Capstone Status - Class 02

Mid Advisor Topic Paper Completed Presentation / Visual Aid Completed
Allen
 McMahon  The Future of Broad Band Internet Technology Feb 02 Feb 02
Argobright
 Peterman Cryptography and Cryptanalysis with Emphasis in DOD and E-Commerce Feb 02 Apr 02
Bachta
 Book  Computer Speech Recognition and Military Applications Feb 02 March 02
Ballard
 Walke  Performance Characteristics of Beowulf Clusters Feb 02 Mar 02
Beard
 McMahon  Enforcing Network Security in an Information Driven World: A Look at Network Intrusion Detection and Providing Secure Communications Between Computers  Dec 01  Dec 01
Bellina
 McMahon The Future of IPV6 on the Internet and How It Will Be Implemented Feb 02 Feb 02
Berger
 Walke  Routing Protocols Feb 02 Mar 02
Bissonnette
 Schulze Software Reuse in Video Game Design: Using Frameworks and Video Game Engines Jan 02 Mar 02
Blackmon
 Peterman  The Importance of TCP/IP V6 Feb 02 April 02
Carrell
 Book  Military Applications of Personal Digital Assistants Feb 02 Apr 02
Church
 Peterman  Network Security Systems Feb 02 March 02
Clark
 Vincent  Comparison of Routing Algorithms Feb 02 Mar 02
Cole
 Crabbe  Investigation into Modern Planning Techniques Feb 02 Apr 02
Datko
 Peterman  Shortcomings of Public Key Infrastructures  Apr 2001  Apr 2001
Dillon
 Hogan  Battlefield Augmentation Reality System (BARS) Feb 02 Apr 02
Farias
 Velazquez  Building Data Vaults using Databases Feb 02 Mar 02
Farrell
 Walke  The Open Source Security Model Feb 02 Apr 02
Finnegan
 Crabbe  Side Scan Sonar and Applications in Robotics Feb 02 Apr 02
Fisher
 Hendricks  Network Security-I*ntrusion Detection Feb 02 Apr 02
Floyd
 Brown  Mathematics and the Internet    
Fong
 Crabbe  Localization and Map Building in Mobile Robots to Assist Outdoor Military Operations in Urban Terrain    
Gast
 McMahon  Computer Networks and the Air Traffic Control System Feb 02 Feb 02
Good
 Velazquez  SNMP in Today's Environment Feb 02 Mar 02
Gravseth
 Hendricks Cable Modems in Today's World  Feb 02 Apr 02
Hefner
 Peterman  Cyber Terrorism Defense and DOD Techniques Involved Feb 02 Apr 02
Hohner
 Needham  Programming the Surface of Mars Jan 2003 March 2003
Holland
 Schulze  Control Systems and Program Development for Usage in Autonomous Unmanned Aerial Vehicles Mar 2002 Mar 2002
Hottenstein
 Vincent  Wireless Web Technology  Jan 2001  Jan 2001
Jungels
 Needham  Network Authentication Feb 02 March 02
Knutson
 Hendricks  Firewalls in Network Security Feb 02 Apr 02
Lee
 Crabbe  Use of Robots in Space Colonization Feb 02 Apr 02
Maple
 Velazquez Analysis of the Database Security in an Online Laundry Service for the Brigade Feb 02 Mar 02
Martin
 Hogan  The Ethics Involved in the Napster Debate Feb 02 Mar 02
Martyn
 Vincent  Open Source Simulation of Mobile Ad Hoc Wireless Networks Feb 02 March 02
McConnell
 Needham  Security Issues Relating to Extensible Markup Language Feb 02 March 02
McGillick
 Walke  Functional Languages and Parallel Computing Feb 02 Mar 02
McKee
 Schulze Human Computer Interaction Jan 02 Jan 02
Nilles
 Hendrick  Intrusion Detection Systems: Defending Your System from Attack Feb 02 Apr 02
Northam
 Vincent  Wireless Internet Feb 02 Mar 02
ONeal
 Crabbe  Artificial Intelligence in "Go" Feb 02 Apr 02
Odgers
 Hogan  Investigation and Application of Computer Chip Programming in Today's Automotive Environment Feb 02 Apr 02
Orr
 Walke  Open Source Software Development Feb 02 Mar 02
Ozdemir
 Hogan  Link 16 Joint Tactical Information Distribution System Feb 02 March 02
Pezzat
 Schulze An Examination of the Game Designer's Role in Game Production Jan 02 March 02
Pratt
 McMahon  Better Aviation through Computer Simulation Feb 02 Feb 02
Riojas
 Hendricks  Cryptography Feb 02 Apr 02
Rogers
 Crabbe  Parsing Natural Language Feb 02 Apr 02
Shedwick
 Vincent  The Wireless Internet Feb 02 Apr 02
Shelton
 Hendrick  Intrusion Detection Systems: Hacking and Other Ways to Defeat a Computer's Defense Feb 02 Apr 02
Simones
Hendricks  Implementing Database Technology in the Lawmaking Procedure Feb 02 Apr 02
Simpson
 Vincent Wireless LANS: Making Them Work Feb 02 March 02
Smith
 Schulze Forensic Computing Feb 02 Mar 02
Soukup
 Book Information Warfare, Offense and Defense Feb 02 Apr 02
Spera
 Velazquez Online Brigade Weekend List Program Implemented on a Distributed Database System and Multiple Web Services Feb 02 Mar 02
Stein
 Velazquez The Brigade of Midshipmen Online 0800 Report Feb 02 Mar 02
Sweeney
 Hogan  Viruses are Spreading Worldwide.  How and Why is this Happening? Feb 02 Apr 02
Tanner
 Brown  Version COntrol and Distributed Software Development Feb 02 Apr 02
Tennant
 Crabbe An Analysis of the Use of Artificial Intelligence for Machine Translation To and From Natural Languages Feb 02 Apr 02
Timmons
 Needham  The Wireless Web Feb 02 March 02
Tolson
 Book Applying Civilian Leaps in Technology to Military Flight Simulation Feb 02 Apr 02
Turner
 Hogan  Computer Ethics and Hacking Feb 02 Mar 02
Whitten
 Needham Java for Embedded Systems Feb 02 March 02
Young
 Hendrick Cyberterrorism vs Conventinal Terrorism and its Effects on the Transporation System Feb 02 Apr 02