Publications
Virtuoso: narrowing the semantic gap in virtual machine introspection
Summary
Summary
Introspection has featured prominently in many recent security solutions, such as virtual machine-based intrusion detection, forensic memory analysis, and low-artifact malware analysis. Widespread adoption of these approaches, however, has been hampered by the semantic gap: in order to extract meaningful information about the current state of a virtual machine, detailed...
Towards reduced false-alarms using cohorts
Summary
Summary
The focus of the 2010 NIST Speaker Recognition Evaluation (SRE) was the low false alarm regime of the detection error trade-off (DET) curve. This paper presents several approaches that specifically target this issue. It begins by highlighting the main problem with operating in the low-false alarm regime. Two sets of...
The MIT LL 2010 speaker recognition evaluation system: scalable language-independent speaker recognition
Summary
Summary
Research in the speaker recognition community has continued to address methods of mitigating variational nuisances. Telephone and auxiliary-microphone recorded speech emphasize the need for a robust way of dealing with unwanted variation. The design of recent 2010 NIST-SRE Speaker Recognition Evaluation (SRE) reflects this research emphasis. In this paper, we...
Informative dialect recognition using context-dependent pronunciation modeling
Summary
Summary
We propose an informative dialect recognition system that learns phonetic transformation rules, and uses them to identify dialects. A hidden Markov model is used to align reference phones with dialect specific pronunciations to characterize when and how often substitutions, insertions, and deletions occur. Decision tree clustering is used to find...
A time-warping framework for speech turbulence-noise component estimation during aperiodic phonation
Summary
Summary
The accurate estimation of turbulence noise affects many areas of speech processing including separate modification of the noise component, analysis of degree of speech aspiration for treating pathological voice, the automatic labeling of speech voicing, as well as speaker characterization and recognition. Previous work in the literature has provided methods...
Identification and compensation of Wiener-Hammerstein systems with feedback
Summary
Summary
Efficient operation of RF power amplifiers requires compensation strategies to mitigate nonlinear behavior. As bandwidth increases, memory effects become more pronounced, and Volterra series based compensation becomes onerous due to the exponential growth in the number of necessary coefficients. Behavioral models such as Wiener-Hammerstein systems with a parallel feedforward or...
Thermally tuned dual 20-channel ring resonator filter bank in SOI (silicon-on-insulator)
Summary
Summary
Two 20-channel second-order optical filter banks have been fabricated. With tuning, the requirements for a wavelength multiplexed photonic AD-converter (insertion loss 1-3 dB, extinction >30 dB and optical bandwidth 22-27 GHz) are met.
Achieving cyber survivability in a contested environment using a cyber moving target
Summary
Summary
We describe two components for achieving cyber survivability in a contested environment: an architectural component that provides heterogeneous computing platforms and an assessment technology that complements the architectural component by analyzing the threat space and triggering reorientation based on the evolving threat level. Together, these technologies provide a cyber moving...
FDSOI process technology for subthreshold-operation ultra-low power electronics
Summary
Summary
Ultralow-power electronics will expand the technological capability of handheld and wireless devices by dramatically improving battery life and portability. In addition to innovative low-power design techniques, a complementary process technology is required to enable the highest performance devices possible while maintaining extremely low power consumption. Transistors optimized for subthreshold operation...
Distributed multi-modal sensor system for searching a foliage-covered region
Summary
Summary
We designed and constructed a system that includes aircraft, ground vehicles, and throwable sensors to search a semiforested region that was partially covered by foliage. The system contained 4 radio-controlled (RC) trucks, 2 aircraft, and 30 SensorMotes (throwable sensors). We also investigated communications links, search strategies, and system architecture. Our...