Publications
Predicting and analyzing factors in patent litigation
Summary
Summary
Patent litigation is an expensive and time-consuming process. To minimize its impact on the participants in the patent lifecycle, automatic determination of litigation potential is a compelling machine learning application. In this paper, we consider preliminary methods for the prediction of a patent being involved in litigation using metadata, content...
Bootstrapping and maintaining trust in the cloud
Summary
Summary
Today's infrastructure as a service (IaaS) cloud environments rely upon full trust in the provider to secure applications and data. Cloud providers do not offer the ability to create hardware-rooted cryptographic identities for IaaS cloud resources or sufficient information to verify the integrity of systems. Trusted computing protocols and hardware...
Making #sense of #unstructured text data
Summary
Summary
Automatic extraction of intelligent and useful information from data is one of the main goals in data science. Traditional approaches have focused on learning from structured features, i.e., information in a relational database. However, most of the data encountered in practice are unstructured (i.e., social media posts, forums, emails and...
An overview of the DARPA Data Driven Discovery of Models (D3M) Program
Summary
Summary
A new DARPA program called Data Driven Discovery of Models (D3M) aims to develop automated model discovery systems that can be used by researchers with specific subject matter expertise to create empirical models of real, complex processes. Two major goals of this program are to allow experts to create empirical...
LLTools: machine learning for human language processing
Summary
Summary
Machine learning methods in Human Language Technology have reached a stage of maturity where widespread use is both possible and desirable. The MIT Lincoln Laboratory LLTools software suite provides a step towards this goal by providing a set of easily accessible frameworks for incorporating speech, text, and entity resolution components...
Biomimetic sniffing improves the detection performance of a 3D printed nose of a dog and a commercial trace vapor detector
Summary
Summary
Unlike current chemical trace detection technology, dogs actively sniff to acquire an odor sample. Flow visualization experiments with an anatomically-similar 3D printed dog's nose revealed the external aerodynamics during canine sniffing, where ventral-laterally expired air jets entrain odorant-laden air toward the nose, thereby extending the "aerodynamic reach" for inspiration of...
Terminal Flight Data Manager (TFDM) environmental benefits assessment
Summary
Summary
This work monetizes the environmental benefits of Terminal Flight Data Manager (TFDM) capabilities which reduce fuel burn and gaseous emissions, and in turn reduce climate change and air quality effects. A methodology is created which takes TFDM "engines-on" taxi time savings and converts them to fuel and carbon dioxide (CO2)...
The role of master clock stability in quantum information processing
Summary
Summary
Experimentalists seeking to improve the coherent lifetimes of quantum bits have generally focused on mitigating decoherence mechanisms through, for example, improvements to qubit designs and materials, and system isolation from environmental perturbations. In the case of the phase degree of freedom in a quantum superposition, however, the coherence that must...
Covariance estimation in terms of Stokes parameters with application to vector sensor imaging
Summary
Summary
Vector sensor imaging presents a challenging problem in covariance estimation when allowing arbitrarily polarized sources. We propose a Stokes parameter representation of the source covariance matrix which is both qualitatively and computationally convenient. Using this formulation, we adapt the proximal gradient and expectation maximization (EM) algorithms and apply them in...
Leveraging data provenance to enhance cyber resilience
Summary
Summary
Building secure systems used to mean ensuring a secure perimeter, but that is no longer the case. Today's systems are ill-equipped to deal with attackers that are able to pierce perimeter defenses. Data provenance is a critical technology in building resilient systems that will allow systems to recover from attackers...