Publications
Measuring translation quality by testing English speakers with a new Defense Language Proficiency Test for Arabic
Summary
Summary
We present results from an experiment in which educated English-native speakers answered questions from a machine translated version of a standardized Arabic language test. We compare the machine translation (MT) results with professional reference translations as a baseline for the purpose of determining the level of Arabic reading comprehension that...
Laser beam combining for high-power, high-radiance sources
Summary
Summary
Beam combining of laser arrays with high efficiency and good beam quality for power and radiance (brightness) scaling is a long-standing problem in laser technology. Recently, significant progress has been made usingwavelength (spectral) techniques and coherent (phased array) techniques, which has led to the demonstration of beam combining of a...
Multi-PRI signal processing for the terminal Doppler weather radar, part I: clutter filtering
Summary
Summary
Multiple pulse repetition interval (multi-PRI) transmission is part of an adaptive signal transmission and processing algorithm being developed to aggressively combat range-velocity ambiguity in weather radars. In the past, operational use of multi-PRI pulse trains has been hampered due to the difficulty in clutter filtering. This paper presents finite impulse...
Using leader-based communication to improve the scalability of single-round group membership algorithms
Summary
Summary
Sigma, the first single-round group membership (GM) algorithm, was recently introduced and demonstrated to operate consistently with theoretical expectations in a simulated WAN environment. Sigma achieved similar quality of membership configurations as existing algorithms but required fewer message exchange rounds. We now consider Sigma in terms of scalability. Sigma involves...
An annotated review of past papers on attack graphs
Summary
Summary
This report reviews past research papers that describe how to construct attack graphs, how to use them to improve security of computer networks, and how to use them to analyze alerts from intrusion detection systems. Two commercial systems are described [I, 2], and a summary table compares important characteristics of...
Speaker adaptive cohort selection for Tnorm in text-independent speaker verification
Summary
Summary
In this paper we discuss an extension to the widely used score normalization technique of test normalization (Tnorm) for text-independent speaker verification. A new method of speaker Adaptive-Tnorm that offers advantages over the standard Tnorm by adjusting the speaker set to the target model is presented. Examples of this improvement...
Measuring human readability of machine generated text: three case studies in speech recognition and machine translation
Summary
Summary
We present highlights from three experiments that test the readability of current state-of-the art system output from (1) an automated English speech-to-text system (2) a text-based Arabic-to-English machine translation system and (3) an audio-based Arabic-to-English MT process. We measure readability in terms of reaction time and passage comprehension in each...
The 2004 MIT Lincoln Laboratory speaker recognition system
Summary
Summary
The MIT Lincoln Laboratory submission for the 2004 NIST Speaker Recognition Evaluation (SRE) was built upon seven core systems using speaker information from short-term acoustics, pitch and duration prosodic behavior, and phoneme and word usage. These different levels of information were modeled and classified using Gaussian Mixture Models, Support Vector...
Design considerations and results for an overlapped subarray radar antenna
Summary
Summary
Overlapped subarray networks produce flattopped sector patterns with low sidelobes that suppress grating lobes outside of the main beam of the subarray pattern. They are typically used in limited scan applications, where it is desired to minimize the number of controls required to steer the beam. However, the architecture of...
Evaluating static analysis tools for detecting buffer overflows in C code
Summary
Summary
This project evaluated five static analysis tools using a diagnostic test suite to determine their strengths and weaknesses in detecting a variety of buffer overflow flaws in C code. Detection, false alarm, and confusion rates were measured, along with execution time. PolySpace demonstrated a superior detection rate on the basic...