Acknowledgments:
================

This software results from a research program in the Institute for Security
Technology Studies at Dartmouth College, supported by the U.S. Department of
Homeland Security under Grant Award Number 2006-CS-001-000001. The views and
conclusions contained in this document are those of the authors and should
not be interpreted as necessarily representing the official policies, either
expressed or implied, of the U.S. Department of Homeland Security.

