<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns:mv="http://macVmlSchemaUri" xmlns="http://www.w3.org/TR/REC-html40"> <head> <meta name=Title content="Publication List"> <meta name=Keywords content=""> <meta http-equiv=Content-Type content="text/html; charset=unicode"> <meta name=ProgId content=Word.Document> <meta name=Generator content="Microsoft Word 15"> <meta name=Originator content="Microsoft Word 15"> <link rel=File-List href="Sumita_publication.fld/filelist.xml"> <link rel=Edit-Time-Data href="Sumita_publication.fld/editdata.mso"> <!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} </style> <![endif]--> <title>Publication List</title> <!--[if gte mso 9]><xml> <o:DocumentProperties> <o:Author>faculty</o:Author> <o:Template>Normal</o:Template> <o:LastAuthor>Sumita Mishra</o:LastAuthor> <o:Revision>3</o:Revision> <o:TotalTime>11</o:TotalTime> <o:Created>2017-01-06T20:43:00Z</o:Created> <o:LastSaved>2017-01-06T21:18:00Z</o:LastSaved> <o:Pages>1</o:Pages> <o:Words>3120</o:Words> <o:Characters>17790</o:Characters> <o:Company>Lenovo</o:Company> <o:Lines>148</o:Lines> <o:Paragraphs>41</o:Paragraphs> <o:CharactersWithSpaces>20869</o:CharactersWithSpaces> <o:Version>15.0</o:Version> </o:DocumentProperties> <o:OfficeDocumentSettings> <o:AllowPNG/> </o:OfficeDocumentSettings> </xml><![endif]--> <link rel=themeData href="Sumita_publication.fld/themedata.thmx"> <!--[if gte mso 9]><xml> <w:WordDocument> <w:Zoom>BestFit</w:Zoom> <w:SpellingState>Clean</w:SpellingState> <w:GrammarState>Clean</w:GrammarState> <w:TrackMoves>false</w:TrackMoves> <w:TrackFormatting/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF/> <w:LidThemeOther>EN-US</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables/> <w:SnapToGridInCell/> <w:WrapTextWithPunct/> <w:UseAsianBreakRules/> <w:UseWord2010TableStyleRules/> <w:DontGrowAutofit/> <w:DontUseIndentAsNumberingTabStop/> <w:FELineBreak11/> <w:WW11IndentRules/> <w:DontAutofitConstrainedTables/> <w:AutofitLikeWW11/> <w:HangulWidthLikeWW11/> <w:UseNormalStyleForList/> <w:SplitPgBreakAndParaMark/> <w:DontVertAlignCellWithSp/> <w:DontBreakConstrainedForcedTables/> <w:DontVertAlignInTxbx/> <w:Word11KerningPairs/> <w:CachedColBalance/> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math"/> <m:brkBin m:val="before"/> <m:brkBinSub m:val="&#45;-"/> <m:smallFrac m:val="off"/> <m:dispDef/> <m:lMargin m:val="0"/> <m:rMargin m:val="0"/> <m:defJc m:val="centerGroup"/> <m:wrapIndent m:val="1440"/> <m:intLim m:val="subSup"/> <m:naryLim m:val="undOvr"/> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false" DefSemiHidden="false" DefQFormat="false" DefPriority="99" LatentStyleCount="382"> <w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 6"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 7"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 8"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 9"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 9"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 1"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 2"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 3"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 4"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 5"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 6"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 7"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 8"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 9"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footnote text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="header"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footer"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index heading"/> <w:LsdException Locked="false" Priority="35" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="caption"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="table of figures"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="envelope address"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="envelope return"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footnote reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="line number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="page number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="endnote reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="endnote text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="table of authorities"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="macro"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="toa heading"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 5"/> <w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Closing"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Signature"/> <w:LsdException Locked="false" Priority="1" SemiHidden="true" UnhideWhenUsed="true" Name="Default Paragraph Font"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Message Header"/> <w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Salutation"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Date"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text First Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text First Indent 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Heading"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Block Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Hyperlink"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="FollowedHyperlink"/> <w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/> <w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Document Map"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Plain Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="E-mail Signature"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Top of Form"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Bottom of Form"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal (Web)"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Acronym"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Address"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Cite"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Code"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Definition"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Keyboard"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Preformatted"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Sample"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Typewriter"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Variable"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal Table"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation subject"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="No List"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Contemporary"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Elegant"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Professional"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Subtle 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Subtle 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Balloon Text"/> <w:LsdException Locked="false" Priority="59" Name="Table Grid"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Theme"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Level 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Level 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Level 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Level 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Level 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Level 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Level 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Level 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Level 9"/> <w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/> <w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading"/> <w:LsdException Locked="false" Priority="61" Name="Light List"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/> <w:LsdException Locked="false" Priority="70" Name="Dark List"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/> <w:LsdException Locked="false" SemiHidden="true" Name="Revision"/> <w:LsdException Locked="false" Priority="34" QFormat="true" Name="List Paragraph"/> <w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/> <w:LsdException Locked="false" Priority="30" QFormat="true" Name="Intense Quote"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/> <w:LsdException Locked="false" Priority="19" QFormat="true" Name="Subtle Emphasis"/> <w:LsdException Locked="false" Priority="21" QFormat="true" Name="Intense Emphasis"/> <w:LsdException Locked="false" Priority="31" QFormat="true" Name="Subtle Reference"/> <w:LsdException Locked="false" Priority="32" QFormat="true" Name="Intense Reference"/> <w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/> <w:LsdException Locked="false" Priority="37" SemiHidden="true" UnhideWhenUsed="true" Name="Bibliography"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/> <w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/> <w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/> <w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/> <w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/> <w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/> <w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 1"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 2"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 3"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 4"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 5"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 6"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 6"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 6"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 1"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 2"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 3"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 4"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 5"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 6"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 6"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Mention"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Smart Hyperlink"/> </w:LatentStyles> </xml><![endif]--> <style> <!-- /* Font Definitions */ @font-face {font-family:"Courier New"; panose-1:2 7 3 9 2 2 5 2 4 4; mso-font-charset:0; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:-536859905 -1073711037 9 0 511 0;} @font-face {font-family:Verdana; panose-1:2 11 6 4 3 5 4 4 2 4; mso-font-charset:0; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:-1593833729 1073750107 16 0 415 0;} @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:0; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:-536870145 1107305727 0 0 415 0;} @font-face {font-family:"Calibri Light"; panose-1:2 15 3 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 415 0;} @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:-536870145 1073786111 1 0 415 0;} @font-face {font-family:Tahoma; panose-1:2 11 6 4 3 5 4 4 2 4; mso-font-charset:0; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:-520081665 -1073717157 41 0 66047 0;} @font-face {font-family:Garamond; panose-1:2 2 4 4 3 3 1 1 8 3; mso-font-charset:0; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:647 0 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman";} h1 {mso-style-priority:9; mso-style-unhide:no; mso-style-qformat:yes; mso-style-link:"Heading 1 Char"; mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; mso-outline-level:1; font-size:24.0pt; font-family:Helvetica; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-bidi-font-family:"Times New Roman"; font-weight:bold;} h2 {mso-style-priority:9; mso-style-unhide:no; mso-style-qformat:yes; mso-style-link:"Heading 2 Char"; mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; mso-outline-level:2; font-size:18.0pt; font-family:Helvetica; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-bidi-font-family:"Times New Roman"; font-weight:bold;} h3 {mso-style-priority:9; mso-style-unhide:no; mso-style-qformat:yes; mso-style-link:"Heading 3 Char"; mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; mso-outline-level:3; font-size:13.5pt; font-family:Helvetica; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-bidi-font-family:"Times New Roman"; font-weight:bold;} h4 {mso-style-priority:9; mso-style-unhide:no; mso-style-qformat:yes; mso-style-link:"Heading 4 Char"; mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; mso-outline-level:4; font-size:12.0pt; font-family:Helvetica; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-bidi-font-family:"Times New Roman"; font-weight:bold;} h5 {mso-style-priority:9; mso-style-unhide:no; mso-style-qformat:yes; mso-style-link:"Heading 5 Char"; mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; mso-outline-level:5; font-size:10.0pt; font-family:Helvetica; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-bidi-font-family:"Times New Roman"; font-weight:bold;} p.MsoFooter, li.MsoFooter, div.MsoFooter {mso-style-noshow:yes; mso-style-priority:99; mso-style-link:"Footer Char"; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; tab-stops:center 3.25in right 6.5in; font-size:12.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman"; mso-fareast-language:JA;} a:link, span.MsoHyperlink {mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; font-family:Helvetica; mso-ascii-font-family:Helvetica; mso-hansi-font-family:Helvetica; mso-bidi-font-family:Helvetica; color:#505050; mso-text-animation:none; text-decoration:none; text-underline:none; text-decoration:none; text-line-through:none;} a:visited, span.MsoHyperlinkFollowed {mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; font-family:Helvetica; mso-ascii-font-family:Helvetica; mso-hansi-font-family:Helvetica; mso-bidi-font-family:Helvetica; color:#505050; mso-text-animation:none; text-decoration:none; text-underline:none; text-decoration:none; text-line-through:none;} p {mso-style-noshow:yes; mso-style-priority:99; mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:Verdana; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:Helvetica;} code {mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; font-family:Courier; mso-ascii-font-family:Courier; mso-fareast-font-family:"Times New Roman"; mso-hansi-font-family:Courier; mso-bidi-font-family:"Courier New";} samp {mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; font-family:Courier; mso-ascii-font-family:Courier; mso-fareast-font-family:"Times New Roman"; mso-hansi-font-family:Courier; mso-bidi-font-family:"Courier New";} tt {mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; font-family:Courier; mso-ascii-font-family:Courier; mso-fareast-font-family:"Times New Roman"; mso-hansi-font-family:Courier; mso-bidi-font-family:"Courier New";} p.MsoAcetate, li.MsoAcetate, div.MsoAcetate {mso-style-noshow:yes; mso-style-priority:99; mso-style-link:"Balloon Text Char"; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:8.0pt; font-family:Tahoma; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:Helvetica;} span.Heading1Char {mso-style-name:"Heading 1 Char"; mso-style-priority:9; mso-style-unhide:no; mso-style-locked:yes; mso-style-parent:""; mso-style-link:"Heading 1"; mso-ansi-font-size:14.0pt; mso-bidi-font-size:14.0pt; font-family:"Calibri Light"; mso-ascii-font-family:"Calibri Light"; mso-fareast-font-family:"Times New Roman"; mso-hansi-font-family:"Calibri Light"; mso-bidi-font-family:"Times New Roman"; color:#2F5496; font-weight:bold;} span.Heading2Char {mso-style-name:"Heading 2 Char"; mso-style-noshow:yes; mso-style-priority:9; mso-style-unhide:no; mso-style-locked:yes; mso-style-parent:""; mso-style-link:"Heading 2"; mso-ansi-font-size:13.0pt; mso-bidi-font-size:13.0pt; font-family:"Calibri Light"; mso-ascii-font-family:"Calibri Light"; mso-fareast-font-family:"Times New Roman"; mso-hansi-font-family:"Calibri Light"; mso-bidi-font-family:"Times New Roman"; color:#4472C4; font-weight:bold;} span.Heading3Char {mso-style-name:"Heading 3 Char"; mso-style-noshow:yes; mso-style-priority:9; mso-style-unhide:no; mso-style-locked:yes; mso-style-parent:""; mso-style-link:"Heading 3"; mso-ansi-font-size:12.0pt; mso-bidi-font-size:12.0pt; font-family:"Calibri Light"; mso-ascii-font-family:"Calibri Light"; mso-fareast-font-family:"Times New Roman"; mso-hansi-font-family:"Calibri Light"; mso-bidi-font-family:"Times New Roman"; color:#4472C4; font-weight:bold;} span.Heading4Char {mso-style-name:"Heading 4 Char"; mso-style-noshow:yes; mso-style-priority:9; mso-style-unhide:no; mso-style-locked:yes; mso-style-parent:""; mso-style-link:"Heading 4"; mso-ansi-font-size:12.0pt; mso-bidi-font-size:12.0pt; font-family:"Calibri Light"; mso-ascii-font-family:"Calibri Light"; mso-fareast-font-family:"Times New Roman"; mso-hansi-font-family:"Calibri Light"; mso-bidi-font-family:"Times New Roman"; color:#4472C4; font-weight:bold; font-style:italic;} span.Heading5Char {mso-style-name:"Heading 5 Char"; mso-style-noshow:yes; mso-style-priority:9; mso-style-unhide:no; mso-style-locked:yes; mso-style-parent:""; mso-style-link:"Heading 5"; mso-ansi-font-size:12.0pt; mso-bidi-font-size:12.0pt; font-family:"Calibri Light"; mso-ascii-font-family:"Calibri Light"; mso-fareast-font-family:"Times New Roman"; mso-hansi-font-family:"Calibri Light"; mso-bidi-font-family:"Times New Roman"; color:#1F3763;} span.FooterChar {mso-style-name:"Footer Char"; mso-style-noshow:yes; mso-style-priority:99; mso-style-unhide:no; mso-style-locked:yes; mso-style-parent:""; mso-style-link:Footer; mso-ansi-font-size:12.0pt; mso-bidi-font-size:12.0pt; font-family:Calibri; mso-ascii-font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-hansi-font-family:Calibri; mso-bidi-font-family:"Times New Roman"; mso-fareast-language:JA;} span.BalloonTextChar {mso-style-name:"Balloon Text Char"; mso-style-noshow:yes; mso-style-priority:99; mso-style-unhide:no; mso-style-locked:yes; mso-style-parent:""; mso-style-link:"Balloon Text"; mso-ansi-font-size:8.0pt; mso-bidi-font-size:8.0pt; font-family:Tahoma; mso-ascii-font-family:Tahoma; mso-fareast-font-family:"Times New Roman"; mso-hansi-font-family:Tahoma; mso-bidi-font-family:Tahoma;} p.justify, li.justify, div.justify {mso-style-name:justify; mso-style-noshow:yes; mso-style-priority:99; mso-style-unhide:no; mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; text-align:justify; mso-pagination:widow-orphan; font-size:12.0pt; font-family:Verdana; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:Helvetica;} p.preformatted, li.preformatted, div.preformatted {mso-style-name:preformatted; mso-style-noshow:yes; mso-style-priority:99; mso-style-unhide:no; mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:Verdana; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:Helvetica;} p.Default, li.Default, div.Default {mso-style-name:Default; mso-style-noshow:yes; mso-style-priority:99; mso-style-unhide:no; mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:none; mso-layout-grid-align:none; text-autospace:none; font-size:12.0pt; font-family:Garamond; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:Garamond; color:black;} span.SpellE {mso-style-name:""; mso-spl-e:yes;} span.GramE {mso-style-name:""; mso-gram-e:yes;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-size:10.0pt; mso-ansi-font-size:10.0pt; mso-bidi-font-size:10.0pt;} @page WordSection1 {size:8.5in 11.0in; margin:1.0in 1.0in 1.0in 1.0in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.WordSection1 {page:WordSection1;} /* List Definitions */ @list l0 {mso-list-id:972563576; mso-list-type:hybrid; mso-list-template-ids:621341228 602070986 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l0:level1 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:.25in; text-indent:-.25in; font-family:Helvetica; mso-ansi-font-weight:normal; mso-ansi-font-style:normal;} @list l0:level2 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:.75in; text-indent:-.25in;} @list l0:level3 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:1.25in; text-indent:-9.0pt;} @list l0:level4 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.75in; text-indent:-.25in;} @list l0:level5 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:2.25in; text-indent:-.25in;} @list l0:level6 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:2.75in; text-indent:-9.0pt;} @list l0:level7 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:3.25in; text-indent:-.25in;} @list l0:level8 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:3.75in; text-indent:-.25in;} @list l0:level9 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:4.25in; text-indent:-9.0pt;} @list l1 {mso-list-id:994844735; mso-list-template-ids:-1704306806;} @list l1:level1 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:"Courier New"; mso-bidi-font-family:"Times New Roman";} @list l1:level2 {mso-level-tab-stop:1.0in; mso-level-number-position:left; text-indent:-.25in;} @list l1:level3 {mso-level-tab-stop:1.5in; mso-level-number-position:left; text-indent:-.25in;} @list l1:level4 {mso-level-tab-stop:2.0in; mso-level-number-position:left; text-indent:-.25in;} @list l1:level5 {mso-level-tab-stop:2.5in; mso-level-number-position:left; text-indent:-.25in;} @list l1:level6 {mso-level-tab-stop:3.0in; mso-level-number-position:left; text-indent:-.25in;} @list l1:level7 {mso-level-tab-stop:3.5in; mso-level-number-position:left; text-indent:-.25in;} @list l1:level8 {mso-level-tab-stop:4.0in; mso-level-number-position:left; text-indent:-.25in;} @list l1:level9 {mso-level-tab-stop:4.5in; mso-level-number-position:left; text-indent:-.25in;} @list l2 {mso-list-id:1908832955; mso-list-template-ids:893700804;} @list l2:level1 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:"Courier New"; mso-bidi-font-family:"Times New Roman";} @list l2:level2 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:1.0in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:"Courier New"; mso-bidi-font-family:"Times New Roman";} @list l2:level3 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:1.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:"Courier New"; mso-bidi-font-family:"Times New Roman";} @list l2:level4 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:2.0in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:"Courier New"; mso-bidi-font-family:"Times New Roman";} @list l2:level5 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:2.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:"Courier New"; mso-bidi-font-family:"Times New Roman";} @list l2:level6 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:3.0in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:"Courier New"; mso-bidi-font-family:"Times New Roman";} @list l2:level7 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:3.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:"Courier New"; mso-bidi-font-family:"Times New Roman";} @list l2:level8 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:4.0in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:"Courier New"; mso-bidi-font-family:"Times New Roman";} @list l2:level9 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:4.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:"Courier New"; mso-bidi-font-family:"Times New Roman";} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style> <!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman";} </style> <![endif]--><!--[if gte mso 9]><xml> <o:shapedefaults v:ext="edit" spidmax="1029"/> </xml><![endif]--><!--[if gte mso 9]><xml> <o:shapelayout v:ext="edit"> <o:idmap v:ext="edit" data="1"/> </o:shapelayout></xml><![endif]--> </head> <body bgcolor=white lang=EN-US link="#505050" vlink="#505050" style='tab-interval: .5in'> <div class=WordSection1> <div align=center> <table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width="98%" style='width:98.0%;mso-cellspacing:0in;mso-yfti-tbllook:1184;mso-padding-alt: 0in 0in 0in 0in'> <tr style='mso-yfti-irow:0;mso-yfti-firstrow:yes;mso-yfti-lastrow:yes'> <td style='background:#C8B03D;padding:0in 0in 0in 0in'> <p class=MsoNormal style='tab-stops:538.5pt'><!--[if mso & !supportInlineShapes & supportFields]><span style='mso-element:field-begin;mso-field-lock:yes'></span><span style='mso-spacerun:yes'></span>SHAPE <span style='mso-spacerun:yes'></span>\* MERGEFORMAT <span style='mso-element: field-separator'></span><![endif]--><!--[if gte vml 1]><v:rect id="Picture_x0020_1" o:spid="_x0000_s1028" alt=" " style='width:.75pt;height:.75pt;visibility:visible; mso-wrap-style:square;mso-left-percent:-10001;mso-top-percent:-10001; mso-position-horizontal:absolute;mso-position-horizontal-relative:char; mso-position-vertical:absolute;mso-position-vertical-relative:line; mso-left-percent:-10001;mso-top-percent:-10001;v-text-anchor:top' o:gfxdata="UEsDBBQABgAIAAAAIQDkmcPA+wAAAOEBAAATAAAAW0NvbnRlbnRfVHlwZXNdLnhtbJSRQU7DMBBF 90jcwfIWJQ5dIISSdEHaJSBUDjCyJ4nVZGx53NDeHictG4SKWNrj9//TuFwfx0FMGNg6quR9XkiB pJ2x1FXyY7fNHqXgCGRgcISVPCHLdX17U+5OHlkkmriSfYz+SSnWPY7AufNIadK6MEJMx9ApD3oP HapVUTwo7SgixSzOGbIuG2zhMESxOabrs0nCpXg+v5urKgneD1ZDTKJqnqpfuYADXwEnMj/ssotZ nsglnHvr+e7S8JpWE6xB8QYhvsCYPJQJrHDlGqfz65Zz2ciZa1urMW8Cbxbqr2zjPing9N/wJmHv OH2nq+WD6i8AAAD//wMAUEsDBBQABgAIAAAAIQAjsmrh1wAAAJQBAAALAAAAX3JlbHMvLnJlbHOk kMFqwzAMhu+DvYPRfXGawxijTi+j0GvpHsDYimMaW0Yy2fr28w6DZfS2o36h7xP//vCZFrUiS6Rs YNf1oDA78jEHA++X49MLKKk2e7tQRgM3FDiMjw/7My62tiOZYxHVKFkMzLWWV63FzZisdFQwt81E nGxtIwddrLvagHro+2fNvxkwbpjq5A3wye9AXW6lmf+wU3RMQlPtHCVN0xTdPaoObMsc3ZFtwjdy jWY5YDXgWTQO1LKu/Qj6vn74p97TRz7jutV+h4zrj1dvuhy/AAAA//8DAFBLAwQUAAYACAAAACEA 32tTSqwCAACvBQAADgAAAGRycy9lMm9Eb2MueG1srFTbbtswDH0fsH8Q9O7aTp2LjTpFG8fDgG4r 0O0DFEmOhdmSJylxumL/PkrOtX0ZtvlBkEj58JA84s3trm3QlmsjlMxxfBVhxCVVTMh1jr99LYMZ RsYSyUijJM/xMzf4dv7+3U3fZXykatUwrhGASJP1XY5ra7ssDA2teUvMleq4BGeldEssHPU6ZJr0 gN424SiKJmGvNOu0otwYsBaDE889flVxar9UleEWNTkGbtav2q8rt4bzG5KtNelqQfc0yF+waImQ EPQIVRBL0EaLN1CtoFoZVdkrqtpQVZWg3OcA2cTRq2yeatJxnwsUx3THMpn/B0s/bx81EizH1xhJ 0kKLHgW1G81RjBHjhkKxkCtT35kMbj91j9olaroHRb8bJNWiJnLN70wHxQYJAMzBpLXqa04Y8I0d RHiB4Q4G0NCq/6QYBCYbq3wRd5VuXQwoD9r5Xj0fe8V3FlEwpuPRGCMKDr9z6CQ7/NhpYz9w1SK3 ybEGZh6YbB+MHa4errg4UpWiacBOskZeGABzsEBY+NX5HAHf2Zc0Spez5SwJktFkGSRRUQR35SIJ JmU8HRfXxWJRxL9c3DjJasEYly7MQWVx8mdd3Ot90MdRZ0Y1gjk4R8no9WrRaLQloPLSf77c4Dld Cy9p+HpBLq9SikdJdD9Kg3IymwZJmYyDdBrNgihO79NJlKRJUV6m9CAk//eUUL/vo0/nRPpVbpH/ 3uZGslZYmCONaHM8O14imVPfUjLfWktEM+zPSuHon0oB7T402mvVyXNQ/kqxZ5CqViAnmCMw8WBT K/0Tox6mR47Njw3RHKPmowS5p3GSuHHjD8l4OoKDPveszj1EUoDKscVo2C6sH1GuGFLdwbOohJet ezIDk/1jgqng2e8nmBs752d/6zRn578BAAD//wMAUEsDBBQABgAIAAAAIQDUCNk32AAAAAEBAAAP AAAAZHJzL2Rvd25yZXYueG1sTI9Ba8JAEIXvQv/DMgUvopsWWkrMRopQKlKQxup5zI5JaHY2Ztck /ntXL+1lHsMb3vsmWQymFh21rrKs4GkWgSDOra64UPCz/Zi+gXAeWWNtmRRcyMEifRglGGvb8zd1 mS9ECGEXo4LS+yaW0uUlGXQz2xAH72hbgz6sbSF1i30IN7V8jqJXabDi0FBiQ8uS8t/sbBT0+abb b78+5WayX1k+rU7LbLdWavw4vM9BeBr83zHc8AM6pIHpYM+snagVhEf8fd68FxCHu8g0kf/J0ysA AAD//wMAUEsBAi0AFAAGAAgAAAAhAOSZw8D7AAAA4QEAABMAAAAAAAAAAAAAAAAAAAAAAFtDb250 ZW50X1R5cGVzXS54bWxQSwECLQAUAAYACAAAACEAI7Jq4dcAAACUAQAACwAAAAAAAAAAAAAAAAAs AQAAX3JlbHMvLnJlbHNQSwECLQAUAAYACAAAACEA32tTSqwCAACvBQAADgAAAAAAAAAAAAAAAAAs AgAAZHJzL2Uyb0RvYy54bWxQSwECLQAUAAYACAAAACEA1AjZN9gAAAABAQAADwAAAAAAAAAAAAAA AAAEBQAAZHJzL2Rvd25yZXYueG1sUEsFBgAAAAAEAAQA8wAAAAkGAAAAAA== " filled="f" stroked="f"> <o:lock v:ext="edit" aspectratio="t"/> <w:wrap type="none"/> <w:anchorlock/> </v:rect><![endif]--><!--[if gte vml 1]><v:shapetype id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f"> <v:stroke joinstyle="miter"/> <v:formulas> <v:f eqn="if lineDrawn pixelLineWidth 0"/> <v:f eqn="sum @0 1 0"/> <v:f eqn="sum 0 0 @1"/> <v:f eqn="prod @2 1 2"/> <v:f eqn="prod @3 21600 pixelWidth"/> <v:f eqn="prod @3 21600 pixelHeight"/> <v:f eqn="sum @0 0 1"/> <v:f eqn="prod @6 1 2"/> <v:f eqn="prod @7 21600 pixelWidth"/> <v:f eqn="sum @8 21600 0"/> <v:f eqn="prod @7 21600 pixelHeight"/> <v:f eqn="sum @10 21600 0"/> </v:formulas> <v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/> <o:lock v:ext="edit" aspectratio="t"/> </v:shapetype><![endif]--><!--[if mso & !supportInlineShapes & supportFields]><v:shape id="_x0000_i1027" type="#_x0000_t75" style='width:.75pt;height:.75pt'> <v:imagedata croptop="-65520f" cropbottom="65520f"/> </v:shape><span style='mso-element:field-end'></span><![endif]--><span style='font-family:Verdana;mso-bidi-font-family:Helvetica'><o:p></o:p></span></p> <table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width=480 style='width:480.0pt;mso-cellspacing:0in;mso-yfti-tbllook:1184;mso-padding-alt: 0in 5.4pt 0in 5.4pt'> <tr style='mso-yfti-irow:0;mso-yfti-firstrow:yes;mso-yfti-lastrow:yes'> <td style='padding:.75pt .75pt .75pt .75pt'></td> </tr> </table> </td> </tr> </table> </div> <p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family:Helvetica; display:none;mso-hide:all'><o:p>&nbsp;</o:p></span></p> <div align=center> <table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width="98%" style='width:98.0%;mso-cellspacing:0in;mso-yfti-tbllook:1184;mso-padding-alt: 0in 0in 0in 0in'> <tr style='mso-yfti-irow:0;mso-yfti-firstrow:yes;mso-yfti-lastrow:yes'> <td style='padding:0in 0in 0in 0in'> <p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family: Helvetica'><br> </span><span style='font-size:10.0pt;font-family:Helvetica'><a href="index.htm">Home</a> </span><span style='font-family:Verdana;mso-bidi-font-family: Helvetica'><o:p></o:p></span></p> </td> </tr> </table> </div> <p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family:Helvetica; display:none;mso-hide:all'><o:p>&nbsp;</o:p></span></p> <div align=center> <table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width="98%" style='width:98.0%;mso-cellspacing:0in;mso-yfti-tbllook:1184;mso-padding-alt: 0in 0in 0in 0in'> <tr style='mso-yfti-irow:0;mso-yfti-firstrow:yes;mso-yfti-lastrow:yes; height:183.75pt'> <td style='background:white;padding:0in 0in 0in 0in;height:183.75pt'> <p class=MsoNormal><!--[if mso & !supportInlineShapes & supportFields]><span style='mso-element:field-begin;mso-field-lock:yes'></span><span style='mso-spacerun:yes'></span>SHAPE <span style='mso-spacerun:yes'></span>\* MERGEFORMAT <span style='mso-element: field-separator'></span><![endif]--><!--[if gte vml 1]><v:rect id="Picture_x0020_3" o:spid="_x0000_s1027" alt="http://www.easternct.edu/personal/faculty/gaok/pixel.gif" style='width:1pt;height:1pt;visibility:visible;mso-wrap-style:square; mso-left-percent:-10001;mso-top-percent:-10001;mso-position-horizontal:absolute; mso-position-horizontal-relative:char;mso-position-vertical:absolute; mso-position-vertical-relative:line;mso-left-percent:-10001; mso-top-percent:-10001;v-text-anchor:top' o:gfxdata="UEsDBBQABgAIAAAAIQDkmcPA+wAAAOEBAAATAAAAW0NvbnRlbnRfVHlwZXNdLnhtbJSRQU7DMBBF 90jcwfIWJQ5dIISSdEHaJSBUDjCyJ4nVZGx53NDeHictG4SKWNrj9//TuFwfx0FMGNg6quR9XkiB pJ2x1FXyY7fNHqXgCGRgcISVPCHLdX17U+5OHlkkmriSfYz+SSnWPY7AufNIadK6MEJMx9ApD3oP HapVUTwo7SgixSzOGbIuG2zhMESxOabrs0nCpXg+v5urKgneD1ZDTKJqnqpfuYADXwEnMj/ssotZ nsglnHvr+e7S8JpWE6xB8QYhvsCYPJQJrHDlGqfz65Zz2ciZa1urMW8Cbxbqr2zjPing9N/wJmHv OH2nq+WD6i8AAAD//wMAUEsDBBQABgAIAAAAIQAjsmrh1wAAAJQBAAALAAAAX3JlbHMvLnJlbHOk kMFqwzAMhu+DvYPRfXGawxijTi+j0GvpHsDYimMaW0Yy2fr28w6DZfS2o36h7xP//vCZFrUiS6Rs YNf1oDA78jEHA++X49MLKKk2e7tQRgM3FDiMjw/7My62tiOZYxHVKFkMzLWWV63FzZisdFQwt81E nGxtIwddrLvagHro+2fNvxkwbpjq5A3wye9AXW6lmf+wU3RMQlPtHCVN0xTdPaoObMsc3ZFtwjdy jWY5YDXgWTQO1LKu/Qj6vn74p97TRz7jutV+h4zrj1dvuhy/AAAA//8DAFBLAwQUAAYACAAAACEA QydG+OACAAD0BQAADgAAAGRycy9lMm9Eb2MueG1srFTbbtswDH0fsH8Q9O74Uudio07RxvEwoNsK dPsARZZtobbkSUqcbti/j5KTNGn3tM0PgiTKhzzkIa9v9l2LdkxpLkWGw0mAERNUllzUGf72tfAW GGlDRElaKViGn5nGN8v3766HPmWRbGRbMoUAROh06DPcGNOnvq9pwzqiJ7JnAoyVVB0xcFS1Xyoy AHrX+lEQzPxBqrJXkjKt4TYfjXjp8KuKUfOlqjQzqM0wxGbcqty6sau/vCZprUjfcHoIg/xFFB3h ApyeoHJiCNoq/gaq41RJLSszobLzZVVxyhwHYBMGr9g8NqRnjgskR/enNOn/B0s/7x4U4mWGI4wE 6aBED5yarWLoCqOSaQrJOhRlGIYJI9owJaiZsHLr91B4KUjrV4RuW/Ps10Q++T3fs3ZS88pmd+h1 Ck4e+wdl86P7e0mfNBJy1RBRs1vdQ41AOeD9eKWUHBpGSqAZWgj/AsMeNKChzfBJlhAv2Rrpcr+v VGd9QFbR3pX4+VRitjeIwmUYzQPQAQXLuLX4JD3+2ittPjDZIbvJsILYHDTZ3WszPj0+sZ6ELHjb wj1JW3FxAZjjDTiGX63NhuAk8TMJkvVivYi9OJqtvTjIc++2WMXerAjn0/wqX63y8Jf1G8Zpw8uS CevmKM8wPlXk2CZ/VNWhUUZhnQSqZctLC2dD0qrerFqFdgTao3CfSzhYXp75l2G4fAGXV5TCKA7u osQrZou5Fxfx1EvmwcILwuQumQVxEufFJaV7Lti/U0JDhpNpNHVVOgv6FbfAfW+5kbTjoGfU8i7D i9Mjklr9rUXpSmsIb8f9WSps+C+pgHIfC+3UagU6an8jy2cQq5IgJxAejErYNFL9wGiAsZNh/X1L FMOo/ShA8EkYx3ZOuUM8nUdwUOeWzbmFCApQGTYYjduVGWfbtle8bsBT6BIj5C00ScWdhG0DjVEd WgtGi2NyGIN2dp2f3auXYb38DQAA//8DAFBLAwQUAAYACAAAACEALtXn2NcAAAABAQAADwAAAGRy cy9kb3ducmV2LnhtbEyPQUvDQBCF74L/YRnBi9iNPYjEbIoUxCJCMdWep9lpEpqdTbPbJP57x17s ZYbHG958L1tMrlUD9aHxbOBhloAiLr1tuDLwtXm9fwIVIrLF1jMZ+KEAi/z6KsPU+pE/aShipSSE Q4oG6hi7VOtQ1uQwzHxHLN7e9w6jyL7StsdRwl2r50nyqB02LB9q7GhZU3koTs7AWK6H7ebjTa/v tivPx9VxWXy/G3N7M708g4o0xf9j+MMXdMiFaedPbINqDUiReJ7izUXszkvnmb4kz38BAAD//wMA UEsBAi0AFAAGAAgAAAAhAOSZw8D7AAAA4QEAABMAAAAAAAAAAAAAAAAAAAAAAFtDb250ZW50X1R5 cGVzXS54bWxQSwECLQAUAAYACAAAACEAI7Jq4dcAAACUAQAACwAAAAAAAAAAAAAAAAAsAQAAX3Jl bHMvLnJlbHNQSwECLQAUAAYACAAAACEAQydG+OACAAD0BQAADgAAAAAAAAAAAAAAAAAsAgAAZHJz L2Uyb0RvYy54bWxQSwECLQAUAAYACAAAACEALtXn2NcAAAABAQAADwAAAAAAAAAAAAAAAAA4BQAA ZHJzL2Rvd25yZXYueG1sUEsFBgAAAAAEAAQA8wAAADwGAAAAAA== " filled="f" stroked="f"> <o:lock v:ext="edit" aspectratio="t"/> <w:wrap type="none"/> <w:anchorlock/> </v:rect><![endif]--><!--[if mso & !supportInlineShapes & supportFields]><v:shape id="_x0000_i1026" type="#_x0000_t75" style='width:1pt;height:1pt'> <v:imagedata croptop="-65520f" cropbottom="65520f"/> </v:shape><span style='mso-element:field-end'></span><![endif]--><span style='font-family:Verdana;mso-bidi-font-family:Helvetica'><o:p></o:p></span></p> <table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width=802 style='width:801.75pt;mso-cellspacing:0in;mso-yfti-tbllook:1184;mso-padding-alt: 0in 5.4pt 0in 5.4pt'> <tr style='mso-yfti-irow:0;mso-yfti-firstrow:yes;height:149.25pt'> <td width=156 valign=top style='width:156.0pt;padding:.75pt .75pt .75pt .75pt; height:149.25pt'> <ul type=circle> <li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt: auto;mso-list:l1 level1 lfo3;tab-stops:list .5in'><span style='font-size:11.0pt;font-family:Helvetica;color:#505050'><a href="Sumita_courses.htm">Courses</a></span><span style='font-size: 11.0pt;font-family:Helvetica'> <o:p></o:p></span></li> <li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt: auto;mso-list:l1 level1 lfo3;tab-stops:list .5in'><span style='font-size:11.0pt;font-family:Helvetica;color:#505050'><a href="Sumita_research.htm">Research</a></span><span style='font-size: 11.0pt;font-family:Helvetica'> <o:p></o:p></span></li> <li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt: auto;mso-list:l1 level1 lfo3;tab-stops:list .5in'><span style='font-size:11.0pt;font-family:Helvetica;color:#505050'><a href="Sumita_publication.htm">Publications</a></span><span style='font-size:11.0pt;font-family:Helvetica'> <o:p></o:p></span></li> <li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt: auto;mso-list:l1 level1 lfo3;tab-stops:list .5in'><span style='font-size:11.0pt;font-family:Helvetica;color:#505050'><a href="Sumita_activities.htm">Professional</a> </span><span style='font-size:11.0pt;font-family:Helvetica;color:#3B3838'>Activities </span><span style='font-size:11.0pt;font-family:Helvetica'><o:p></o:p></span></li> </ul> <p><span style='font-size:11.0pt'>&nbsp;<o:p></o:p></span></p> </td> <td width=12 valign=top style='width:11.9pt;padding:.75pt .75pt .75pt .75pt; height:149.25pt'></td> <td width=20 valign=top style='width:19.6pt;padding:.75pt .75pt .75pt .75pt; height:149.25pt'></td> <td width=614 valign=top style='width:614.25pt;padding:.75pt .75pt .75pt .75pt; height:149.25pt'> <p><b><span style='font-size:11.0pt;font-family:Helvetica;color:maroon'>PUBLICATIONS<o:p></o:p></span></b></p> <p style='margin-top:12.0pt;text-align:justify;line-height:115%;tab-stops: 34.6pt'><b><span style='font-size:11.0pt;line-height:115%;font-family:Helvetica; color:maroon'>Journal Papers <o:p></o:p></span></b></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>1.<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>C. Romanowski, R. Raj, J. Schneider, S. Mishra, V. <span class=SpellE>Shivshankar</span>, S. <span class=SpellE>Ayengar</span>, <span class=SpellE><span class=GramE>F.Cueva</span></span> (2015). Regional response to large-scale emergency events: Building on historical data, <i style='mso-bidi-font-style:normal'>Intl. Journal of Critical Infrastructure Protection (Elsevier), </i>11, 12-21. <o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>2.<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>H. Tuncer, S. Mishra and N. Shenoy (2012). A Survey of Identity and Handoff Management Approaches for the Future Internet, <i style='mso-bidi-font-style:normal'>Computer Communications (Elsevier),</i> 36(1), 63-79.<i style='mso-bidi-font-style: normal'><o:p></o:p></i></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>3.<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>S. Mishra, M. Venkatesh and B. Attaie (2011). Developing a neighborhood-scale wireless notification prototype, <i style='mso-bidi-font-style:normal'>International Journal on Computing (GSTF)</i>, 1(2), 216-221.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>4.<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>G. Thamilarasu, S. Mishra and R. Sridhar (2011). Improving Reliability of Jamming Attack Detection in Ad hoc Networks, <i style='mso-bidi-font-style:normal'>International Journal of Communication Networks and Information Security, </i>3(1), 57-66.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>5.<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>E. <span class=SpellE>Golen</span>, S. Mishra and N. Shenoy (2010). An Underwater Sensor Allocation Scheme for a Range Dependent Environment, <i style='mso-bidi-font-style:normal'>Computer Networks (Elsevier), </i>54(3), 404-415.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>6.<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>R. Sridharan, R. Sridhar and S. Mishra (2003). A Robust Header Compression Technique for Wireless Ad hoc Networks, <i>ACM SIGMOBILE Mobile Computing and Communications Review, </i>7(3), 23-24.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>7.<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>O.K. Tonguz, S. Mishra, and H. Jung (1998). A Simple Analytical Framework for Location Management in Personal Communication Systems, <i>IEEE Transactions on Vehicular Technology</i>, 47(2), 428-439. <o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>8.<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>S. Mishra and O.K. Tonguz (1998). Analysis of Intelligent Paging in Personal Communication Systems, <i>IET Electronic Letters</i>, 34(1), 12-13. <o:p></o:p></span></p> <p style='text-align:justify'><b><span style='font-size:11.0pt;font-family: Helvetica;color:maroon'>Book/ Book Chapters <o:p></o:p></span></b></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>9.<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>T. Oh, S. Mishra and C. Hochgraf (2013). Smart Grid Security in the Last Mile, <i style='mso-bidi-font-style: normal'>Security and Privacy in Smart Grids</i> (Yang Xiao, Editor) CRC Press, 271-290.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>10.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>S. Mishra (2011). <span style='mso-bidi-font-weight:bold'>Wireless Sensor Networks: Emerging Applications and Security Solutions</span>, <i>Network Security, Administration and Management: Advancing Technologies and Practices</i><i style='mso-bidi-font-style:normal'> </i>(D. Kar &amp; M. Syed, Editors) IGI Global Publishers, 217-236.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica;mso-bidi-font-style:italic'><span style='mso-list:Ignore'>11.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>Y. Pan, B. Yuan and S. Mishra (2011). <span style='mso-bidi-font-weight: bold'>Network Security Auditing</span>, <i>Network Security, Administration and Management: Advancing Technologies and Practices </i>(D. Kar &amp; M. Syed, Editors) IGI Global Publishers, 131-157.<i><o:p></o:p></i></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>12.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>S. Mishra and N. Shenoy (2009), <span class=SpellE>Multihop</span>, Multipath and Load Balanced Routing in Wireless Mesh Networks, <i>Encyclopedia on Ad hoc and Ubiquitous Computing</i> (D. Agrawal &amp; B. <span class=SpellE>Xie</span>, Editors), World Scientific, 565-586.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>13.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>N. Shenoy and S. Mishra (2008), Vertical Handoff and Mobility Management for Seamless Integration of Heterogeneous Wireless Access Technologies, <i>Heterogeneous Wireless Access Networks: Architectures and Protocols </i><span style='mso-bidi-font-style: italic'>(E. Hossain, Editor)</span>, Springer, 181-213.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 12.0pt;margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt;font-family:Helvetica;mso-fareast-font-family:Helvetica; mso-bidi-font-family:Helvetica'><span style='mso-list:Ignore'>14.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>S. Mishra and O. K. Tonguz (1999). Paging Communication for Locating Mobile Users, <i style='mso-bidi-font-style:normal'>Wiley</i> <i>Encyclopedia of Electrical and Electronics Engineering</i>, John Wiley &amp; Sons, vol. 15, 572-579.<o:p></o:p></span></p> <p style='margin-top:12.0pt;margin-right:0in;margin-bottom:12.0pt; margin-left:0in;text-align:justify;line-height:115%;tab-stops:center 190.6pt'><b><span style='font-size:11.0pt;line-height:115%;font-family:Helvetica;color:maroon'>Peer-Reviewed Conference Papers<span style='mso-tab-count:1'> </span><o:p></o:p></span></b></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>15.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>S. Engen, D. Mir, S. Mishra, L. Pollock, and P. Ruvolo (2017). Partnered Teaching of Interdisciplinary CS+X Courses: Models and Experiences, <i style='mso-bidi-font-style:normal'>ACM Consortium for Computing Sciences in Colleges  Northeastern Region (ACM CCSCNE 2017), </i>6 pages, accepted for publication.<o:p></o:p></span></p> <p class=MsoNormal style='margin-left:.25in'><span style='font-size:11.0pt; font-family:Helvetica;mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight: bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>16.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>Y. Pan, S. Mishra and D. Schwartz (2017). Gamifying Course Modules for Entry Level Students, <i style='mso-bidi-font-style:normal'>ACM Special Interest Group in Computer Science Education (ACM SIGCSE 2017), </i>6 pages, accepted for publication.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>17.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>S. Afrin and S. Mishra (2016). An Anonymized Authentication Framework for Smart Metering Data Privacy, <i style='mso-bidi-font-style:normal'>IEEE Conference on Innovative Smart Grid Technologies (IEEE ISGT2016), </i>Minneapolis, MN, 1-5.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>18.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>B. Lipton and S. Mishra (2016). Formalizing Anonymity-Delay Tradeoffs in Smart Grid Networks, <i style='mso-bidi-font-style:normal'>4<sup>th</sup> IEEE International Conference on Smart Energy Grid Engineering (IEEE SEGE 2016), </i>Oshawa, ON, 353-357.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>19.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>S. Alshehri, S. Mishra and R.K. Raj (2016). Using Access Control to Mitigate Insider Threats to Healthcare Systems, <i style='mso-bidi-font-style:normal'>IEEE International Conference on Healthcare Informatics (IEEE ICHI 2016), </i>Chicago, IL, 55-60.</span><b style='mso-bidi-font-weight:normal'><span style='font-size: 11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond;color:black'> </span></b><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'><o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>20.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>S. Mishra, T. Howles, R.K. Raj, C. Romanowski, J. Schneider, A. McNett and D.J. Dates (2016). A modular approach to teaching critical infrastructure protection concepts to engineering, technology and computing students, <i style='mso-bidi-font-style:normal'>IEEE</i> <i style='mso-bidi-font-style: normal'><span style='mso-bidi-font-weight:bold'>Frontiers in Education Conference (IEEE FIE 2016)</span></i><span style='mso-bidi-font-weight: bold'>, Erie, PA, 1-7.<o:p></o:p></span></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>21.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>Y. Pan, R. McGlinn, S. Mishra, and D. Schwartz (2016). Gamifying Cybersecurity Modules for Entry Level Students, <i style='mso-bidi-font-style:normal'><span style='mso-bidi-font-weight:bold'>20<sup>th</sup> Colloquium for Information Systems Security Education (CISSE<span style='mso-spacerun:yes'> </span>2016), </span></i></span><span lang=EN-GB style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family: Garamond;color:black;mso-ansi-language:EN-GB;mso-bidi-font-weight:bold'>Philadelphia, PA</span><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family: Garamond;color:black;mso-bidi-font-weight:bold'>, 10 pages.</span><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'><o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>22.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>C. Romanowski, J. Schneider, S. Mishra, R.K. Raj, R. Rosario, K. Stein, and B. Solanki (2016). Response and Recovery: A quantitative approach to emergency management, <i>IEEE International Conference on Technologies for Homeland Security (IEEE HST 2016)</i>, Waltham, MA, 6 pages. <o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>23.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>J. Schneider, C. Romanowski, R. K. Raj, S. Mishra, J. Aleckna, and Kaiyue Wang (2016). Mapping a community resilience management system: building operational knowledge, <i>IEEE International Conference on Technologies for Homeland Security (IEEE HST 2016)</i>, Waltham, MA, 6 pages.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>24.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>C. Romanowski, R.K. Raj, J. Schneider, S. Mishra, B. Brooks, J. Pardee, B. Bhole, and N. Robalino (2016). The Community as Responder: A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions, <i style='mso-bidi-font-style:normal'>Tenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection</i>, Arlington, VA, 203-218.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>25.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>S. Mishra, R. K. Raj, C. J. Romanowski, J. Schneider and A. Critelli (2015). On building cybersecurity expertise in critical infrastructure protection, <i style='mso-bidi-font-style:normal'><span style='mso-bidi-font-weight:bold'>IEEE Conference on Technologies for Homeland Security (IEEE HST 2015)</span></i>, Waltham, MA, pp. 1-6 (DOI:10.1109/THS.2015.7225263).<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>26.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>J. Schneider, C. J. Romanowski, R. K. Raj, S. Mishra and K. Stein (2015). Measurement of locality specific resilience: an operational model, <i style='mso-bidi-font-style:normal'>IEEE Conference on Technologies for Homeland Security (IEEE HST 2015)</i>, Waltham, MA, pp. 1-6 (DOI: 10.1109/THS.2015.7225332).<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>27.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>Y. Pan, D. Schwartz, and S. Mishra (2015). Gamified Digital Forensics Course Modules for Undergraduates, <i style='mso-bidi-font-style:normal'>5<sup>th</sup> IEEE Integrated STEM Education Conference (IEEE ISEC 2015), </i>Princeton, NJ, 100-105.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>28.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>C. Romanowski, R. Raj, J. Schneider, S. Mishra, V. <span class=SpellE>Shivshankar</span>, S. <span class=SpellE>Ayengar</span>, <span class=SpellE><span class=GramE>F.Cueva</span></span> (2015). Regional response to large-scale emergency events: Building on historical data, <i style='mso-bidi-font-style:normal'>Ninth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection,</i> Arlington, VA (paper presented at the conference, invited article for Elsevier Journal of Critical Infrastructure Protection).<span style='mso-bidi-font-weight:bold'><o:p></o:p></span></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>29.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>W. <span class=SpellE>Huba</span>, B. Yuan, Y. Pan, and <span class=SpellE><span class=GramE>S.Mishra</span></span> (2013). Towards A Web Tracking Profiling Algorithm, <i style='mso-bidi-font-style: normal'>IEEE Conference on Technologies for Homeland Security (IEEE HST 2013)</i>, Boston, MA, 12-17. <o:p></o:p></span></p> <p class=MsoNormal style='margin-left:.25in'><span style='font-size:11.0pt; font-family:Helvetica;mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight: bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>30.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>C. Romanowski, S. Mishra, R. Raj, T. Howles, and J. Schneider (2013). Information management and decision support in critical infrastructure emergencies at the local level, <i style='mso-bidi-font-style:normal'>IEEE Conference on Technologies for Homeland Security (IEEE HST 2013), </i>Boston, MA, 113-118.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>31.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>S. Mishra, C. Romanowski, R. Raj, T. Howles, and J. Schneider (2013). A Curricular Framework for Critical Infrastructure Protection Education for Engineering, Technology and Computing Majors,<i style='mso-bidi-font-style:normal'> IEEE</i> <i style='mso-bidi-font-style:normal'>Frontiers in Education Conference (IEEE FIE 2013)</i>, Oklahoma City, OK, 1779-1781.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>32.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>Y. Pan and S. Mishra (2013). Advanced Forensics Labs to meet Computer Forensics challenges due to Technological Advancements, <i style='mso-bidi-font-style:normal'>Proceedings of the 17th Colloquium for Information Systems Security Education (CISSE 2013)</i>, Mobile, AL, 21-30.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>33.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>H. Tuncer, N. Shenoy, A. <span class=SpellE>Kwasinski</span>, J. Hamilton, and S. Mishra (2012).<i style='mso-bidi-font-style:normal'> </i>A Novel User-centric Handoff Cost Framework Applied to the Virtual Mobility Domains and IPv6-based Mobility Protocols,<i style='mso-bidi-font-style:normal'> IEEE Global Communications Conference (IEEE GLOBECOM 2012), </i>Anaheim, CA, 2578  2584.<o:p></o:p></span></p> <p class=MsoNormal style='margin-left:.25in'><span style='font-size:11.0pt; font-family:Helvetica;mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight: bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>34.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>Y. Pan, S. Mishra, B. Yuan, B. Stackpole and D. Schwartz (2012). Game-based Forensics Course for First Year Students, <i style='mso-bidi-font-style:normal'>Proceedings of 13th Annual ACM Special Interest Group for Information Technology Education (ACM SIGITE 2012), </i>Calgary, Canada, 13-18.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>35.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>N. <span class=SpellE>Winemiller</span>, B. <span class=SpellE>Hartpence</span>, D. Johnson and S. Mishra (2012). NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms, <i style='mso-bidi-font-style:normal'>Proceedings of International Conference on Security and Management </i>(<i style='mso-bidi-font-style:normal'>SAM<span style='mso-spacerun:yes'> </span>2012), </i>Las Vegas, NV.</span><span style='font-size:11.0pt; font-family:Garamond;mso-fareast-font-family:"Times New Roman";mso-fareast-theme-font: minor-fareast;mso-bidi-font-family:"Times New Roman";mso-bidi-theme-font: minor-bidi;mso-fareast-language:JA'> </span><span style='font-size:11.0pt; font-family:Helvetica;mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight: bold'><o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>36.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>J. Treglia, L. W. McKnight, M. Venkatesh, T. Bose, J. Van Aardt, Jan, D. Mckeown, S. Mishra, and M. Lee (2011). Social Emergency Response Technology Policy: Wireless Grid Edgeware for Collaboration in Infrastructureless Wireless Networks, Intelligent Distributed Augmented Wireless Gateways (IDAWG), Neighborhood Notification and Advanced Situational Awareness Systems (ASAS), <i style='mso-bidi-font-style: normal'>40th Research Conference on Communication, Information and Internet Policy,</i> Arlington, VA, September 2011. <o:p></o:p></span></p> <p class=MsoNormal style='margin-left:.25in'><span style='font-size:11.0pt; font-family:Helvetica;mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>37.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>R.K. Raj, S. Mishra, C. Romanowski and T. Howles (2011). <span style='mso-bidi-font-weight:bold'>Cybersecurity as General Education, <i style='mso-bidi-font-style:normal'>Proceedings of the 15<sup>th</sup> Colloquium for Information Systems Security Education (CISSE 2011), </i></span></span><span lang=EN-GB style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family: Garamond;color:black;mso-ansi-language:EN-GB;mso-bidi-font-weight:bold'>Fairborn, Ohio, </span><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-weight:bold'>10-15.<i style='mso-bidi-font-style:normal'><o:p></o:p></i></span></p> <p class=MsoNormal><i style='mso-bidi-font-style:normal'><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></i></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>38.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>O. <span class=SpellE>Polatcan</span>, S. Mishra, and Y. Pan (2011). E-mail Behavior Profiling based on Attachment Type and Language, <i style='mso-bidi-font-style:normal'>Proceedings of</i> 6<sup>th</sup> <i style='mso-bidi-font-style:normal'>Annual Symposium on Information Assurance (ASIA 2011), </i>Albany, NY, 6 -10.<i style='mso-bidi-font-style:normal'><o:p></o:p></i></span></p> <p class=MsoNormal><i style='mso-bidi-font-style:normal'><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></i></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-weight:bold'><span style='mso-list: Ignore'>39.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-weight:bold'>T. Howles, C. Romanowski, S. Mishra, and R.K. Raj (2011). A Holistic, Modular Approach to Infuse Cybersecurity into Undergraduate Computing Degree Programs, <i style='mso-bidi-font-style: normal'>Proceedings of</i> 6<sup>th</sup> <i style='mso-bidi-font-style: normal'>Annual Symposium on Information Assurance (ASIA 2011), </i>Albany, NY, 67 -70.<i style='mso-bidi-font-style:normal'><o:p></o:p></i></span></p> <p class=MsoNormal style='margin-left:.25in'><i style='mso-bidi-font-style: normal'><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family: Garamond;color:black;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></i></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>40.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>D. Pearson, S. Mishra, and Y. Pan (2011). Dynamic Threat-resistant Node Identification in Sensor Networks, <i style='mso-bidi-font-style:normal'>Proceedings of International Conference on Security and Management</i> <i style='mso-bidi-font-style:normal'>(SAM 2011), </i>Las Vegas, NV.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-style:italic'><span style='mso-list: Ignore'>41.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>D. Pearson, S. Mishra and Y. Pan (2010). Security Attacks and Defenses in Sensor networks, <i style='mso-bidi-font-style:normal'>Proceedings of International Conference on Security and Management (SAM 2010), </i>Las Vegas, NV.<span style='mso-bidi-font-style:italic'><o:p></o:p></span></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-style:italic'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-style:italic'><span style='mso-list: Ignore'>42.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-style:italic'>T. Oh, S. Mishra and Y. Pan (2009). </span><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family: Garamond;color:black'>Teaching High-Assurance Internet Protocol Encryption (HAIPE) using OPNET Modeler Simulation Tool<span style='mso-bidi-font-style: italic'>,<i> Proceedings of the 10th ACM conference on SIG-information technology education&nbsp;(ACM SIGITE 2009), </i>ACM, New York<i>, NY, USA, </i>161-165.<o:p></o:p></span></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-style:italic'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-style:italic'><span style='mso-list: Ignore'>43.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-style:italic'>S. Mishra, Y. Pan and T. Oh (2009). Undergraduate Research in Wireless Sensor Security Course, <i>Proceedings of the 13<sup>th</sup> Colloquium for Information Systems Security Education (CISSE 2009)</i>, Seattle, Washington, 139  144.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black;mso-bidi-font-style:italic'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>44.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black;mso-bidi-font-style:italic'>T. Oh, Y. Pan, and S. Mishra (2009). Network Management Architecture for Energy Efficient Mobile Ad-Hoc Networks, <i>Proceedings of US-Korea Conference on Science, Technology, and Entrepreneurship </i>(UKC  09), Raleigh, NC.</span><span style='font-size: 11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond;color:black'><o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>45.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>G. Thamilarasu, S. Mishra, and R. Sridhar (2006). A cross-layer approach to detect jamming attacks in wireless ad hoc networks,&nbsp;<i>Proceedings of the 2006 IEEE conference on Military communications</i>&nbsp;<i style='mso-bidi-font-style:normal'>(IEEE MILCOM 2006)</i>, IEEE Press, Piscataway, NJ, USA, 753-759.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>46.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>G. Thamilarasu, A. Balasubramanian, S. Mishra and R. Sridhar (2005). A cross-layer based intrusion detection approach for wireless ad hoc networks, <i style='mso-bidi-font-style:normal'>Proceedings of <span style='mso-bidi-font-style:italic'>IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (IEEE MASS 2005)</span></i>, IEEE Press, Piscataway, NJ, USA, 861 -868.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>47.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>K. Ramakrishnan, A. Balasubramanian, S. Mishra, and R. Sridhar (2005). Wireless security protocol using a <span class=GramE>low cost</span> pseudo random number generator, <i>Proceedings of the 2005 IEEE conference on Military communications</i>&nbsp;<i style='mso-bidi-font-style:normal'>(IEEE MILCOM 2005)</i>, IEEE Press, Piscataway, NJ, USA, 1333 - 1339.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black;mso-bidi-font-style:italic'><span style='mso-list: Ignore'>48.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>A. Balasubramanian, S. Mishra and R. Sridhar (2005). Secure Key Management for NASA Communication, <i style='mso-bidi-font-style:normal'>Proceedings of</i> <i>Fifth Integrated Communications, Navigation and Surveillance Conference and Workshop (ICNS 2005)</i><i style='mso-bidi-font-style:normal'>,</i> Fairfax, VA.<i><o:p></o:p></i></span></p> <p class=MsoNormal><i><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></i></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>49.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>A Balasubramanian, S. Mishra and R. Sridhar (2005). Analysis of a Hybrid Key Management solution for Ad hoc Networks, <i style='mso-bidi-font-style:normal'>Proceedings of 2005</i> <i>IEEE Wireless Communication and Networking Conference (IEEE WCNC 2005</i><span style='mso-bidi-font-style:italic'>)</span>, IEEE Press, Piscataway, NJ, USA, 2082  2087.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>50.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>V. Natarajan, A. Balasubramanian, S. Mishra and R. Sridhar (2005). Security for Energy Constrained RFID System, <i style='mso-bidi-font-style: normal'>Proceedings of</i> <i style='mso-bidi-font-style:normal'>Fourth IEEE Workshop on Automatic Identification Advanced Technologies (IEEE AutoID 2005),</i> IEEE Press, Piscataway, NJ, USA, 181  186.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>51.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>A. Balasubramanian, S. Mishra and R. Sridhar (2004). An Enhanced Security Solution for Wireless Networks using Tradeoff Analysis, <i>1st IEEE Upstate NY Workshop on Communications and Networking</i>, Rochester, NY.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>52.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>E. Yanmaz, O. Tonguz, S. Mishra, H. Wu and C. Qiao (2002). Efficient Dynamic Load Balancing Algorithms using iCAR Systems: A Generalized Framework, <i style='mso-bidi-font-style:normal'>Proceedings of</i> <i style='mso-bidi-font-style:normal'>56th semi-annual IEEE International Vehicular Technology Conference (IEEE VTC Fall 2002</i>), IEEE Press, Piscataway, NJ, 586  590.<i style='mso-bidi-font-style:normal'><o:p></o:p></i></span></p> <p class=MsoNormal><i style='mso-bidi-font-style:normal'><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'><o:p>&nbsp;</o:p></span></i></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>53.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>C. Qiao, H. Wu, S. De, E. Yanmaz, O. Tonguz and S. Mishra (2002). Deploying iCAR in Disaster Recovery, <i>The First IEEE Workshop on Disaster Recovery Networks in conjunction with INFOCOM 2002</i>, IEEE Press, Piscataway, NJ, USA.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>54.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>E. Yanmaz, O. Tonguz, S. Mishra, H. Wu and C. Qiao (2002). Impact of the Number of ISM-band Ad hoc Relay Channels on the Performance of iCAR Systems, <i style='mso-bidi-font-style:normal'>Proceedings of</i> <i style='mso-bidi-font-style:normal'>55th semi-annual IEEE International Vehicular Technology Conference (IEEE VTC Spring 2002),</i> IEEE Press, Piscataway, NJ, 1492  1496.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>55.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>S. Mishra and O. K. Tonguz (2001). A New Metric for Analyzing Multi-<span class=GramE>step</span> Paging Schemes in Mobile Networks, <i style='mso-bidi-font-style:normal'>Proceedings of</i> <i style='mso-bidi-font-style: normal'>51st Annual IEEE International Vehicular Technology Conference (IEEE VTC 1999),</i> IEEE Press, Piscataway, NJ, USA. 2590-2594.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>56.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>O. K. Tonguz, S. Mishra, and D. M. Grasso (1999). Impact of Random User Motion on Locating Subscribers in Mobile Networks, <i style='mso-bidi-font-style:normal'>Proceedings of</i> <i style='mso-bidi-font-style: normal'>IEEE International Conference on Communications (IEEE ICC 1999), </i>IEEE Press, Piscataway, NJ, USA, 1746-1750.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>57.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>O. K. Tonguz, S. Mishra and R. Josyula (1999). Intelligent Paging in Wireless Networks: Random Mobility Models and Grouping Algorithms for Locating Subscribers, <i style='mso-bidi-font-style:normal'>Proceedings of</i> <i style='mso-bidi-font-style:normal'>49th Annual IEEE International Vehicular Technology Conference (IEEE VTC 1999)</i>, IEEE Press, Piscataway, NJ, 1177-1181.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>58.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>O. K. Tonguz, S. Mishra and R. Josyula (1999). Impact of Random User Motion on Locating Subscribers in Mobile Networks, <i style='mso-bidi-font-style:normal'>Proceedings of IEEE International conference on Personal Wireless Communications (IEEE ICPWC 1999</i>), IEEE Press, Piscataway, NJ, USA, 491  495.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>59.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>S. Mishra and O.K. Tonguz (1997). Most Recent Interaction Area and Speed-based Intelligent Paging in Personal Communication Systems, <i style='mso-bidi-font-style:normal'>Proceedings<span style='mso-bidi-font-style: italic'> of 47th Annual IEEE International Vehicular Technology Conference (IEEE VTC 1997)</span>, </i>IEEE Press, Piscataway, NJ, USA, 505-509.<o:p></o:p></span></p> <p class=MsoNormal><span style='font-size:11.0pt;font-family:Helvetica; mso-bidi-font-family:Garamond;color:black'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:black'><span style='mso-list:Ignore'>60.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-family:Garamond; color:black'>H. Jung, S. Mishra and O.K. Tonguz (1995). Efficient Location Management in PCS, <i style='mso-bidi-font-style:normal'>Proceedings of Sixth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 1995), </i>IEEE Press, Piscataway, NJ, USA, 284 -288.<o:p></o:p></span></p> <p><b><span style='font-size:11.0pt;font-family:Helvetica;color:maroon'>Peer-Reviewed Conference Extended Abstracts<o:p></o:p></span></b></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;mso-bidi-font-weight:bold'><span style='mso-list:Ignore'>61.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-weight:bold'>A. McNett, D.J. Dates, and S. Mishra (2015). Security and Education: Collaborative Modular Approach to Embedding Security Concepts, <i style='mso-bidi-font-style:normal'>Innovations 2015, League for Innovation in the community college</i>, Boston, MA.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>62.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>Y. Pan, S. Mishra, D. Schwartz, A. McNett, and P. McCarthy (2015). Gamified Digital Forensics Course Modules for Entry-Level Students Demonstration, <i>the 24<sup>th </sup>Annual Conference on Instruction &amp; Technology </i><span style='mso-bidi-font-style:italic'>(CIT 2015)</span>, SUNY <span class=SpellE>Geneseo</span>, NY.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>63.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>B. Yuan, Y. Pan, Sumita Mishra, David Schwartz and Ryan McGlinn (2015), Birds of a Feather: Gamifying Cybersecurity Course Content for Entry Level Students, <i style='mso-bidi-font-style:normal'>National Initiative for Cybersecurity Education </i>(NICE 2015)<i style='mso-bidi-font-style: normal'>,</i> San Diego, CA.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>64.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>E. <span class=SpellE>Golen</span>, S. Mishra, and N. Shenoy (2010). On the effects of deployment imprecision on underwater sensor connectivity. In&nbsp;<i>Proceedings of the Fifth ACM International Workshop on Underwater Networks</i>&nbsp;(<span class=SpellE>WUWNet</span> '10). ACM, New York, NY, USA, Article no. 17.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>65.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>R. <span class=SpellE>Nagi</span>, S. Mishra, W. Lawless, J. <span class=SpellE>Llinas</span>, and F. Mufalli (2007). Complexity Measures and Congestion Issues in Wireless Sensor Networks, in<i style='mso-bidi-font-style: normal'> Institute for Operations Research and the Management Sciences<span style='mso-bidi-font-style:italic'> Annual Meeting</span></i> <span style='mso-bidi-font-style:italic'>(INFORMS  07<i>), </i></span>Seattle WA.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>66.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>P. Elakummanan, S. Mishra, R. Sridhar and K. Thyagarajan (2004). Dynamic MEXCLP based Load Balanced Clustering Algorithm for a Wireless Ad Hoc Network, in <i style='mso-bidi-font-style:normal'>Institute for Operations Research and the Management Sciences</i> <i>Annual Meeting</i> (<span style='mso-bidi-font-style:italic'>INFORMS 2004)<i>, </i></span>Denver, CO.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;mso-bidi-font-weight:bold'><span style='mso-list:Ignore'>67.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica'>R. Sridharan, R. Sridhar and S. Mishra (2003). A Robust Header Compression Technique for Wireless Adhoc Networks, in<i> Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing </i><span style='mso-bidi-font-style:italic'>(MOBIHOC  03)<i>, </i></span>Annapolis, MD<i>.</i><b><o:p></o:p></b></span></p> <p class=Default style='margin-top:12.0pt'><b><span style='font-size:11.0pt; font-family:Helvetica;color:maroon'>Peer-Reviewed Conference Posters<o:p></o:p></span></b></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:windowtext;mso-bidi-font-weight:bold'><span style='mso-list:Ignore'>68.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica;color:windowtext;mso-bidi-font-weight:bold'>V. Natarajan, A. Balasubramanian, S. Mishra and R. Sridhar (2005). Towards Providing Security for RFID Tags with Depleting Internal Energy, in <i>Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing</i> (MOBIHOC  05), Urbana-Champaign, IL.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:windowtext;mso-bidi-font-weight:bold'><span style='mso-list:Ignore'>69.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica;color:windowtext;mso-bidi-font-weight:bold'>G. Thamilarasu, A. Balasubramanian, S. Mishra and R. Sridhar (2005). A Cross-Layer Approach to Detecting <span class=SpellE>DoS</span> Attacks in Wireless Ad-Hoc Networks, in <i>Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing</i> (MOBIHOC  05), Urbana-Champaign, IL.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:windowtext;mso-bidi-font-weight:bold'><span style='mso-list:Ignore'>70.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica;color:windowtext;mso-bidi-font-weight:bold'>G. Thamilarasu, S. Mishra and R. Sridhar (2004). Cross-Layer Approach to low energy Wireless Ad Hoc Networks, <i>IST RTG-012 Workshop on  Cross-Layer Issues in the Design of Tactical Mobile Ad Hoc Wireless Networks: Integration of Communication and Networking Functions to Support Optimal Information Management</i> , Naval Research Laboratory, Washington, DC.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:windowtext;mso-bidi-font-weight:bold'><span style='mso-list:Ignore'>71.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica;color:windowtext;mso-bidi-font-weight:bold'>G. Thamilarasu, S. Mishra and R. Sridhar (2004). Analysis of Cross-layer design approach for energy Conservation in Wireless Ad hoc Networks, in <i>1st IEEE Upstate NY Workshop on Communications and Networking</i>, Rochester, NY.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;color:windowtext;mso-bidi-font-weight:bold'><span style='mso-list:Ignore'>72.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica;color:windowtext;mso-bidi-font-weight:bold'>P. Elakummanan, S. Mishra and R. Sridhar (2004). A Novel Load Balanced Clustering Algorithm for a Wireless Ad Hoc Network with UAVs, in <i>1st IEEE Upstate NY Workshop on Communications and Networking</i>, Rochester, NY.<o:p></o:p></span></p> <p><b><span style='font-size:11.0pt;font-family:Helvetica;color:maroon'>Special Reports <o:p></o:p></span></b></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;mso-bidi-font-weight:bold'><span style='mso-list:Ignore'>73.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-weight:bold'>S. Mishra et. al (2015). Innovative Approaches to Computing Education, <i style='mso-bidi-font-style:normal'>Computing Research Association Report, </i>June 2015.<o:p></o:p></span></p> <p class=MsoNormal style='text-align:justify'><b><span style='font-size: 11.0pt;font-family:Helvetica;color:maroon'><o:p>&nbsp;</o:p></span></b></p> <p class=MsoNormal style='text-align:justify'><b><span style='font-size: 11.0pt;font-family:Helvetica;color:maroon'>Press Coverage/Technical Reports/Guest Lectures<o:p></o:p></span></b></p> <p class=MsoNormal style='text-align:justify'><span style='font-size:11.0pt; font-family:Helvetica;mso-bidi-font-weight:bold'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica;mso-bidi-font-weight:bold'><span style='mso-list:Ignore'>74.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-weight:bold'>B. Aloraini, D. Johnson, B. Stackpole and, S. Mishra (2015). A New Covert Channel over Cellular Voice Channel in Smartphones, <i style='mso-bidi-font-style: normal'>arXiv preprint arXiv:1504.05647 </i>(<i style='mso-bidi-font-style: normal'>This article generated press coverage around the world. Some of them are documented</i> at </span><span style='font-family:Helvetica'><a href="http://www.bushra-aloraini.net/#!research/c46c"><span style='font-size:11.0pt;mso-bidi-font-weight:bold'>http://www.bushra-aloraini.net/#!research/c46c</span></a></span><span style='font-size:11.0pt;font-family:Helvetica;mso-bidi-font-weight:bold'> <o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>75.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>S. Alshehri, S. Mishra, R. Raj (2013). Insider threat mitigation and access control in healthcare systems, Technical Report, Rochester Institute of Technology.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>76.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>S. Mishra (2012). iDAWG: Intelligent Deployable Augmented Wireless Gateway and Disaster Response, <span class=GramE>The</span> 2012 Joint Workshop on Disaster Response presented by the Information Products Laboratory for Emergency Response &amp; Center for Geo-hazards Studies, May 30  June 1, 2012.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>77.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>S. Mishra (2011). Data Networking in Smart Grid Systems, RIT Energy Networking Working Group Meeting and Poster Session, April 22nd 2011.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>78.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>S. Mishra (2011). Role of Wireless Technologies in the Smart Grid, 8th WIGIT Meeting at Virginia Tech, March 13th 2011.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>79.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>P. Newcomb, S. Mishra et al (2011). Novel Methods of Monitoring Labor in Electrohysterography, RIT &amp; RGHS Alliance Research Reception and Poster Session, March 14th 2011.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>80.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>S. Hari, S. Mishra, and S. Mason (2011). Performance Evaluation of Multicast Routing on IPv4 and IPv6 Networks, in New York Celebration of Women in Computing (NYC-WIC 2011), Albany, NY.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>81.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>S. Mishra (2010). Sensor Networks  Introduction, School of Information Sciences, Syracuse University, October 20th 2010 (Guest Lecture).<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>82.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>T. Oh, Y. Pan, and S. Mishra (2009). Network Management Architecture for Energy Efficient Mobile Ad-Hoc Networks, Proceedings of US-Korea Conference on Science, Technology, and Entrepreneurship (UKC  09), Raleigh, NC.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>83.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>F. Mufalli, R. Nagi, J. Llinas, S. Mishra, W. Lawless (2008). Investigation of Means of Mitigating Congestion in Complex, Distributed Network Systems by Optimization Means and Information Theoretic Procedures, AFRL-RH-WP-TR-2008-0059, AFRL Technical Report.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>84.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>B. Montgomery and S. Mishra (2008). Security Solution for cluster based wireless sensor networks, in RIT Annual Undergraduate Research and Innovation Symposium, Rochester, NY.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>85.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>G. Thamilarasu, S. Mishra and R. Sridhar (2004). Cross-Layer Approach to low energy Wireless Ad Hoc Networks, IST RTG-012 Workshop on  Cross-Layer Issues in the Design of Tactical Mobile Ad Hoc Wireless Networks: Integration of Communication and Networking Functions to Support Optimal Information Management , Naval Research Laboratory, Washington, DC.<o:p></o:p></span></p> <p class=Default style='margin-top:12.0pt;margin-right:0in;margin-bottom: 0in;margin-left:.25in;margin-bottom:.0001pt;text-indent:-.25in;mso-list: l0 level1 lfo5'><![if !supportLists]><span style='font-size:11.0pt; font-family:Helvetica;mso-fareast-font-family:Helvetica;mso-bidi-font-family: Helvetica'><span style='mso-list:Ignore'>86.<span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:11.0pt;font-family: Helvetica'>A. Balasubramanian, S. Mishra and R. Sridhar (2004). A Hybrid Approach to Key Management for Enhanced Security in Ad hoc Networks, Technical Report 2004-09, University at Buffalo.<o:p></o:p></span></p> <p style='margin-top:12.0pt'><b><span style='font-size:11.0pt;font-family: Helvetica;color:maroon'><o:p>&nbsp;</o:p></span></b></p> </td> </tr> <tr style='mso-yfti-irow:1;mso-yfti-lastrow:yes;height:149.25pt'> <td width=156 valign=top style='width:156.0pt;padding:.75pt .75pt .75pt .75pt; height:149.25pt'> <p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family: Helvetica'>&nbsp;<o:p></o:p></span></p> </td> <td width=12 valign=top style='width:11.9pt;padding:.75pt .75pt .75pt .75pt; height:149.25pt'> <p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family: Helvetica'>&nbsp;<o:p></o:p></span></p> </td> <td width=20 valign=top style='width:19.6pt;padding:.75pt .75pt .75pt .75pt; height:149.25pt'> <p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family: Helvetica'>&nbsp;<o:p></o:p></span></p> </td> <td width=614 valign=top style='width:614.25pt;padding:.75pt .75pt .75pt .75pt; height:149.25pt'> <p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family: Helvetica'>&nbsp;<o:p></o:p></span></p> </td> </tr> </table> <p class=MsoNormal><!--[if mso & !supportInlineShapes & supportFields]><span style='mso-element:field-begin;mso-field-lock:yes'></span><span style='mso-spacerun:yes'></span>SHAPE <span style='mso-spacerun:yes'></span>\* MERGEFORMAT <span style='mso-element: field-separator'></span><![endif]--><!--[if gte vml 1]><v:rect id="Picture_x0020_6" o:spid="_x0000_s1026" alt="http://www.easternct.edu/personal/faculty/gaok/pixel.gif" style='width:1pt;height:1pt;visibility:visible;mso-wrap-style:square; mso-left-percent:-10001;mso-top-percent:-10001;mso-position-horizontal:absolute; mso-position-horizontal-relative:char;mso-position-vertical:absolute; mso-position-vertical-relative:line;mso-left-percent:-10001; mso-top-percent:-10001;v-text-anchor:top' o:gfxdata="UEsDBBQABgAIAAAAIQDkmcPA+wAAAOEBAAATAAAAW0NvbnRlbnRfVHlwZXNdLnhtbJSRQU7DMBBF 90jcwfIWJQ5dIISSdEHaJSBUDjCyJ4nVZGx53NDeHictG4SKWNrj9//TuFwfx0FMGNg6quR9XkiB pJ2x1FXyY7fNHqXgCGRgcISVPCHLdX17U+5OHlkkmriSfYz+SSnWPY7AufNIadK6MEJMx9ApD3oP HapVUTwo7SgixSzOGbIuG2zhMESxOabrs0nCpXg+v5urKgneD1ZDTKJqnqpfuYADXwEnMj/ssotZ nsglnHvr+e7S8JpWE6xB8QYhvsCYPJQJrHDlGqfz65Zz2ciZa1urMW8Cbxbqr2zjPing9N/wJmHv OH2nq+WD6i8AAAD//wMAUEsDBBQABgAIAAAAIQAjsmrh1wAAAJQBAAALAAAAX3JlbHMvLnJlbHOk kMFqwzAMhu+DvYPRfXGawxijTi+j0GvpHsDYimMaW0Yy2fr28w6DZfS2o36h7xP//vCZFrUiS6Rs YNf1oDA78jEHA++X49MLKKk2e7tQRgM3FDiMjw/7My62tiOZYxHVKFkMzLWWV63FzZisdFQwt81E nGxtIwddrLvagHro+2fNvxkwbpjq5A3wye9AXW6lmf+wU3RMQlPtHCVN0xTdPaoObMsc3ZFtwjdy jWY5YDXgWTQO1LKu/Qj6vn74p97TRz7jutV+h4zrj1dvuhy/AAAA//8DAFBLAwQUAAYACAAAACEA JNkSmt0CAAD0BQAADgAAAGRycy9lMm9Eb2MueG1srFTbjtMwEH1H4h8sv6e5kF4SbbpamgYhLbDS wge4jpNYm9jBdpsWxL8zdtpuu8sTkAfL9jhnLufM3NzuuxbtmNJcigyHkwAjJqgsuagz/O1r4S0w 0oaIkrRSsAwfmMa3y7dvboY+ZZFsZFsyhQBE6HToM9wY06e+r2nDOqInsmcCjJVUHTFwVLVfKjIA etf6URDM/EGqsleSMq3hNh+NeOnwq4pR86WqNDOozTDEZtyq3Lqxq7+8IWmtSN9wegyD/EUUHeEC nJ6hcmII2ir+CqrjVEktKzOhsvNlVXHKXA6QTRi8yOaxIT1zuUBxdH8uk/5/sPTz7kEhXgJ3GAnS AUUPnJqtYmiGUck0hWIdSRmGYcKINkwJaias3Po9EC8Faf2K0G1rDn5N5JPf8z1rJzWvbHWHXqfg 5LF/ULY+ur+X9EkjIVcNETW70z1wNHo/XSklh4aREtIMLYR/hWEPGtDQZvgkS4iXbI10td9XqrM+ oKpo7yg+nClme4MoXIbRPAAdULCMW4tP0tOvvdLmA5MdspsMK4jNQZPdvTbj09MT60nIgrct3JO0 FVcXgDnegGP41dpsCE4SP5MgWS/Wi9iLo9nai4M89+6KVezNinA+zd/lq1Ue/rJ+wzhteFkyYd2c 5BnGZ0ZObfJHVR0bZRTWWaBatry0cDYkrerNqlVoR6A9Cve5goPl+Zl/HYarF+TyIqUwioP3UeIV s8Xci4t46iXzYOEFYfI+mQVxEufFdUr3XLB/TwkNGU6m0dSxdBH0i9wC973OjaQdBz2jlncZXpwf kdTqby1KR60hvB33F6Ww4T+XAug+Ee3UagU6an8jywOIVUmQEwgPRiVsGql+YDTA2Mmw/r4limHU fhQg+CSMYzun3CGeziM4qEvL5tJCBAWoDBuMxu3KjLNt2yteN+ApdIUR8g6apOJOwraBxqiOrQWj xWVyHIN2dl2e3avnYb38DQAA//8DAFBLAwQUAAYACAAAACEALtXn2NcAAAABAQAADwAAAGRycy9k b3ducmV2LnhtbEyPQUvDQBCF74L/YRnBi9iNPYjEbIoUxCJCMdWep9lpEpqdTbPbJP57x17sZYbH G958L1tMrlUD9aHxbOBhloAiLr1tuDLwtXm9fwIVIrLF1jMZ+KEAi/z6KsPU+pE/aShipSSEQ4oG 6hi7VOtQ1uQwzHxHLN7e9w6jyL7StsdRwl2r50nyqB02LB9q7GhZU3koTs7AWK6H7ebjTa/vtivP x9VxWXy/G3N7M708g4o0xf9j+MMXdMiFaedPbINqDUiReJ7izUXszkvnmb4kz38BAAD//wMAUEsB Ai0AFAAGAAgAAAAhAOSZw8D7AAAA4QEAABMAAAAAAAAAAAAAAAAAAAAAAFtDb250ZW50X1R5cGVz XS54bWxQSwECLQAUAAYACAAAACEAI7Jq4dcAAACUAQAACwAAAAAAAAAAAAAAAAAsAQAAX3JlbHMv LnJlbHNQSwECLQAUAAYACAAAACEAJNkSmt0CAAD0BQAADgAAAAAAAAAAAAAAAAAsAgAAZHJzL2Uy b0RvYy54bWxQSwECLQAUAAYACAAAACEALtXn2NcAAAABAQAADwAAAAAAAAAAAAAAAAA1BQAAZHJz L2Rvd25yZXYueG1sUEsFBgAAAAAEAAQA8wAAADkGAAAAAA== " filled="f" stroked="f"> <o:lock v:ext="edit" aspectratio="t"/> <w:wrap type="none"/> <w:anchorlock/> </v:rect><![endif]--><!--[if mso & !supportInlineShapes & supportFields]><v:shape id="_x0000_i1025" type="#_x0000_t75" style='width:1pt;height:1pt'> <v:imagedata croptop="-65520f" cropbottom="65520f"/> </v:shape><span style='mso-element:field-end'></span><![endif]--><span style='font-family:Verdana;mso-bidi-font-family:Helvetica'><o:p></o:p></span></p> </td> </tr> </table> </div> <p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family:Helvetica'><br style='mso-special-character:line-break'> <![if !supportLineBreakNewLine]><br style='mso-special-character:line-break'> <![endif]><o:p></o:p></span></p> <div align=center> <table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width="98%" style='width:98.0%;mso-cellspacing:0in;mso-yfti-tbllook:1184;mso-padding-alt: 0in 0in 0in 0in'> <tr style='mso-yfti-irow:0;mso-yfti-firstrow:yes;mso-yfti-lastrow:yes; height:22.5pt'> <td width=480 valign=top style='width:480.0pt;background:white;padding:0in 0in 0in 0in; height:22.5pt'> <table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width=12 style='width:12.15pt;mso-cellspacing:0in;mso-yfti-tbllook:1184;mso-padding-alt: 0in 5.4pt 0in 5.4pt'> <tr style='mso-yfti-irow:0;mso-yfti-firstrow:yes;mso-yfti-lastrow:yes; height:11.25pt'> <td width=12 style='width:12.15pt;padding:.75pt .75pt .75pt .75pt; height:11.25pt'></td> </tr> </table> </td> <td width=74 style='width:73.5pt;padding:0in 0in 0in 0in;height:22.5pt'> <p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family: Helvetica'>&nbsp;<o:p></o:p></span></p> </td> </tr> </table> </div> <p>&nbsp;</p> </div> </body> </html>