad hoc Wireless Networks", in which he proposes a way for a MANET to switch routing protocols on the fly (while continuing to route packets). He recently began work as a programmer at SYSTRA Consulting in Lebanon, NH.
Qun Li, Ph.D in Computer Science Currently an Assistant Professor at the College of William and Mary in Williamsburg,VA.
Qun Li completed his Ph.D thesis in 2004, "Mobility and
Communication in Sensor Networks", and is now an assistant
professor of computer science at the College of William and Mary
in Williamsburg, VA. His thesis considered the duality between
two important issues in sensor network research: communication
and mobility. It builds on the infrastructure of power-aware
communication and global clock synchronization and shows the
duality between communication and mobility can be achieved to
enhance each other's quality and efficiency.
Soumendra Nanda, M.S in Computer Science Currently a Ph.D candidate at Dartmouth College.
Soumendra completed his M.S thesis in 2004, "Spatial
Multipath Location Aided Routing" under Dr. Robert S Gray, and is
now working on his PhD thesis under Dr. David Kotz. His thesis
considered the use of three dimensional space and multipath/
alternate path routing strategies for mobile ad hoc
networks.
Jue Wang, M.S in Computer Science Currently an Assistant Professor at the College of William and Mary in Williamsburg,VA.
Jue Wang completed her M.S. thesis in 2004, "Performance Evaluation of a Resource Discovery Service", in which she evaluated the scalability and performance of the naming system in Solar. Solar is Guanling Chen's middleware that supports context-aware applications.
Daniel Bilar, Ph.D in Engineering Science, Thayer School of
Engineering Now on the computer science faculty at Oberlin
College, Ohio. Daniel is a graduate of Brown University (BA
1995, Computer Science), Cornell University (MEng 1997,
Operations Research and Industrial Engineering) and Dartmouth
College (PhD 2003, Engineering Sciences). Dartmouth College filed
a provisional patent for his PhD thesis work ("Quantitative Risk
Analysis of Computer Networks", Prof. G. Cybenko advisor) which
addresses the problem of risk opacity of software on wired and
wireless computer networks. His approach has used a novel
combination of statistical risk analysis, vulnerability
assessment and automated analysis of vulnerability databases. He
is a SANS GIAC Systems and Network Auditor Advisory Board
member.
Jon Bredin, Ph.D headed for Colorado
College.
Market-based Control of Mobile-agent Systemis
Jon used ideas from economics to
develop a market-based approach to the allocation of resources in
a distributed system. In his approach, computations are mobile
agents that need to jump from host to host to reach the resources
they need. They must pay for the computation time they use at
each host. The resulting market is an efficient mechanism for
fair, distributed allocation of computational resources. In the
fall Jon will be a professor in the Mathematics and Computer
Science department at Colorado College.
Michael Corr, M.S. Now at SRI International.
Michael designed and built a
collection of small sensor modules, each with a small processor
and RF network link. When turned on, his modules quickly identify
their neighbors in the ad-hoc wireless network and use a novel
GPS-based routing algorithm to communicate their sensor readings
to a central collection point.
Jon Howell, Ph.D in Computer Science. Now at
Consystant Technologies.
Naming and sharing resources across administrative
boundaries.
Jon developed a new infrastructure for secure distributed authorization, in a system he calls Snowflake. As computers become more ubiquitous and mobile, it will be increasingly necessary for them to access remote resources, whether on servers or on other mobile devices. It is important for the system to ensure that only authorized access is permitted. The idea is to allow users to share resources in a secure way. Alice can delegate authority over some of her resources to Bob, but only regarding certain forms of access. Furthermore, Bob can delegate some of that authority to Charlie, perhaps placing additional restrictions. This transitive restricted delegation is fully auditable, which means that the resource owner can later see who is trying to use the resource, and through what chain of people they obtained the authority.The system avoids any central authorization servers, and does not require all delegators to be present to verify each access, so the system fits well in the fluid networks so common in mobile computing.
A person must often maintain current knowledge of some changing information source. For example, a saleswoman in the field must see all new orders and memos relating to her area of operation. If the information source does not provide change notifications, she must keep repeating the same queries. Unfortunately, since she is using a mobile computer and wireless network, she might have extremely limited computational resources with which to make these queries. Bandwidth, in particular, might prohibit her from making fixed-interval queries to all the information sources that she might like.
What is needed is an algorithm that will automatically schedule the queries according to some estimate of (1) the importance of each information source and (2) how fast each information source is changing. Brian developed several such algorithms. Although he considered the problem of a search engine trying to maintain an up-to-date index of the Web, his algorithms are generally applicable to any bandwidth-constrained information-monitoring application, and should work well in a mobile-computing domain. Brian devised a formal framework for what it means for an observer to be "up-to-date" with respect to a particular information source, gathered empirical data about the speed with which the World Wide Web changes, and developed several algorithms for efficiently monitoring the Web. At Dartmouth, we hope to apply these same algorithms to the task of monitoring a distributed set of wireless sensors during a military operation.
Dr. Bob Gray, Adjunct Assistant
Professor of Department of Computer Science
Bob Gray, now a senior engineer at BAE Systems' Advanced
Information Technology Division in Arlington, Virginia, was until
2004 a research engineer at the Institute for Security Technology
Studies at Dartmouth College. His research interests include
mobile agents and other forms of mobile code,
information-retrieval tools for law-enforcement personnel,
honeypots and other deception technologies, and mobile ad hoc
networks (MANETs). His current work at BAE Systems focuses on
defending MANETs against purposeful attack. Bob received a B.S.
in Computer Science from the University of Vermont in 1993 and a
Ph.D in Computer Science from Dartmouth College in
1997.
Jeff Fielding '08 (Kotz)
Ruslan Dimov '08 (Kotz)
Dana Malajian '10 (Kotz)
Jack Zhang '10 (Kotz)
Ilya Abyzov '05
Nikita Dubrovsky, A.B in Computer Science Currently
working at Appian Corportation,VA. Nikita Dubrovsky graduated
in 2004 with an honors A.B. degree in computer science, based on
his senior thesis, "Mobile Agents Simulation with DaSSF", which
presents a simple mobile-agent simulation that can provide quick
information on the performance and scalability of a generic
information retrieval (IR) mobile-agent system under different
network configurations.
Calvin Newport, A.B in Computer Science Currently a Graduate Student in CS at MIT.
Cal Newport graduated in 2004 with an honors A.B.
degree in computer science, based on his senior thesis,
"Simulating mobile ad hoc networks: a quantitative evaluation of
common MANET simulation models". His work, which explored the
relationship between simulation and experimental results in ad
hoc wireless networks, provided the basis for two papers recently
presented at MSWiM. Cal is now a graduate student in computer
science at MIT.
Alexander V. Barsamian, B.A in Computer Science Currently working as a Software Programmer for Medical Media Systems in West Lebanon,NH.
Alexander worked with Sean Smith on an analysis of
the trust and privacy issues surrounding software attestation and
a prototype of a solution that addresses those issues using NSA
Security-Enhanced Linux and the Trusted Computing Group's Trusted
Platform Module. His senior thesis was titled "Software
Compartmentalization and Attestation Using SELinux and the
TPM/TCPA".
Michael DeRosa, B.A.in Computer Science, Now a
Graduate Student in CS at CMU Mike worked with Bob Gray on ad-hoc routing algorithms
for wireless sensor networks, for his senior honors thesis
project Power Conservation in the Network Stack of Wireless
Sensors . Much attention has been given to the construction
of power-conserving protocols and techniques, as battery life is
the one factor that prevents successful wide-scale deployment of
such networks. These techniques concentrate on the optimization
of network behavior, as the wireless transmission of data is the
most expensive operation performed by a sensor node. Very little
work has been published on the integration of such techniques,
and their suitability to various application domains. His thesis
presents an exhaustive power consumption analysis of network
stacks constructed with common algorithms, to determine the
interactions between such algorithms and the suitability of the
resulting network stack for various applications. Mike also
worked as a Research Associate at ISTS for a year after
graduation before joing the graduate program at CMU
Amanda Eubanks, B.A. Headed for a firm in
Florida.
Amanda started work with the CMC in her first year, developing
mobile agent applications with Debbie Chyi. She did an internship
at Handspring. In her senior year she worked with the Solar
project.
Clara Lee, B.A.in Computer Science Now at
Google. Clara's senior honors thesis analyzed data
collected over three months of 2002 to measure the persistence
and prevalence of users of the Dartmouth wireless network. For
her honors thesis Persistence
and Prevalence in the Mobility of Dartmouth Wireless Network
Users, she studied patterns of wireless-user mobility.
She found that most of the users of Dartmouth's network have
short association times and a high rate of mobility. This
observation fits with the predominantly student population of
Dartmouth College, because students do not have a fixed workplace
and are moving to and from classes all day.
Kobby Essien, B.A. headed for UPenn.
Kobby helped to deploy all of the
hardware and software necessary to trace the activity of the
wireless network over the fall term, and then to write the
software necessary to crunch the data. He went on to complete a
senior thesis in computational biology, and Fall 2002 he begins a
Ph.D program in bioengineering at the University of
Pennsylvania.
Chris Masone, B.A. headed for CS Ph.D program at Dartmouth.
Chris was awarded High Honors for his work in the
Solar project, in which he developed a small language and
run-time system that can define "roles" in terms of the changing
context. A role is a set of users who should be granted certain
access rights associated with that role. For example, one might
define a role called "room213" whose membership should be defined
to be any user currently located in room 213. Then services, such
as the projector, the room lights, and the sound system, might
grant access only to users in role "room213".
Abe White, B.A., founder of SolarMetric
Abe was awarded High Honors for his work in the Solar
project, in which he studied the fundamental performance of
Solar's event-distribution mechanism, and added an extensible
framework to allow events to be distributed in a variety of
formats, particularly XML. Abe has founded his own company to
develop and market his Java persistence software tools.
Ammar Khalid, B.A. Now at Morgan-Stanley.
Ammar developed a secure, scalable
directory service for mobile users, and applied it to the mobile
voice-over-IP application developed by Ayorkor. Chief among its
goals was protecting the privacy of mobile users, so that a
stalker cannot track the IP address (and thus the location) of a
moving user. For his work, Ammar was awarded High Honors and
shared the Kemeny Prize for Computing
Ayorkor Mills-Tettey, B.A. now in the Thayer M.E.
program. Ayorkor extended
the H.323 telephony protocols so that a voice-over-IP
conversation can continue even as the mobile user's computer
roams from access point to access point, and from IP subnet to IP
subnet, changing IP addresses. For her work, Ayorkor was awarded
High Honors and shared the Kemeny Prize for Computing.
Arun Mathias, B.A. Now at Handspring, Inc.
Arun implemented the first application
for Guanling Chen's Solar system. His SmartReminder application
reminds its user of upcoming appointments depending on the
current location and the location of the next appointment. For
his work, Arun was awarded High Honors and shared the Kemeny
Prize for Computing.
Pablo Stern, B.A. Now at Microsoft. Pablo used SNMP and an IP sniffer to trace the
activity of the new campus wireless network, to characterize the
way that people use the network. For his work, Pablo was awarded
High Honors.
Some of the 2001
graduates and their research advisor. From left to right,
Ammar Khalid, Arun Mathias, Ayorkor Mills-Tettey, Professor Dave
Kotz, and Pablo Stern
Jay Artz, B.A. Now at Vignette Corporation.
Jay's senior honors thesis aimed to create a personal radio. The goal was to develop a prototype of a next-generation digital radio, that receives audio content over a wireless digital network, caches it in the player device, and plays the content that the user wants, when she wants it. The user chooses when to listen to news, weather, or music, can skip stories or songs that are uninteresting, and can provide feedback that allows the system to learn the user's tastes.
Debbie Chyi, B.A. Now at Handspring, Inc.
Debbie's senior honors thesis project was on Windows CE, using equipment donated by Microsoft Research. Her goal was to create a personal mobile agent that would live on a wired computer and act as a proxy between a person using a wireless hand-held device, and the rest of the Internet. The agent would move from host to host in the wired network to remain close to the owner. It would act as an extended cache, retaining information too large to fit in the hand-held device, and as a filter, discarding or delaying incoming messages that are not appropriate for the users' current situation (as determined by the time and their calendar).
Flora Wan, B.A.
Flora developed a low-cost bit-error-rate measurement device for commercial off-the-shelf (COTS) Amplitude Shift Keyed (ASK) transceivers. The pseudo-random-number generator, synchronization and bit-calculation routines written in assembly code reside in two 8-bit microprocessors, one for the transmitter and one for the receiver, respectively. The COTS processors cost about $5 a piece.