Publications
Four-tap RF canceller evaluation for indoor in-band full-duplex wireless operation
Summary
Summary
Analog self-interference mitigation techniques are currently being investigated in a variety of operational settings for In-Band Full-Duplex (IBFD) systems. The significant multipath effects of realistic environments, such as inside buildings, can severely limit performance. The influence of different transceiver parameters on the effectiveness of a four-tap RF canceller using a...
Spatially-resolved individual particle spectroscopy using photothermal modulation of Mie scattering
Summary
Summary
We report a photothermal modulation of Mie scattering (PMMS) method that enables concurrent spatial and spectral discrimination of individual micron-sized particles. This approach provides a direct measurement of the "fingerprint" infrared absorption spectrum with the spatial resolution of visible light. Trace quantities (tens of picograms) of material were deposited onto...
Interactive synthesis of code-level security rules
Summary
Summary
Software engineers inadvertently introduce bugs into software during the development process and these bugs can potentially be exploited once the software is deployed. As the size and complexity of software systems increase, it is important that we are able to verify and validate not only that the software behaves as...
Causal inference under network interference: a framework for experiments on social networks
Summary
Summary
No man is an island, as individuals interact and influence one another daily in our society. When social influence takes place in experiments on a population of interconnected individuals, the treatment on a unit may affect the outcomes of other units, a phenomenon known as interference. This thesis develops a...
Suppressing relaxation in superconducting qubits by quasiparticle pumping
Summary
Summary
Dynamical error suppression techniques are commonly used to improve coherence in quantum systems. They reduce dephasing errors by applying control pulses designed to reverse erroneous coherent evolution driven by environmental noise. However, such methods cannot correct for irreversible processes such as energy relaxation. We investigate a complementary, stochastic approach to...
Multi-lingual deep neural networks for language recognition
Summary
Summary
Multi-lingual feature extraction using bottleneck layers in deep neural networks (BN-DNNs) has been proven to be an effective technique for low resource speech recognition and more recently for language recognition. In this work we investigate the impact on language recognition performance of the multi-lingual BN-DNN architecture and training configurations for...
Approaches for language identification in mismatched environments
Summary
Summary
In this paper, we consider the task of language identification in the context of mismatch conditions. Specifically, we address the issue of using unlabeled data in the domain of interest to improve the performance of a state-of-the-art system. The evaluation is performed on a 9-language set that includes data in...
Resilience of cyber systems with over- and underregulation
Summary
Summary
Recent cyber attacks provide evidence of increased threats to our critical systems and infrastructure. A common reaction to a new threat is to harden the system by adding new rules and regulations. As federal and state governments request new procedures to follow, each of their organizations implements their own cyber...
Intersection and convex combination in multi-source spectral planted cluster detection
Summary
Summary
Planted cluster detection is an important form of signal detection when the data are in the form of a graph. When there are multiple graphs representing multiple connection types, the method of aggregation can have significant impact on the results of a detection algorithm. This paper addresses the tradeoff between...
Bootstrapping and maintaining trust in the cloud
Summary
Summary
Today's infrastructure as a service (IaaS) cloud environments rely upon full trust in the provider to secure applications and data. Cloud providers do not offer the ability to create hardware-rooted cryptographic identities for IaaS cloud resources or sufficient information to verify the integrity of systems. Trusted computing protocols and hardware...