Publications
Interactive synthesis of code-level security rules
Summary
Summary
Software engineers inadvertently introduce bugs into software during the development process and these bugs can potentially be exploited once the software is deployed. As the size and complexity of software systems increase, it is important that we are able to verify and validate not only that the software behaves as...
Suppressing relaxation in superconducting qubits by quasiparticle pumping
Summary
Summary
Dynamical error suppression techniques are commonly used to improve coherence in quantum systems. They reduce dephasing errors by applying control pulses designed to reverse erroneous coherent evolution driven by environmental noise. However, such methods cannot correct for irreversible processes such as energy relaxation. We investigate a complementary, stochastic approach to...
Multi-lingual deep neural networks for language recognition
Summary
Summary
Multi-lingual feature extraction using bottleneck layers in deep neural networks (BN-DNNs) has been proven to be an effective technique for low resource speech recognition and more recently for language recognition. In this work we investigate the impact on language recognition performance of the multi-lingual BN-DNN architecture and training configurations for...
Approaches for language identification in mismatched environments
Summary
Summary
In this paper, we consider the task of language identification in the context of mismatch conditions. Specifically, we address the issue of using unlabeled data in the domain of interest to improve the performance of a state-of-the-art system. The evaluation is performed on a 9-language set that includes data in...
Resilience of cyber systems with over- and underregulation
Summary
Summary
Recent cyber attacks provide evidence of increased threats to our critical systems and infrastructure. A common reaction to a new threat is to harden the system by adding new rules and regulations. As federal and state governments request new procedures to follow, each of their organizations implements their own cyber...
Intersection and convex combination in multi-source spectral planted cluster detection
Summary
Summary
Planted cluster detection is an important form of signal detection when the data are in the form of a graph. When there are multiple graphs representing multiple connection types, the method of aggregation can have significant impact on the results of a detection algorithm. This paper addresses the tradeoff between...
Bootstrapping and maintaining trust in the cloud
Summary
Summary
Today's infrastructure as a service (IaaS) cloud environments rely upon full trust in the provider to secure applications and data. Cloud providers do not offer the ability to create hardware-rooted cryptographic identities for IaaS cloud resources or sufficient information to verify the integrity of systems. Trusted computing protocols and hardware...
Predicting and analyzing factors in patent litigation
Summary
Summary
Patent litigation is an expensive and time-consuming process. To minimize its impact on the participants in the patent lifecycle, automatic determination of litigation potential is a compelling machine learning application. In this paper, we consider preliminary methods for the prediction of a patent being involved in litigation using metadata, content...
An overview of the DARPA Data Driven Discovery of Models (D3M) Program
Summary
Summary
A new DARPA program called Data Driven Discovery of Models (D3M) aims to develop automated model discovery systems that can be used by researchers with specific subject matter expertise to create empirical models of real, complex processes. Two major goals of this program are to allow experts to create empirical...
High performance, 3D-printable dielectric nanocomposites for millimeter wave devices
Summary
Summary
The creation of millimeter wave, 3D-printable dielectric nanocomposite is demonstrated. Alumina nanoparticles were combined with styrenic block copolymers and solvent to create shear thinning, viscoelastic inks that are printable at room temperature. Particle loadings of up to 41 vol % were achieved. Upon being dried, the highest-performing of these materials...