Publications
Apprenticeship scheduling: learning to schedule from human experts
Summary
Summary
Coordinating agents to complete a set of tasks with intercoupled temporal and resource constraints is computationally challenging, yet human domain experts can solve these difficult scheduling problems using paradigms learned through years of apprenticeship. A process for manually codifying this domain knowledge within a computational framework is necessary to scale...
Charting a security landscape in the clouds: data protection and collaboration in cloud storage
Summary
Summary
This report surveys different approaches to securely storing and sharing data in the cloud based on traditional notions of security: confidentiality, integrity, and availability, with the main focus on confidentiality. An appendix discusses the related notion of how users can securely authenticate to cloud providers. We propose a metric for...
Directly-deposited blocking filters for high-performance silicon x-ray detectors
Summary
Summary
Silicon X-ray detectors often require blocking filters to mitigate noise and out-of-band signal from UV and visible backgrounds. Such filters must be thin to minimize X-ray absorption, so direct deposition of filter material on the detector entrance surface is an attractive approach to fabrication of robust filters. On the other...
Resonance fluorescence from an artificial atom in squeezed vacuum
Summary
Summary
We present an experimental realization of resonance fluorescence in squeezed vacuum. We strongly couple microwave-frequency squeezed light to a superconducting artificial atom and detect the resulting fluorescence with high resolution enabled by a broadband traveling-wave parametric amplifier. We investigate the fluorescence spectra in the weak and strong driving regimes, observing...
The threat to weather radars by wireless technology
Summary
Summary
Wireless technology, such as local area telecommunication networks and surveillance cameras, causes severe interference for weather radars, because they use the same operational radio frequencies. One or two disturbances can be removed from the radar image, but the number and power of the interfering wireless devices are growing all over...
Balancing security and performance for agility in dynamic threat environments
Summary
Summary
In cyber security, achieving the desired balance between system security and system performance in dynamic threat environments is a long-standing open challenge for cyber defenders. Typically an increase in system security comes at the price of decreased system performance, and vice versa, easily resulting in systems that are misaligned to...
Multi-channel agile comb generator for antenna radiation pattern measurements
Summary
Summary
Antenna radiation patterns are typically measured using network analyzers, which are both expensive and physically large in size. These drawbacks can limit this test equipment's usage in universities that cannot afford to make such a purchase, as well as within applications that require mobile antenna measurements. An alternative approach is...
Single antenna in-band full-duplex isolation-improvement techniques
Summary
Summary
Many in-band full-duplex wireless systems transmit and receive on a single antenna to minimize redundancy and maintain compact form factors. For effective operation, all of these systems need to maximize transmit-to-receive isolation, which is limited by non-ideal antenna matching and non-zero circulator leakage. Several isolation-improvement techniques are investigated in this...
Switched antenna array tile for real-time microwave imaging aperture
Summary
Summary
A switched array tile which is part of a large aperture for near-field microwave imaging is presented. The tile is based on the Boundary Array (BA), a sparse array topology for hardware efficient realization of imaging apertures. The larger array formed with the tile samples a scene with no redundancy...
Collaborative Data Analysis and Discovery for Cyber Security
Summary
Summary
In this paper, we present the Cyber Analyst Real-Time Integrated Notebook Application (CARINA). CARINA is a collaborative investigation system that aids in decision making by co-locating the analysis environment with centralized cyber data sources, and providing next generation analysts with increased visibility to the work of others.