Publications
Multitap RF canceller for in-band full-duplex wireless communications
Summary
Summary
In-band full-duplex wireless communications are challenging because they require the mitigation of self-interference caused by the co-located transmitter to operate effectively. This paper presents a novel tapped delay line RF canceller architecture with multiple non-uniform pre-weighted taps to improve system isolation by cancelling both the direct antenna coupling as well...
Operational assessment of keyword search on oral history
Summary
Summary
This project assesses the resources necessary to make oral history searchable by means of automatic speech recognition (ASR). There are many inherent challenges in applying ASR to conversational speech: smaller training set sizes and varying demographics, among others. We assess the impact of dataset size, word error rate and term-weighted...
A fun and engaging interface for crowdsourcing named entities
Summary
Summary
There are many current problems in natural language processing that are best solved by training algorithms on an annotated in-language, in-domain corpus. The more representative the training corpus is of the test data, the better the algorithm will perform, but also the less likely it is that such a corpus...
Enforced sparse non-negative matrix factorization
Summary
Summary
Non-negative matrix factorization (NMF) is a dimensionality reduction algorithm for data that can be represented as an undirected bipartite graph. It has become a common method for generating topic models of text data because it is known to produce good results, despite its relative simplicity of implementation and ease of...
LLMapReduce: multi-level map-reduce for high performance data analysis
Summary
Summary
The map-reduce parallel programming model has become extremely popular in the big data community. Many big data workloads can benefit from the enhanced performance offered by supercomputers. LLMapReduce provides the familiar map-reduce parallel programming model to big data users running on a supercomputer. LLMapReduce dramatically simplifies map-reduce programming by providing...
Generating a multiple-prerequisite attack graph
Summary
Summary
In one aspect, a method to generate an attack graph includes determining if a potential node provides a first precondition equivalent to one of preconditions provided by a group of preexisting nodes on the attack graph. The group of preexisting nodes includes a first state node, a first vulnerability instance...
A data-stream classification system for investigating terrorist threats
Summary
Summary
The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key...
Feedback-based social media filtering tool for improved situational awareness
Summary
Summary
This paper describes a feature-rich model of data relevance, designed to aid first responder retrieval of useful information from social media sources during disasters or emergencies. The approach is meant to address the failure of traditional keyword-based methods to sufficiently suppress clutter during retrieval. The model iteratively incorporates relevance feedback...
Polymer dielectrics for 3D-printed RF devices in the Ka band
Summary
Summary
Direct-write printing allows the fabrication of centimeter-wave radio devices. Most polymer dielectric polymer materials become lossy at frequencies above 10 GHz. Presented here is a printable dielectric material with low loss in the K a band (26.5–40 GHz). This process allows the fabrication of resonator filter devices and a radio...
A key-centric processor architecture for secure computing
Summary
Summary
We describe a novel key-centric processor architecture in which each piece of data or code can be protected by encryption while at rest, in transit, and in use. Using embedded key management for cryptographic key handling, our processor permits mutually distrusting software written by different entities to work closely together...