• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
USMA Digital Commons United States Military Academy
  • My Account
  • FAQ
  • About
  • Home

Home > EECS > EECS_BOOKS

Books

Books

 
Printing is not supported at the primary Gallery Thumbnail page. Please first navigate to a specific Image before printing.

Follow

Switch View to Grid View Slideshow
 
  • Holistic Cyber Education by Jean Blair, Andrew Hall, and Edward Sobiesk

    Holistic Cyber Education

    Jean Blair, Andrew Hall, and Edward Sobiesk

    This paper provides a multi-level, multidisciplinary approach for holistically integrating cyber into a student’s academic experience. Our approach suggests formally integrating cyber throughout an institution’s curriculum, including within the required general education program, in electives from a variety of disciplines, as multi-course threads, as minors, and in numerous cyber-related majors. Our holistic approach complements in-class curricula with both a pervasive cyber-aware environment and experiential, outside-the-classroom activities that apply concepts and skills in real-world environments. The goal of our approach is to provide all educated individuals a level of cyber education appropriate for their role in society. Throughout the description of our approach, we include examples of its implementation at the United States Military Academy.

  • Perfect Hash Families: The Generalization to Higher Indices by Ryan Dougherty and Charles J. Colbourn

    Perfect Hash Families: The Generalization to Higher Indices

    Ryan Dougherty and Charles J. Colbourn

    Perfect hash families are often represented as combinatorial arrays encoding partitions of kitems into v classes, so that every t or fewer of the items are completely separated by at least a specified number of chosen partitions. This specified number is the index of the hash family. The case when each t-set must be separated at least once has been extensively researched; they arise in diverse applications, both directly and as fundamental ingredients in a column replacement strategy for a variety of combinatorial arrays. In this paper, construction techniques and algorithmic methods for constructing perfect hash families are surveyed, in order to explore extensions to the situation when each t-set must be separated by more than one partition.

  • Harnessing single board computers for military data analytics by Suzanne J. Matthews

    Harnessing single board computers for military data analytics

    Suzanne J. Matthews

    Executive summary: This chapter covers the use of Single Board Computers (SBCs) to expedite onsite data analytics for a variety of military applications. Onsite data summarization and analytics is increasingly critical for command, control, and intelligence (C2I) operations, as excessive power consumption and communication latency can restrict the efficacy of down-range operations. SBCs offer power-efficient, inexpensive data-processing capabilities while maintaining a small form factor. We discuss the use of SBCs in a variety of domains, including wireless sensor networks, unmanned vehicles, and cluster computing. We conclude with a discussion of existing challenges and opportunities for future use.

 
 
 

Browse

  • Collections
  • Disciplines
  • Authors

Search

Advanced Search

  • Notify me via email or RSS

Submit Your Work

  • Author FAQ
  • Submit Work

Links

  • USMA Library
  • Academy Research Division
  • DTIC
 
Elsevier - Digital Commons

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright