Publications
Efficient anomaly detection in dynamic, attributed graphs: emerging phenomena and big data
Summary
Summary
When working with large-scale network data, the interconnected entities often have additional descriptive information. This additional metadata may provide insight that can be exploited for detection of anomalous events. In this paper, we use a generalized linear model for random attributed graphs to model connection probabilities using vertex metadata. For...
Single event transients in digital CMOS - a review
Summary
Summary
The creation of soft errors due to the propagation of single event transients (SETs) is a significant reliability challenge in modern CMOS logic. SET concerns continue to be exacerbated by Moore's Law technology scaling. This paper presents a review of digital single event transient research, including: a brief historical overview...
An assessment of the operational utility of a GOES lightning mapping sensor
Summary
Summary
This report evaluates the incremental operational benefits of a proposed Lightning Mapping Sensor (LMS) for NOAA's Geostationary Operational Environmental Satellites (GOES). If deployed, LMS would provide continuous, real-time surveillance of total lightning activity over large portions of the North and South American continents and surrounding oceans. In contrast to the...
Link prediction methods for generating speaker content graphs
Summary
Summary
In a speaker content graph, vertices represent speech signals and edges represent speaker similarity. Link prediction methods calculate which potential edges are most likely to connect vertices from the same speaker; those edges are included in the generated speaker content graph. Since a variety of speaker recognition tasks can be...
Sparse volterra systems: theory and practice
Summary
Summary
Nonlinear effects limit analog circuit performance, causing both in-band and out-of-band distortion. The classical Volterra series provides an accurate model of many nonlinear systems, but the number of parameters grows extremely quickly as the memory depth and polynomial order are increased. Recently, concepts from compressed sensing have been applied to...
Probabilistic threat propagation for malicious activity detection
Summary
Summary
In this paper, we present a method for detecting malicious activity within networks of interest. We leverage prior community detection work by propagating threat probabilities across graph nodes, given an initial set of known malicious nodes. We enhance prior work by employing constraints which remove the adverse effect of cyclic...
Large-scale community detection on speaker content graphs
Summary
Summary
We consider the use of community detection algorithms to perform speaker clustering on content graphs built from large audio corpora. We survey the application of agglomerative hierarchical clustering, modularity optimization methods, and spectral clustering as well as two random walk algorithms: Markov clustering and Infomap. Our results on graphs built...
An Expectation Maximization Approach to Detecting Compromised Remote Access Accounts(267.16 KB)
Summary
Summary
Just as credit-card companies are able to detect aberrant transactions on a customer’s credit card, it would be useful to have methods that could automatically detect when a user’s login credentials for Virtual Private Network (VPN) access have been compromised. We present here a novel method for detecting that a...
Optimized airborne collision avoidance in mixed equipage environments
Summary
Summary
Developing robust collision avoidance logic that reliably prevents collision without excessive alerting is challenging due to sensor error and uncertainty in the future paths of the aircraft. Over the past few years, research has focused on the use of a computational method known as dynamic programming for producing an optimized...
P-sync: a photonically enabled architecture for efficient non-local data access
Summary
Summary
Communication in multi- and many-core processors has long been a bottleneck to performance due to the high cost of long-distance electrical transmission. This difficulty has been partially remedied by architectural constructs such as caches and novel interconnect topologies, albeit at a steep cost in terms of complexity. Unfortunately, even these...