Publications
Analytical models and methods for anomaly detection in dynamic, attributed graphs
Summary
Summary
This chapter is devoted to anomaly detection in dynamic, attributed graphs. There has been a great deal of research on anomaly detection in graphs over the last decade, with a variety of methods proposed. This chapter discusses recent methods for anomaly detection in graphs,with a specific focus on detection within...
The TESS camera: modeling and measurements with deep depletion devices
Summary
Summary
The Transiting Exoplanet Survey Satellite, a NASA Explorer-class mission in development, will discover planets around nearby stars, most notably Earth-like planets with potential for follow up characterization. The all-sky survey requires a suite of four wide field-of-view cameras with sensitivity across a broad spectrum. Deep depletion CCDs with a silicon...
Cross-domain entity resolution in social media
Summary
Summary
The challenge of associating entities across multiple domains is a key problem in social media understanding. Successful cross-domain entity resolution provides integration of information from multiple sites to create a complete picture of user and community activities, characteristics, and trends. In this work, we examine the problem of entity resolution...
Apprenticeship scheduling: learning to schedule from human experts
Summary
Summary
Coordinating agents to complete a set of tasks with intercoupled temporal and resource constraints is computationally challenging, yet human domain experts can solve these difficult scheduling problems using paradigms learned through years of apprenticeship. A process for manually codifying this domain knowledge within a computational framework is necessary to scale...
Charting a security landscape in the clouds: data protection and collaboration in cloud storage
Summary
Summary
This report surveys different approaches to securely storing and sharing data in the cloud based on traditional notions of security: confidentiality, integrity, and availability, with the main focus on confidentiality. An appendix discusses the related notion of how users can securely authenticate to cloud providers. We propose a metric for...
Directly-deposited blocking filters for high-performance silicon x-ray detectors
Summary
Summary
Silicon X-ray detectors often require blocking filters to mitigate noise and out-of-band signal from UV and visible backgrounds. Such filters must be thin to minimize X-ray absorption, so direct deposition of filter material on the detector entrance surface is an attractive approach to fabrication of robust filters. On the other...
Resonance fluorescence from an artificial atom in squeezed vacuum
Summary
Summary
We present an experimental realization of resonance fluorescence in squeezed vacuum. We strongly couple microwave-frequency squeezed light to a superconducting artificial atom and detect the resulting fluorescence with high resolution enabled by a broadband traveling-wave parametric amplifier. We investigate the fluorescence spectra in the weak and strong driving regimes, observing...
The threat to weather radars by wireless technology
Summary
Summary
Wireless technology, such as local area telecommunication networks and surveillance cameras, causes severe interference for weather radars, because they use the same operational radio frequencies. One or two disturbances can be removed from the radar image, but the number and power of the interfering wireless devices are growing all over...
Balancing security and performance for agility in dynamic threat environments
Summary
Summary
In cyber security, achieving the desired balance between system security and system performance in dynamic threat environments is a long-standing open challenge for cyber defenders. Typically an increase in system security comes at the price of decreased system performance, and vice versa, easily resulting in systems that are misaligned to...
Multi-channel agile comb generator for antenna radiation pattern measurements
Summary
Summary
Antenna radiation patterns are typically measured using network analyzers, which are both expensive and physically large in size. These drawbacks can limit this test equipment's usage in universities that cannot afford to make such a purchase, as well as within applications that require mobile antenna measurements. An alternative approach is...