Hanging Messages: Using Context-Enhanced Messages for Just-In-Time Communication by Emily L

Total Page:16

File Type:pdf, Size:1020Kb

Hanging Messages: Using Context-Enhanced Messages for Just-In-Time Communication by Emily L Hanging Messages: Using Context-Enhanced Messages For Just-In-Time Communication by Emily L. Chang Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY May 2001 ® Massachusetts Institute of Technology 2001. All rights reserved. A u th or ....................................... Department of Elect rica pu ence May 17, 2001 C ertified by ......................... Pattie Maes Associate Professor, Media Arts and Sciences Thesis Supervisor A ccepted by ....................... r .... ........ ....... Arthur C. Smith Chairman, Department Committee on Graduate Students MASSACHUSETTS INS-TITUTE OF TECHNOLOGY JUL 112001 LIBRARIES BARKER 2 Hanging Messages: Using Context-Enhanced Messages For Just-In-Time Communication by Emily L. Chang Submitted to the Department of Electrical Engineering and Computer Science on May 17, 2001, in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract Recent innovations in wireless and mobile computing have enabled the development of Just-In-Time communication channels using devices such as cell phones and handhelds. However, as with existing systems such as e-mail, there is a real danger that individuals will be overwhelmed by the speed and volume of information flow. The solution presented in this thesis is to locate an agent on each user's mobile wireless device, which will make use of information about the user to filter incoming communications. Specifically, the system uses contextual information, the current time and location of the recipient, in combination with user expressed preferences, to filter messages. Ideally, a user should never receive any message which is unsolicited or irrelevant to her current context. The complete implementation includes a central message server and any number of wire- less Internet-enabled, location-aware mobile devices, which may send and receive messages. Among the filtering mechanisms used by the agent are a precise hierarchical categorization for messages, user profiling by rules, and multiple location-based operational modes for each user. The end result is a Just-In-Time communication system which allows users to quickly receive relevant, time and location-sensitive messages. Thesis Supervisor: Pattie Maes Title: Associate Professor, Media Arts and Sciences 3 4 Acknowledgments I am grateful to my advisor, Pattie Maes, who was constantly available to provide advice, suggestions, ideas, and feedback, and kept my project from running off in strange directions. I also want to thank Jim Youll, Joanie Morris, Sybil Shearin, and the rest of the Agents, for being generous with their time and experience, and particularly for helping me out early in the year, when I was young and clueless. To my apartment-mates (both upstairs and downstairs), and especially to Danny Lai, thanks for keeping me sane. To Mom, Dad, Michelle, and Andrew, thanks for your continued love and support and for always being there for me. 5 6 Contents 1 Introduction 13 1.1 Just-In-Time M essaging ........ ..................... 13 1.2 Context-Enhanced M essages. ........... .............. 14 1.2.1 Time and Location of Delivery ..................... 14 1.3 Client-side Agent Filtering. ........................... 15 1.3.1 Categories. ................................ 16 1.4 Hanging M essages ................................ 16 1.5 Document Overview ............................... 17 2 Vision 19 2.1 Overview ..................................... 19 2.2 Scenarios of Use ................................. 20 2.2.1 Personal Reminders ........................... 20 2.2.2 Requests from Others ...... .................... 21 2.2.3 Promotional Use .............. ............... 21 2.2.4 Distributing Information ............... .......... 23 2.3 Research Focus ...... ............. .............. 23 2.3.1 Importance of Filtering .................... ..... 23 2.3.2 Overview of M echanisms . ............. ........... 24 3 Design and Implementation 27 3.1 System Architecture .................... ........... 27 3.1.1 Overview ... ......................... ..... 28 3.1.2 Server M odules ......................... ..... 29 3.1.3 Client M odules .............................. 30 3.1.4 Design Decisions .... ......................... 32 3.2 Filtering M echanisms .......... ..................... 32 3.2.1 M essage Categories ............. ............... 33 3.2.2 M odes and Locations ........................... 35 3.2.3 User Profiles ............................... 36 3.2.4 M essage M anagement ...... .................... 37 3.2.5 Summary ................................. 38 3.3 Implementation .................................. 38 3.3.1 Server ................................... 38 3.3.2 Client .................... ............... 39 3.3.3 Communication Protocols ........................ 40 7 4 Using Hanging Messages 43 4.1 Client Usage . ..... .... ..... .... ..... .... ..... .. 43 4.1.1 Starting a Session . .... .... ... .... .... ... .... 43 4.1.2 Composing M essages ... .... ..... .... .... .... ... 44 4.1.3 Incoming M essages .. .... .... .... ..... .... .... 44 4.1.4 Login Options . .... .... ... .... ... .... .... ... 45 4.1.5 M essage Visibility ... ..... .... .... .... ..... ... 46 4.1.6 M essage Retrieval Options. .... .... .... .... .... ... 47 4.1.7 Filtering Options . ..... ..... ..... ..... ..... ... 49 4.1.8 Help M anuals .... ...... ....... ...... ...... .. 53 4.2 Installation and Configuration. ..... ..... ...... ..... .... 54 4.2.1 Server .... ..... .... .... .... ..... .... .... 54 4.2.2 Client .. .... .... ..... .... .... .... ..... ... 55 5 Evaluation 57 5.1 Significant System Characteristics ..... ....... ....... .... 57 5.1.1 Connectivity and Bandwidth .. ..... ..... ..... ..... 57 5.1.2 Software Concerns .... ..... ..... ..... ..... .... 58 5.1.3 Configurability .. ...... ....... ...... ...... ... 59 5.1.4 User Privacy . ..... ..... ..... ..... ..... ..... 60 5.2 Usability .. ...... ..... ...... ..... ...... ..... ... 61 5.2.1 User Feedback ... ..... ..... ..... ..... ..... .. 61 5.2.2 Implementation Changes .. ....... ...... ...... ... 62 6 Related Work 65 6.1 Find-The-Nearest .... ..... ...... ..... ...... ..... .. 65 6.2 Location and Customization ...... ......... ......... ... 65 6.3 Location and Information ... ...... ..... ...... ..... ... 66 6.4 Location and Messaging . ...... ..... ..... ...... ..... 67 6.4.1 Locust Swarm . ..... ..... ..... ..... ..... .... 67 6.4.2 HaikuHaiku ... ..... ..... ..... ..... ..... .... 67 6.4.3 Geocorder . ..... .... .... ..... .... .... .... .. 67 6.4.4 comMotion .. .... ..... .... .... .... ..... .... 68 6.4.5 GeoNotes . .... .... ... .... .... ... .... ... ... 68 6.5 Just-In-Time Filtering .... .... ..... .... ..... .... .... 69 6.5.1 Pigeon . ............. ............ ......... 69 6.5.2 E-mail ..... ....... ...... ....... ...... .... 70 7 Concluding Remarks 71 7.1 Future Implementation .. ..... ...... ..... ...... ..... 71 7.1.1 M essage Modification ..................... ..... 71 7.1.2 M essage Reactivation .. ..... ..... ..... ..... .... 72 7.1.3 M ultiple Locations .... ..... ..... ..... ..... .... 72 7.1.4 Complex Filtering Rules . ...... ...... ....... ..... 72 7.1.5 Recognition Groups . ..... .... .... .... ..... .... 73 7.1.6 Agent Learning . .... ..... .... .... .... ..... ... 73 7.1.7 Encryption .... .... ..... .... .... .... .... ... 73 7.2 Conclusion ...... ..... ...... ..... ...... ..... ... 74 8 A Server: Class Dependencies 75 B Client: Class Dependencies 77 C Server Communication Protocol 79 9 10 List of Figures 2-1 A personal grocery list ........ ..................... 20 2-2 A request to run an errand .... .............. ......... 21 2-3 A special promotion ........ .............. ......... 22 2-4 Information about a construction site ......... ............ 23 2-5 Selecting a message attribute . ......... ......... ....... 24 2-6 Inserting a message value ............. .............. 24 2-7 The new rule is added to the profile ....... .............. 25 2-8 Known sender list .............. ................ .. 26 3-1 Primary interactions between client and server . .............. 29 3-2 Diagram of server architecture .............. ........... 30 3-3 Diagram of client architecture ........ ............. .... 31 3-4 Diagram of category hierarchy ..... ......... ......... .. 34 3-5 Editing profile rules for the current mode ............ ....... 36 3-6 Editing profile rules for all modes ... ............. ....... 37 4-1 Logging into the client ......... ............. ....... 43 4-2 Composing a new message .... ......... ......... ..... 44 4-3 An incoming message ....... ......... ......... ..... 45 4-4 The user can choose a different message server .... ............ 45 4-5 Location can be manually set or automatically determined .. ....... 46 4-6 Menu options ...... ......... ......... ......... .. 47 4-7 Users can assign nicknames to locations ........ ......... ... 47 4-8 Users can change their current mode of operation .. ......... ... 48 4-9 Users can set the search radius for messages ....... .......... 49 4-10 Changing filtering options ..... ......... ......... ..... 49 4-11 Editing personal profiles ....................... ..... 50 4-12 Selecting a message attribute ........... .............. 50 4-13 Inserting a message value ... ......... ......... ....... 51
Recommended publications
  • Daniel Nashed "CSI Domino" Diagnostic Collection & NSD Analysis
    "CSI Domino" Diagnostic Collection & NSD Analysis Daniel Nashed AdminCamp 2016 – Sept. 19-21 in Gelsenkirchen About the presenter ● Nash!Com – German IBM® Business Partner/ISV – Member of The Penumbra group -- an international consortium of selected Business Partners pooling their talent and resources ● Focused on Cross-Platform C-API, IBM® Domino® Infrastructure, Administration, Integration, Troubleshooting and IBM® Traveler – Platform Focus: Microsoft® Windows® 32/64, Linux® and IBM AIX® ● Author of the Domino on Linux®/UNIX® Start Script – Note: Working on RHEL7 + SLES 12 “systemd” support Agenda ● Introduction – What is „Serviceability“ ● Automatic Data Collection (ADC), Configuration Collector ● NSD, Memcheck – Server Crashes, Hangs, Annotation of NSDs ● Memory Management ● Advanced Methods – Semaphore Debugging – Memory Dumps ● Performance Troubleshooting ● Q&A – Any time Useful Software & Tools ● Software – Notes Peek – Lotus Notes Diagnostics (LND) – 7Zip – open source ZIP tool – Ultraedit (commerical but great) or Notepad++ (free) – NashCom Tools ● nshcrash ● Nshmem ● C-API Toolkit – Great source of information What is Serviceability? ● RAS = Reliability Availability Serviceability ● RAS is the effort to improve the Domino Product suite so that: – Client/Server doesn’t crash or hang as often (Reliability) – Client/Server performs well, Server is available to clients (Availability) – The ability to quickly pin-point and fix problems (Serviceability) ● Ongoing effort in each incremental release – Some features are even back-ported
    [Show full text]
  • Sir Charles Poised for Comms Vision
    Bahman Rahimi: An Node4 channel chief entrepreneur with his outlines strategy for mind on growth p32 mid-market push p46 VOL 22 ISSUE 5 OCTOBER 2017 www.comms-dealer.com Call recording for PCI, FCA and MiFID ll compliance. oak.co.uk ADVERTISEMENT ADVERTISEMENT THE HEARTBEAT OF THE UK COMMS INDUSTRY THINK For Reliable & Scaleable Recording Solutions, MiFIDII, FCA & PCI Compliance e: [email protected] t: 020 3488 1498 w: www.vidicodeuk.com 3-22 Industry News Fully white labelled Catch up with hosted telephony events in comms solution from £2.75 Take Control of Your PBX Deploy24 on Windows, Linux or in the Cloud Business Matters Q3 dominated by fibre-fest and M&A CD_commcloud.pdf 1 24/04/2017 12:24 www.channeltelecom.com www.channeltelecom.com 26 Experience the Interview Sir Charles poisedC Thirkill and the rise M of3CX GCI People PhoneCloud System Y CM Communications Cloud • Easy to install & managefor Comms VisionMY 34 CY We get your • Inexpensive to buy and expand Case study SIR Charles Dunstone, one of the UK’s most successful ICT entrepreneurs, willCMY employees, outline his vision for the future of the industry at Gleneagles next month. • VirtualizeApprenticeships or run in and the cloud (Windows / Linux) K customers and why they matter apps talking • Halve your phone bill with SIPEXCLUSIVE Trunks ing a culture to drive growth’, In June 2012 Dunstone rec- TalkTalk Executive Chairman eived a Knighthood for his ser- • Increase48 mobility with smartphoneComms Vision Conference clients org- Sir Charles will take part in vices to the telecommunications aniser Comms Dealer has con- an exclusive conversation and industry and his charitable work.
    [Show full text]
  • Messages End-To-End Encryption Overview
    Messages End-to-End Encryption Overview Technical Paper Emad Omara Communications Security Lead November 2020 Version 1.0 A high-level technical overview of end-to-end encryption in Messages Introduction ​2 Background & RCS Ecosystem ​3 Threat Model ​3 Goals ​4 UI Changes ​4 SMS/MMS Fallback ​5 Identity Verification ​6 E2EE in Messages ​7 Signal Protocol ​7 Key Server ​8 Messages Encryption ​9 Attachment Encryption ​10 Session Recovery ​10 Web Client ​10 Storage & Access ​11 Android Messages Database ​11 Notifications ​11 Limitations ​11 Third Party RCS Client ​11 Conclusion ​12 Introduction Rich Communication Services (RCS) is designed to improve users’ experience and security over Short Message Service (SMS)/Multimedia Messaging Service (MMS), and we’ve invested in making Messages by Google a modern and globally available RCS & SMS/MMS messaging app for Android phones. While RCS messages are already a big security improvement over SMS/MMS, we wanted to take it a step further and add end-to-end encryption (E2EE) to Messages, so no one else – including 2 Messages E2EE Overview​ Google servers or third-party servers – can access your conversations as they travel between your phone and the phone you message. Background & RCS Ecosystem RCS uses a set of standard internet protocols like Session Initiation Protocol (SIP)​[1] ​ to establish a connection between two clients through a central messaging server. This connection is then used to exchange the messages using Message Session Relay Protocol (MSRP)​[2].​ In some RCS deployments this server is hosted by the carrier, and in other deployments the server is hosted by Jibe Mobile from Google.
    [Show full text]
  • Oracle® Beehive Oracle Beehive Standards-Based Clients Help Release 2 (2.0)
    Oracle® Beehive Oracle Beehive Standards-Based Clients Help Release 2 (2.0) November 2011 Last updated on November 4, 2011 This page contains configuration instructions and other related information for the following standards-based clients supported by Oracle Beehive: Hardware and Software Certification Managing your E-Mails ■ Apple Mail ■ Microsoft Outlook ■ Mozilla Thunderbird Managing Calendar and Task List ■ Apple iCal ■ Mozilla Lightning Using Instant Messaging ■ Apple iChat ■ Pidgin ■ Trillian Pro Accessing Documents (Web Clients and FTP Clients) ■ Browser-based Access ■ Desktop WebDAV Clients ■ Mac OS X Finder Web Access ■ Cadaver ■ Microsoft Windows Web Folders ■ Desktop FTP Clients ■ FileZilla ■ NCFTP ■ SmartFTP ■ Transmit RSS Clients Mobile Access Documentation Accessibility 1 Hardware and Software Certification The hardware and software requirements included in this installation guide were current at the time this guide was published. However, because new platforms and operating system software versions might be certified after this guide is published, review the certification matrix on the My Oracle Support Web site for the most up-to-date list of certified hardware platforms and operating system versions. My Oracle Support is available at the following URL: http://support.oracle.com/ You must register online before using My Oracle Support. Use the following steps to locate the certification information for your platform: 1. After logging in, click the Certifications tab. 2. In the Certification Search pane, on the Search tab, select the following information: ■ Product: Enter the product name or select from the drop-down list of Products. ■ Release: Select the release number of the product. ■ Platform: Select the target platform by choosing from the submenu list.
    [Show full text]
  • Wschodnioeuropejskie Czasopismo Naukowe (East European Scientific Journal) #7(59), 2020 39 Osmak A
    Wschodnioeuropejskie Czasopismo Naukowe (East European Scientific Journal) #7(59), 2020 39 Osmak A. S. Ph.D. student in the Chair of Information Policy and Digital Technologies National Academy of Public Administration under the President of Ukraine, Arsenovich L. A. Ph.D. student in the Chair of Information Policy and Digital Technologies National Academy of Public Administration under the President of Ukraine Karpenko Y. V. Ph.D. student in the Chair of public administration and public service National Academy of Public Administration under the President of Ukraine INSTANT MESSAGE EXCHANGE SYSTEMS IN THE PRACTICE OF PUBLIC GOVERNANCE. CLASSIFICATION, SECURITY, INTEROPERABILITY AND REMOTE CYBER EDUCATION Осьмак Антон Сергійович, аспірант кафедри інформаційної політики та цифрових технологій Національної академії державного управління при Президентові України Арсенович Леонід Антонович, аспірант кафедри інформаційної політики та цифрових технологій Національної академії державного управління при Президентові України Карпенко Юлія Василівна, аспірантка кафедри публічного управління та публічної служби Національної академії державного управління при Президентові України СИСТЕМИ ОБМІНУ МИТТЄВИМИ ПОВІДОМЛЕННЯМИ У ПРАКТИЦІ ПУБЛІЧНОГО УПРАВЛІННІ. КЛАСИФІКАЦІЯ, БЕЗПЕКА, ІНТЕРОПЕРАБЕЛЬНІСТЬ ТА ДИСТАНЦІЙНА КІБЕРОСВІТА Abstract. The article scientifically considers the essence of modern digital communication systems. The factual analysis of modern means of digital communications and their use in the field of public administration and cyber education is carried out. The use of artificial intelligence in the digital communications of public authorities is considered. The definition of "Instant (digital) messages" and "сhatbot" is defined. The issue of cryptographic protection of digital messages and the impact of the COVID-19 pandemic on the development of digital communication systems are considered. The typology of instant messaging services by main functions is offered.
    [Show full text]
  • Green Tweets
    twitter_praise_page Page i Thursday, March 12, 2009 12:35 PM Praise for Twitter API: Up and Running “Twitter API: Up and Running is a friendly, accessible introduction to the Twitter API. Even beginning web developers can have a working Twitter project before they know it. Sit down with this book for a weekend and you’re on your way to Twitter API mastery.” — Alex Payne, Twitter API lead “This book rocks! I would have loved to have had this kind of support when I initially created TwitDir.” — Laurent Pantanacce, creator of TwitDir “Twitter API: Up and Running is a very comprehensive and useful resource—any developer will feel the urge to code a Twitter-related application right after finishing the book!” — The Lollicode team, creators of Twitscoop “A truly comprehensive resource for anyone who wants to get started with developing applications around the Twitter platform.” — David Troy, developer of Twittervision “An exceptionally detailed look at Twitter from the developer’s perspective, including useful and functional sample code!” — Damon Cortesi, creator of TweetStats, TweepSearch, and TweetSum “This book is more than just a great technical resource for the Twitter API. It also provides a ton of insight into the Twitter culture and the current landscape of apps. It’s perfect for anyone looking to start building web applications that integrate with Twitter.” — Matt Gillooly, lead developer of Twalala “A wonderful account of the rich ecosystem surrounding Twitter’s API. This book gives you the insight and techniques needed to craft your own tools for this rapidly expanding social network.” — Craig Hockenberry, developer of Twitterrific twitter_praise_page Page ii Thursday, March 12, 2009 12:35 PM Twitter API: Up and Running Twitter API: Up and Running Kevin Makice Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Twitter API: Up and Running by Kevin Makice Copyright © 2009 Kevin Makice.
    [Show full text]
  • Frequently Asked Questions (Faqs) Frequently Asked Questions (Faqs) P/N 82092502, Revision C Copyright © 2003 by Multi-Tech Systems, Inc
    Frequently Asked Questions (FAQs) Frequently Asked Questions (FAQs) P/N 82092502, Revision C Copyright © 2003 by Multi-Tech Systems, Inc. All rights reserved. This publication may not be reproduced, in whole or in part, without prior expressed written permission from Multi-Tech Systems, Inc. Multi-Tech Systems, Inc. makes no representation or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Furthermore, Multi-Tech Systems, Inc. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Multi-Tech Systems, Inc., to notify any person or organization of such revisions or changes. Revision Date Description A 10/15/98 Manual released. B 11/30/98 Manual Revised. C 7/22/03 Manual Revised. Removed discussion group url. Multi-Tech, CommPlete, and the Multi-Tech logo are trademarks of Multi-Tech Systems, Inc. Other trademarks and trade names mentioned in this publication belong to their respective owners. Multi-Tech Systems, Inc. 2205 Woodale Drive Mounds View, Minnesota 55112 (612) 785-3500 or (800) 328-9717 U.S. Fax (612) 785-9874 Technical Support (800) 972-2439 BBS (612) 785-3702 or (800) 392-2432 Fax Back (612) 717-5888 Internet Address: http://www.multitech.com Contents Frequently-Asked Questions .........................................................................4 General CommPlete System FAQs .........................................................5 3rd Party
    [Show full text]
  • Wireless Data Lans
    WIRELESS DATA DEMYSTIFIED THE McGRAW-HILL DEMYSTIFIED SERIES 3G Wireless Demystified 802.11 Demystified Bluetooth Demystified CEBus Demystified Computer Telephony Demystified Cryptography Demystified DVD Demystified GPRS Demystified MPEG-4 Demystified SIP Demystified SONET/SDH Demystified Streaming Media Demystified Video Compression Demystified Videoconferencing Demystified Wireless Data Demystified Wireless LANs Demystified Wireless Messaging Demystified Wireless Data Demystified John R. Vacca McGraw-Hill New York • Chicago • San Francisco • Lisbon London • Madrid • Mexico City • Milan • New Delhi San Juan • Seoul • Singapore Sydney • Toronto Copyright © 2003 by The McGraw-HIll Companies, Inc. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. 0-07-142919-0 The material in this eBook also appears in the print version of this title: 0-07-139852-X. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occur- rence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at [email protected] or (212) 904-4069.
    [Show full text]
  • The Client/Server Architecture DES-0005 Revision 4
    PNNL-22587 The Client/Server Architecture DES-0005 Revision 4 Charlie Hubbard February 2012 The Client/Server Architecture Charlie Hubbard DES-0005 Revision 4 February 2012 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof, or Battelle Memorial Institute. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. PACIFIC NORTHWEST NATIONAL LABORATORY operated by BATTELLE for the UNITED STATES DEPARTMENT OF ENERGY under Contract DE-AC05-76RL01830 Printed in the United States of America Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831-0062 ph: (865) 576-8401 fax: (865) 576-5728 email: [email protected] Available to the public from the National Technical Information Service,
    [Show full text]
  • DETECTING BUFFER OVERFLOWS USING TESTCASE SYNTHESIS and CODE INSTRUMENTATION by MICHAEL A
    DETECTING BUFFER OVERFLOWS USING TESTCASE SYNTHESIS AND CODE INSTRUMENTATION by MICHAEL A. ZHIVICH S.B., Electrical Engineering and Computer Science (2004) Massachusetts Institute of Technology SUBMITTED TO THE DEPARTMENT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ENGINEERING IN ELECTRICAL ENGINEERING AND COMPUTER SCIENCE at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2005 c Massachusetts Institute of Technology 2005. All rights reserved. Author............................................................................ Department of Electrical Engineering and Computer Science May 19, 2005 Certified by........................................................................ Richard Lippmann Senior Scientist, MIT Lincoln Laboratory Thesis Supervisor Accepted by....................................................................... Arthur C. Smith Chairman, Department Committee on Graduate Students 2 Detecting Buffer Overflows Using Testcase Synthesis and Code Instrumentation by Michael A. Zhivich Submitted to the Department of Electrical Engineering and Computer Science on May 19, 2005, in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract The research presented in this thesis aims to improve existing approaches to dynamic buffer overflow detection by developing a system that utilizes code instrumentation and adap- tive test case synthesis to find buffer overflows and corresponding failure-inducing
    [Show full text]
  • Tsung Documentation Release 1.7.0
    Tsung Documentation Release 1.7.0 Nicolas Niclausse Oct 08, 2017 Contents 1 Introduction 3 1.1 What is Tsung?..............................................3 1.2 What is Erlang and why is it important for Tsung?...........................3 1.3 Tsung background............................................3 2 Features 5 2.1 Tsung main features...........................................5 2.2 HTTP related features..........................................6 2.3 WEBDAV related features........................................6 2.4 Jabber/XMPP related features......................................6 2.5 PostgreSQL related features.......................................7 2.6 MySQL related features.........................................7 2.7 Websocket related features........................................7 2.8 AMQP related features..........................................7 2.9 MQTT related features..........................................7 2.10 LDAP related features..........................................8 2.11 Raw plugin related features.......................................8 2.12 Complete reports set...........................................8 2.13 Highlights................................................8 3 Installation 9 3.1 Dependencies...............................................9 3.2 Compilation............................................... 10 3.3 Configuration............................................... 10 3.4 Running................................................. 10 3.5 Feedback................................................
    [Show full text]
  • Instant Messaging Service Reference
    IceWarp Unified Communications Instant Messaging Service Reference Version 10.4 Printed on 16 April, 2012 Contents Instant Messaging 1 Reference ....................................................................................................................................................................... 2 General .............................................................................................................................................................. 2 Services .............................................................................................................................................................. 2 Trusted Hosts ..................................................................................................................................................... 8 Archive/History .................................................................................................................................................. 9 File Transfers between Clients ..................................................................................................................................... 10 Monitoring via IM ......................................................................................................................................................... 12 Monitor Services and Get Your GW Events, Tasks and Notes via IM .................................................. 12 Usage ..................................................................................................................................................
    [Show full text]