Publications

Refine Results

(Filters Applied) Clear All

Apprenticeship scheduling: learning to schedule from human experts

Published in:
Proc. of the Int. Joint Conf. Artificial Intelligence (IJCAI), 9-15 July 2016.

Summary

Coordinating agents to complete a set of tasks with intercoupled temporal and resource constraints is computationally challenging, yet human domain experts can solve these difficult scheduling problems using paradigms learned through years of apprenticeship. A process for manually codifying this domain knowledge within a computational framework is necessary to scale beyond the "single expert, single-trainee" apprenticeship model. However, human domain experts often have difficulty describing their decision-making processes, causing the codification of this knowledge to become laborious. We propose a new approach for capturing domain-expert heuristics through a pairwise ranking formulation. Our approach is model-free and does not require enumerating or iterating through a large state-space. We empirically demonstrate that this approach accurately learns multifaceted heuristics on both a synthetic data set incorporating job-shop scheduling and vehicle routing problems and a real-world data set consisting of demonstrations of experts solving a weapon-to-target assignment problem.
READ LESS

Summary

Coordinating agents to complete a set of tasks with intercoupled temporal and resource constraints is computationally challenging, yet human domain experts can solve these difficult scheduling problems using paradigms learned through years of apprenticeship. A process for manually codifying this domain knowledge within a computational framework is necessary to scale...

READ MORE

Charting a security landscape in the clouds: data protection and collaboration in cloud storage

Summary

This report surveys different approaches to securely storing and sharing data in the cloud based on traditional notions of security: confidentiality, integrity, and availability, with the main focus on confidentiality. An appendix discusses the related notion of how users can securely authenticate to cloud providers. We propose a metric for comparing secure storage approaches based on their residual vulnerabilities: attack surfaces against which an approach cannot protect. Our categorization therefore ranks approaches from the weakest (the most residual vulnerabilities) to the strongest (the fewest residual vulnerabilities). In addition to the security provided by each approach, we also consider their inherent costs and limitations. This report can therefore help an organization select a cloud data protection approach that satisfies their enterprise infrastructure, security specifications, and functionality requirements.
READ LESS

Summary

This report surveys different approaches to securely storing and sharing data in the cloud based on traditional notions of security: confidentiality, integrity, and availability, with the main focus on confidentiality. An appendix discusses the related notion of how users can securely authenticate to cloud providers. We propose a metric for...

READ MORE

Directly-deposited blocking filters for high-performance silicon x-ray detectors

Published in:
SPIE, Vol. 9905, Space Telescopes and Instrumentation 2016: Ultraviolet to Gamma Ray, July 2016, 99054C.

Summary

Silicon X-ray detectors often require blocking filters to mitigate noise and out-of-band signal from UV and visible backgrounds. Such filters must be thin to minimize X-ray absorption, so direct deposition of filter material on the detector entrance surface is an attractive approach to fabrication of robust filters. On the other hand, the soft (E < 1 keV) X-ray spectral resolution of the detector is sensitive to the charge collection efficiency in the immediate vicinity of its entrance surface, so it is important that any filter layer is deposited without disturbing the electric field distribution there. We have successfully deposited aluminum blocking filters, ranging in thickness from 70 to 220nm, on back-illuminated CCD X-ray detectors passivated by means of molecular beam epitaxy. Here we report measurements showing that directly deposited filters have little or no effect on soft X-ray spectral resolution. We also find that in applications requiring very large optical density (> OD 6) care must be taken to prevent light from entering the sides and mounting surfaces of the detector. Our methods have been used to deposit filters on the detectors of the REXIS instrument scheduled to fly on OSIRIS-ReX later this year.
READ LESS

Summary

Silicon X-ray detectors often require blocking filters to mitigate noise and out-of-band signal from UV and visible backgrounds. Such filters must be thin to minimize X-ray absorption, so direct deposition of filter material on the detector entrance surface is an attractive approach to fabrication of robust filters. On the other...

READ MORE

Resonance fluorescence from an artificial atom in squeezed vacuum

Published in:
Phys. Rev. X, Vol. 6, No. 3, July-September 2016, 031004.

Summary

We present an experimental realization of resonance fluorescence in squeezed vacuum. We strongly couple microwave-frequency squeezed light to a superconducting artificial atom and detect the resulting fluorescence with high resolution enabled by a broadband traveling-wave parametric amplifier. We investigate the fluorescence spectra in the weak and strong driving regimes, observing up to 3.1 dB of reduction of the fluorescence linewidth below the ordinary vacuum level and a dramatic dependence of the Mollow triplet spectrum on the relative phase of the driving and squeezed vacuum fields. Our results are in excellent agreement with predictions for spectra produced by a two-level atom in squeezed vacuum [Phys. Rev. Lett. 58, 2539 (1987)], demonstrating that resonance fluorescence offers a resource-efficient means to characterize squeezing in cryogenic environments.
READ LESS

Summary

We present an experimental realization of resonance fluorescence in squeezed vacuum. We strongly couple microwave-frequency squeezed light to a superconducting artificial atom and detect the resulting fluorescence with high resolution enabled by a broadband traveling-wave parametric amplifier. We investigate the fluorescence spectra in the weak and strong driving regimes, observing...

READ MORE

The threat to weather radars by wireless technology

Published in:
Amer. Meteor. Soc., Vol. 97, No. 7, 1 July 2016, pp. 1159-67, doi: 10.1175/BAMS-D-15-00048.1.

Summary

Wireless technology, such as local area telecommunication networks and surveillance cameras, causes severe interference for weather radars, because they use the same operational radio frequencies. One or two disturbances can be removed from the radar image, but the number and power of the interfering wireless devices are growing all over the world, threatening that one day the radars could not be used at all. Some agencies have already changed or are considering changing frequency bands, but now even other bands are under threat. Use of equipment at radio frequencies is regulated by laws and international agreements. Technologies have been developed for peaceful co-existence. If wireless devices use these technologies to protect weather radars, their data transmission capabilities become limited, so it is tempting to violate the regulations. Hence, it is an important task for the worldwide weather community to involve themselves in the radio-frequency management process and work in close contact with their National Radio Authorities to ensure that meteorological interests be duly taken into account in any decision making process toward the future usage of wireless devices.
READ LESS

Summary

Wireless technology, such as local area telecommunication networks and surveillance cameras, causes severe interference for weather radars, because they use the same operational radio frequencies. One or two disturbances can be removed from the radar image, but the number and power of the interfering wireless devices are growing all over...

READ MORE

Balancing security and performance for agility in dynamic threat environments

Published in:
46th IEEE/IFIP Int. Conf. on Dependable Systems and Networks, DSN 2016, 28 June - 1 July 2016.

Summary

In cyber security, achieving the desired balance between system security and system performance in dynamic threat environments is a long-standing open challenge for cyber defenders. Typically an increase in system security comes at the price of decreased system performance, and vice versa, easily resulting in systems that are misaligned to operator specified requirements for system security and performance as the threat environment evolves. We develop an online, reinforcement learning based methodology to automatically discover and maintain desired operating postures in security-performance space even as the threat environment changes. We demonstrate the utility of our approach and discover parameters enabling an agile response to a dynamic adversary in a simulated security game involving prototype cyber moving target defenses.
READ LESS

Summary

In cyber security, achieving the desired balance between system security and system performance in dynamic threat environments is a long-standing open challenge for cyber defenders. Typically an increase in system security comes at the price of decreased system performance, and vice versa, easily resulting in systems that are misaligned to...

READ MORE

Multi-channel agile comb generator for antenna radiation pattern measurements

Published in:
IEEE Int. Symp. Antennas and Propagation (APSURSI), 26 June - 1 July 2016.

Summary

Antenna radiation patterns are typically measured using network analyzers, which are both expensive and physically large in size. These drawbacks can limit this test equipment's usage in universities that cannot afford to make such a purchase, as well as within applications that require mobile antenna measurements. An alternative approach is to combine a low-cost receiver with a flexible signal source. This paper presents the design of a tunable comb generator prototype that is capable of outputting frequencies up to 4 GHz. The compact nature of this source along with its potential to be dynamically reconfigured yields a device that can be used to measure antenna patterns for many different applications.
READ LESS

Summary

Antenna radiation patterns are typically measured using network analyzers, which are both expensive and physically large in size. These drawbacks can limit this test equipment's usage in universities that cannot afford to make such a purchase, as well as within applications that require mobile antenna measurements. An alternative approach is...

READ MORE

Single antenna in-band full-duplex isolation-improvement techniques

Published in:
IEEE Int. Symp. Antennas and Propagation (APSURSI), 26 June - 1 July 2016.

Summary

Many in-band full-duplex wireless systems transmit and receive on a single antenna to minimize redundancy and maintain compact form factors. For effective operation, all of these systems need to maximize transmit-to-receive isolation, which is limited by non-ideal antenna matching and non-zero circulator leakage. Several isolation-improvement techniques are investigated in this paper, and illustrate how RF components can be used to minimize the consequential self-interference of these systems. Two unique cancellation schemes were validated, and the isolation of a single-antenna transceiver was measured to improve by 15 and 33 dB over the 100 MHz bandwidth centered at 2.45 GHz.
READ LESS

Summary

Many in-band full-duplex wireless systems transmit and receive on a single antenna to minimize redundancy and maintain compact form factors. For effective operation, all of these systems need to maximize transmit-to-receive isolation, which is limited by non-ideal antenna matching and non-zero circulator leakage. Several isolation-improvement techniques are investigated in this...

READ MORE

Switched antenna array tile for real-time microwave imaging aperture

Published in:
IEEE Int. Symp. Antennas and Propagation (APSURSI), 26 June - 1 July 2016.

Summary

A switched array tile which is part of a large aperture for near-field microwave imaging is presented. The tile is based on the Boundary Array (BA), a sparse array topology for hardware efficient realization of imaging apertures. The larger array formed with the tile samples a scene with no redundancy, and is compatible with fast imaging techniques. Details on the design and realization of the tile are presented, as well as experimental images formed with a tile prototype.
READ LESS

Summary

A switched array tile which is part of a large aperture for near-field microwave imaging is presented. The tile is based on the Boundary Array (BA), a sparse array topology for hardware efficient realization of imaging apertures. The larger array formed with the tile samples a scene with no redundancy...

READ MORE

Collaborative Data Analysis and Discovery for Cyber Security

Published in:
Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS 2016)

Summary

In this paper, we present the Cyber Analyst Real-Time Integrated Notebook Application (CARINA). CARINA is a collaborative investigation system that aids in decision making by co-locating the analysis environment with centralized cyber data sources, and providing next generation analysts with increased visibility to the work of others.
READ LESS

Summary

In this paper, we present the Cyber Analyst Real-Time Integrated Notebook Application (CARINA). CARINA is a collaborative investigation system that aids in decision making by co-locating the analysis environment with centralized cyber data sources, and providing next generation analysts with increased visibility to the work of others.

READ MORE