Nicholas Kyriakopoulos | The George Washington University (original) (raw)
Papers by Nicholas Kyriakopoulos
Today's Internet provides onlyasingle Class ofService (CoS)toallofitsservices (e.g., Multimed... more Today's Internet provides onlyasingle Class ofService (CoS)toallofitsservices (e.g., Multimedia, Data, Audio), namely thebest-effort service. Thisservice does notmakeanyguarantees ontheQuality ofService (QoS) anapplication receives. Thecontinuous demands forQoS guarantees haveledtotheintroduction ofvarious network-layer mechanisms that provide someend-to-end QoS assurance including MPLS,Integrated Service Model(IntServ), andDifferentiated Service Model (DiffServ). However, theQoSmappingbetween the network-layer andtheapplication-layer isstill achallenge andneeds tobeaddressed. Toguarantee andend-to-end QoS,itisessential tomapQoSparameters between these layers. A framework forinvestigating themapping ofthe packet lossrateasanimportant QoSparameter is presented here.The networkQoS performance characteristic forthelossparameter ismappedfrom lower toupper layer inaquantifiable way.
2007 International Conference on Computer Engineering & Systems, 2007
ABSTRACT No doubt that the information technology field is filled with various qualitative and qu... more ABSTRACT No doubt that the information technology field is filled with various qualitative and quantitative concepts that are used to describe the desired performance for the network user or designer. The most common performance indicator concept is the reliability concept. Based on analyzing this concept in an IP network environment, the reliability concept is further expressed by the quality of service (QoS). Any regular network user definitely cares about the reliability of the services he perceives. This reliability in fact depends on the reliability of the underlying network. Therefore, the upper layer subjective requirements need to be transparently translated into lower layer objective ones. This paper presents a systematic framework for mapping the lower-layer network QoS performance parameter embodied by the packet loss rate into the upper-layer application QoS in an objective quantifiable way. In fact, currently with the advanced highspeed networks, the focus of the IP network performance is shifting from scalability, throughput and utilization benchmarks to guaranteeing loss bounds for different applications and users. Thus, this mapping will surely allow better and reliable system design and understanding of the technical network parameters from the application's perspective of the service level agreement (SLA).
GCSP Report, 2012
There are approximately 15 bilateral or multilateral international treaties or arrangements deal... more There are approximately 15 bilateral or multilateral international treaties or
arrangements dealing with arms control, non-proliferation and disarmament, many of which include an on-site inspection (OSI) regime as part
of the treaty’s verification regime. Other inspections arise as a result of
specific, often unique, events, such as those following the Iraq war. To
date, tens of thousands of inspections have been conducted. Most of these
are routine and are based on declarations provided by the party being
inspected that need to be confirmed. Others, much fewer in number, are
of a challenge type and involve more of a fact-finding mission. This study
examines these inspection regimes with a view to assessing their usefulness and effectiveness, both individually and collectively.
SPIE Proceedings, 2001
This paper describes the benefit for potentially rectifying the multiple nonlinear Phonocardiogra... more This paper describes the benefit for potentially rectifying the multiple nonlinear Phonocardiography measurements so that we can apply the linear independent component analysis (ICA) to separate blindly the sources of heart valve murmuring in order to find a noninvasive way to ...
Intelligent Engineering Systems and Computational Cybernetics
... Course materials, Duke University, Durham, NC 7. Kyamakya K, Jobmann K, Meincke M (2000) Secu... more ... Course materials, Duke University, Durham, NC 7. Kyamakya K, Jobmann K, Meincke M (2000) Security and survivability of distributed systems: an overview. ... In: National Aerospace and Electronics Conference, Dayton, OH, 1:446–453 14. ...
IEEE Communications Surveys & Tutorials, 2009
IEEE Transactions on Reliability, 2008
... 103–131. [7] K. Kyamakya, K. Jobmann, and M. Meincke, “Security and surviv-ability of distrib... more ... 103–131. [7] K. Kyamakya, K. Jobmann, and M. Meincke, “Security and surviv-ability of distributed systems: An overview,” in Proc. ... He is a member of the IEEE. Nicholas Kyriakopoulos (LSM'07) received his BEE, MS, and D.Sc. ...
We present The AcceleGlove, a novel whole-hand input device to manipulate three different virtual... more We present The AcceleGlove, a novel whole-hand input device to manipulate three different virtual objects: a virtual hand, icons on a virtual desktop and a virtual keyboard using the 26 postures of the American Sign Language (ASL) alphabet. 1 Introduction. The AcceleGlove is a set of six dual-axis accelerometers, mounted on the fingers and the back of the palm, that report position with respect to the gravitational vector. Sensors are placed on the back of the middle phalanges, on the back of the
This paper is an attempt to use the concept of resilience to identify the way internal and extern... more This paper is an attempt to use the concept of resilience to identify the way internal and external factors influence the vulnerability and the operation of a treaty, particularly in the area of arms control. The Non- Proliferation Treaty is used as an example. To establish a resilience landscape of a treaty might be a good tool to identify the environment, in multiple dimensions, in which the treaty operates. This might help analyzing the stability of existing and future treaties and ways to reduce their vulnerability.
ABSTRACT The report presents a step by step procedure for the design of a single-channel per-carr... more ABSTRACT The report presents a step by step procedure for the design of a single-channel per-carrier, demand assignment, satellite communications network. The input for the design is the traffic matrix to be handled by the network, and the outputs are the bandwidth and power requirements for the satellite system. Although the design approach is general, a specific example chosen to illustrate the technique is the intra-European switched-traffic voice network.
Arms control treaties rely on extensive collection, processing and analysis of data to ascertain ... more Arms control treaties rely on extensive collection, processing and analysis of data to ascertain compliance with treaty obligations. Monitoring and evaluation relies on a broad range of technologies for sensing, communications and processing to collect, transmit and analyze the data necessary to detect non-compliance. The effectiveness of a treaty verification system depends on the ability of the information management system to collect and evaluate the information necessary to ascertain compliance with the treaty obligations. The information management systems for treaty verification have the same architecture because they are similar in concept and operation. They collect, transmit, store, process and analyze data. The effectiveness of each of these operations is a function of the capabilities of the associated technology. This chapter presents an overview of the technologies available for use in each of the elements of a treaty information management system. In sensing, these ran...
INITIAL RESULTS OF THE CD-1 RELIABLE MULTICAST EXPERIMENT 1 Deborah A. Agarwal 2 , Richard Stead ... more INITIAL RESULTS OF THE CD-1 RELIABLE MULTICAST EXPERIMENT 1 Deborah A. Agarwal 2 , Richard Stead 3 , Brian Coan, James E. Burns, Nishith Shah 4 , Nicholas Kyriakopoulos 5 Abstract A new version of the CD-1 continuous data protocol has been developed to support a multicasting experiment. This new version was developed to study the use of reliable multicast for sending data to multiple receivers in a single operation. The purpose of the experiment is to evaluate the existing multicasting technology for possible use in the Global Communication Infrastructure. This paper describes the initial results of the experiment. Background IP Multicast On the Internet, a class of applications has emerged that requires the ability to send messages to a group of receivers efficiently. This need has led to the development of the multicast capability in the Internet Protocol (IP). Basic IP multicast is a simple communication mechanism that allows a single message to be sent to a group of receivers as...
Verifying Treaty Compliance, 2006
Page 1. The AcceleGlove: A Whole-Hand Input Device for Virtual Reality Jose L. Hernandez-Rebollar... more Page 1. The AcceleGlove: A Whole-Hand Input Device for Virtual Reality Jose L. Hernandez-Rebollar, Nicholas Kyriakopoulos and Robert W. Lindeman The George Washington University [jreboll | kyriak | gogo]@seas.gwu.edu Abstract. ...
Automatic Face and …, 2004
Today's Internet provides onlyasingle Class ofService (CoS)toallofitsservices (e.g., Multimed... more Today's Internet provides onlyasingle Class ofService (CoS)toallofitsservices (e.g., Multimedia, Data, Audio), namely thebest-effort service. Thisservice does notmakeanyguarantees ontheQuality ofService (QoS) anapplication receives. Thecontinuous demands forQoS guarantees haveledtotheintroduction ofvarious network-layer mechanisms that provide someend-to-end QoS assurance including MPLS,Integrated Service Model(IntServ), andDifferentiated Service Model (DiffServ). However, theQoSmappingbetween the network-layer andtheapplication-layer isstill achallenge andneeds tobeaddressed. Toguarantee andend-to-end QoS,itisessential tomapQoSparameters between these layers. A framework forinvestigating themapping ofthe packet lossrateasanimportant QoSparameter is presented here.The networkQoS performance characteristic forthelossparameter ismappedfrom lower toupper layer inaquantifiable way.
2007 International Conference on Computer Engineering & Systems, 2007
ABSTRACT No doubt that the information technology field is filled with various qualitative and qu... more ABSTRACT No doubt that the information technology field is filled with various qualitative and quantitative concepts that are used to describe the desired performance for the network user or designer. The most common performance indicator concept is the reliability concept. Based on analyzing this concept in an IP network environment, the reliability concept is further expressed by the quality of service (QoS). Any regular network user definitely cares about the reliability of the services he perceives. This reliability in fact depends on the reliability of the underlying network. Therefore, the upper layer subjective requirements need to be transparently translated into lower layer objective ones. This paper presents a systematic framework for mapping the lower-layer network QoS performance parameter embodied by the packet loss rate into the upper-layer application QoS in an objective quantifiable way. In fact, currently with the advanced highspeed networks, the focus of the IP network performance is shifting from scalability, throughput and utilization benchmarks to guaranteeing loss bounds for different applications and users. Thus, this mapping will surely allow better and reliable system design and understanding of the technical network parameters from the application's perspective of the service level agreement (SLA).
GCSP Report, 2012
There are approximately 15 bilateral or multilateral international treaties or arrangements deal... more There are approximately 15 bilateral or multilateral international treaties or
arrangements dealing with arms control, non-proliferation and disarmament, many of which include an on-site inspection (OSI) regime as part
of the treaty’s verification regime. Other inspections arise as a result of
specific, often unique, events, such as those following the Iraq war. To
date, tens of thousands of inspections have been conducted. Most of these
are routine and are based on declarations provided by the party being
inspected that need to be confirmed. Others, much fewer in number, are
of a challenge type and involve more of a fact-finding mission. This study
examines these inspection regimes with a view to assessing their usefulness and effectiveness, both individually and collectively.
SPIE Proceedings, 2001
This paper describes the benefit for potentially rectifying the multiple nonlinear Phonocardiogra... more This paper describes the benefit for potentially rectifying the multiple nonlinear Phonocardiography measurements so that we can apply the linear independent component analysis (ICA) to separate blindly the sources of heart valve murmuring in order to find a noninvasive way to ...
Intelligent Engineering Systems and Computational Cybernetics
... Course materials, Duke University, Durham, NC 7. Kyamakya K, Jobmann K, Meincke M (2000) Secu... more ... Course materials, Duke University, Durham, NC 7. Kyamakya K, Jobmann K, Meincke M (2000) Security and survivability of distributed systems: an overview. ... In: National Aerospace and Electronics Conference, Dayton, OH, 1:446–453 14. ...
IEEE Communications Surveys & Tutorials, 2009
IEEE Transactions on Reliability, 2008
... 103–131. [7] K. Kyamakya, K. Jobmann, and M. Meincke, “Security and surviv-ability of distrib... more ... 103–131. [7] K. Kyamakya, K. Jobmann, and M. Meincke, “Security and surviv-ability of distributed systems: An overview,” in Proc. ... He is a member of the IEEE. Nicholas Kyriakopoulos (LSM'07) received his BEE, MS, and D.Sc. ...
We present The AcceleGlove, a novel whole-hand input device to manipulate three different virtual... more We present The AcceleGlove, a novel whole-hand input device to manipulate three different virtual objects: a virtual hand, icons on a virtual desktop and a virtual keyboard using the 26 postures of the American Sign Language (ASL) alphabet. 1 Introduction. The AcceleGlove is a set of six dual-axis accelerometers, mounted on the fingers and the back of the palm, that report position with respect to the gravitational vector. Sensors are placed on the back of the middle phalanges, on the back of the
This paper is an attempt to use the concept of resilience to identify the way internal and extern... more This paper is an attempt to use the concept of resilience to identify the way internal and external factors influence the vulnerability and the operation of a treaty, particularly in the area of arms control. The Non- Proliferation Treaty is used as an example. To establish a resilience landscape of a treaty might be a good tool to identify the environment, in multiple dimensions, in which the treaty operates. This might help analyzing the stability of existing and future treaties and ways to reduce their vulnerability.
ABSTRACT The report presents a step by step procedure for the design of a single-channel per-carr... more ABSTRACT The report presents a step by step procedure for the design of a single-channel per-carrier, demand assignment, satellite communications network. The input for the design is the traffic matrix to be handled by the network, and the outputs are the bandwidth and power requirements for the satellite system. Although the design approach is general, a specific example chosen to illustrate the technique is the intra-European switched-traffic voice network.
Arms control treaties rely on extensive collection, processing and analysis of data to ascertain ... more Arms control treaties rely on extensive collection, processing and analysis of data to ascertain compliance with treaty obligations. Monitoring and evaluation relies on a broad range of technologies for sensing, communications and processing to collect, transmit and analyze the data necessary to detect non-compliance. The effectiveness of a treaty verification system depends on the ability of the information management system to collect and evaluate the information necessary to ascertain compliance with the treaty obligations. The information management systems for treaty verification have the same architecture because they are similar in concept and operation. They collect, transmit, store, process and analyze data. The effectiveness of each of these operations is a function of the capabilities of the associated technology. This chapter presents an overview of the technologies available for use in each of the elements of a treaty information management system. In sensing, these ran...
INITIAL RESULTS OF THE CD-1 RELIABLE MULTICAST EXPERIMENT 1 Deborah A. Agarwal 2 , Richard Stead ... more INITIAL RESULTS OF THE CD-1 RELIABLE MULTICAST EXPERIMENT 1 Deborah A. Agarwal 2 , Richard Stead 3 , Brian Coan, James E. Burns, Nishith Shah 4 , Nicholas Kyriakopoulos 5 Abstract A new version of the CD-1 continuous data protocol has been developed to support a multicasting experiment. This new version was developed to study the use of reliable multicast for sending data to multiple receivers in a single operation. The purpose of the experiment is to evaluate the existing multicasting technology for possible use in the Global Communication Infrastructure. This paper describes the initial results of the experiment. Background IP Multicast On the Internet, a class of applications has emerged that requires the ability to send messages to a group of receivers efficiently. This need has led to the development of the multicast capability in the Internet Protocol (IP). Basic IP multicast is a simple communication mechanism that allows a single message to be sent to a group of receivers as...
Verifying Treaty Compliance, 2006
Page 1. The AcceleGlove: A Whole-Hand Input Device for Virtual Reality Jose L. Hernandez-Rebollar... more Page 1. The AcceleGlove: A Whole-Hand Input Device for Virtual Reality Jose L. Hernandez-Rebollar, Nicholas Kyriakopoulos and Robert W. Lindeman The George Washington University [jreboll | kyriak | gogo]@seas.gwu.edu Abstract. ...
Automatic Face and …, 2004