Publications
BubbleNet: A Cyber Security Dashboard for Visualizing Patterns
Summary
Summary
The field of cyber security is faced with ever-expanding amounts of data and a constant barrage of cyber attacks. Within this space, we have designed BubbleNet as a cyber security dashboard to help network analysts identify and summarize patterns within the data.
Single-photon-sensitive solid-state image sensors for flash lidar
Summary
Summary
MIT Lincoln Laboratory has developed lidar systems based on Geiger-mode avalanche photodiodes using both silicon and InGaAs. This technology has enabled terrain mapping and foliage penetration systems with exquisite sensitivity and high area coverage rate.
A scalable fabrication process for liquid crystal-based uncooled thermal imagers
Summary
Summary
A novel sensor is being developed for a new uncooled imager technology that is scalable to large formats (tens of megapixels), which is greater than what is achieved by commercial microbolometer arrays. In this novel sensor, a liquid-crystal transducer is used to change a long-wavelength infrared scene into a visible...
Multitap RF canceller for in-band full-duplex wireless communications
Summary
Summary
In-band full-duplex wireless communications are challenging because they require the mitigation of self-interference caused by the co-located transmitter to operate effectively. This paper presents a novel tapped delay line RF canceller architecture with multiple non-uniform pre-weighted taps to improve system isolation by cancelling both the direct antenna coupling as well...
Operational assessment of keyword search on oral history
Summary
Summary
This project assesses the resources necessary to make oral history searchable by means of automatic speech recognition (ASR). There are many inherent challenges in applying ASR to conversational speech: smaller training set sizes and varying demographics, among others. We assess the impact of dataset size, word error rate and term-weighted...
A fun and engaging interface for crowdsourcing named entities
Summary
Summary
There are many current problems in natural language processing that are best solved by training algorithms on an annotated in-language, in-domain corpus. The more representative the training corpus is of the test data, the better the algorithm will perform, but also the less likely it is that such a corpus...
Enforced sparse non-negative matrix factorization
Summary
Summary
Non-negative matrix factorization (NMF) is a dimensionality reduction algorithm for data that can be represented as an undirected bipartite graph. It has become a common method for generating topic models of text data because it is known to produce good results, despite its relative simplicity of implementation and ease of...
LLMapReduce: multi-level map-reduce for high performance data analysis
Summary
Summary
The map-reduce parallel programming model has become extremely popular in the big data community. Many big data workloads can benefit from the enhanced performance offered by supercomputers. LLMapReduce provides the familiar map-reduce parallel programming model to big data users running on a supercomputer. LLMapReduce dramatically simplifies map-reduce programming by providing...
Generating a multiple-prerequisite attack graph
Summary
Summary
In one aspect, a method to generate an attack graph includes determining if a potential node provides a first precondition equivalent to one of preconditions provided by a group of preexisting nodes on the attack graph. The group of preexisting nodes includes a first state node, a first vulnerability instance...
A data-stream classification system for investigating terrorist threats
Summary
Summary
The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key...