Publications
Modeling and validation of a mm-wave shaped dielectric lens antenna
Summary
Summary
The modeling and validation of a 33 GHz shaped dielectric antenna design is investigated. The electromagnetic modeling was performed in both WIPL-D and FEKO, and was used to validate the antenna design prior to fabrication of the lens. It is shown that both WIPL-D and FEKO yield similarly accurate results...
Colorization of H&E stained tissue using deep learning
Summary
Summary
Histopathology is a critical tool in the diagnosis and stratification of cancer. Digital Pathology involves the scanning of stained and fixed tissue samples to produce high-resolution images that can be used for computer-aided diagnosis and research. A common challenge in digital pathology related to the quality and characteristics of staining...
Detecting intracranial hemorrhage with deep learning
Summary
Summary
Initial results are reported on automated detection of intracranial hemorrhage from CT, which would be valuable in a computer-aided diagnosis system to help the radiologist detect subtle hemorrhages. Previous work has taken a classic approach involving multiple steps of alignment, image processing, image corrections, handcrafted feature extraction, and classification. Our...
Mission assurance: beyond secure processing
Summary
Summary
The processor of a drone runs essential functions of sensing, communications, coordination, and control. This is the conventional view. But in today's cyber environment, the processor must also provide security to assure mission completion. We have been developing a secure processing architecture for mission assurance. A study on state-of-the-art secure...
Adversarial co-evolution of attack and defense in a segmented computer network environment
Summary
Summary
In computer security, guidance is slim on how to prioritize or configure the many available defensive measures, when guidance is available at all. We show how a competitive co-evolutionary algorithm framework can identify defensive configurations that are effective against a range of attackers. We consider network segmentation, a widely recommended...
Curator: provenance management for modern distributed systems
Summary
Summary
Data provenance is a valuable tool for protecting and troubleshooting distributed systems. Careful design of the provenance components reduces the impact on the design, implementation, and operation of the distributed system. In this paper, we present Curator, a provenance management toolkit that can be easily integrated with microservice-based systems and...
Airport Wind Observations Architectural Analysis(2.4 MB)
Summary
Summary
Airport wind information is critical for ensuring safe aircraft operations and for managing runway configurations. Airports across the National Airspace System (NAS) are served by a wide variety of wind sensing systems that have been deployed over many decades. This analysis presents a survey of existing systems and user requirements...
A secure cloud with minimal provider trust
Summary
Summary
Bolted is a new architecture for a bare metal cloud with the goal of providing security-sensitive customers of a cloud the same level of security and control that they can obtain in their own private data centers. It allows tenants to elastically allocate secure resources within a cloud while being...
Lessons learned from a decade of providing interactive, on-demand high performance computing to scientists and engineers
Summary
Summary
For decades, the use of HPC systems was limited to those in the physical sciences who had mastered their domain in conjunction with a deep understanding of HPC architectures and algorithms. During these same decades, consumer computing device advances produced tablets and smartphones that allow millions of children to interactively...
Learning network architectures of deep CNNs under resource constraints
Summary
Summary
Recent works in deep learning have been driven broadly by the desire to attain high accuracy on certain challenge problems. The network architecture and other hyperparameters of many published models are typically chosen by trial-and-error experiments with little considerations paid to resource constraints at deployment time. We propose a fully...