Publications
Named entity recognition in 140 characters or less
Summary
Summary
In this paper, we explore the problem of recognizing named entities in microposts, a genre with notoriously little context surrounding each named entity and inconsistent use of grammar, punctuation, capitalization, and spelling conventions by authors. In spite of the challenges associated with information extraction from microposts, it remains an increasingly...
A reverse approach to named entity extraction and linking in microposts
Summary
Summary
In this paper, we present a pipeline for named entity extraction and linking that is designed specifically for noisy, grammatically inconsistent domains where traditional named entity techniques perform poorly. Our approach leverages a large knowledge base to improve entity recognition, while maintaining the use of traditional NER to identify mentions...
Blind signal classification via sparse coding
Summary
Summary
We propose a novel RF signal classification method based on sparse coding, an unsupervised learning method popular in computer vision. In particular, we employ a convolutional sparse coder that can extract high-level features by computing the maximal similarity between an unknown received signal against an overcomplete dictionary of matched filter...
Geiger-mode avalanche photodiode arrays integrated to all-digital CMOS circuits
Summary
Summary
This article reviews MIT Lincoln Laboratory's work over the past 20 years to develop photon-sensitive image sensors based on arrays of silicon Geiger-mode avalanche photodiodes. Integration of these detectors to all-digital CMOS readout circuits enable exquisitely sensitive solid-state imagers for lidar, wavefront sensing, and passive imaging.
Boston community energy study - zonal analysis for urban microgrids
Summary
Summary
Superstorm Sandy illustrated the economic and human impact that severe weather can have on urban areas such as New York City. While flooding and wind damaged or destroyed some of the energy infrastructure, all installed microgrids in the New York City region remained operational during Sandy, including those at Princeton...
Microhydraulic electrowetting actuators
Summary
Summary
The conversion of electrical to mechanical power on a sub-centimeter scale is a key technology in many microsystems and energy harvesting devices. In this paper, we present a type of a capacitive energy conversion device that uses capillary pressure and electrowetting to reversibly convert electrical power to hydraulic power. These...
2015 operational observation of CoSPA and traffic flow impact
Summary
Summary
This technical report summarizes the operational observations recorded by MIT Lincoln Laboratory (MIT LL) aviation subject matter experts during the period 13 April to 31 October 2015. Three separate field observations were conducted over four convective weather days across the eastern National Airspace System (NAS) with visits to five separate...
Vector antenna and maximum likelihood imaging for radio astronomy
Summary
Summary
Radio astronomy using frequencies less than ~100 MHz provides a window into non-thermal processes in objects ranging from planets to galaxies. Observations in this frequency range are also used to map the very early history of star and galaxy formation in the universe. Much effort in recent years has been...
Asteroid search operations with the Space Surveillance Telescope
Summary
Summary
Over the past two years, the Lincoln Near Earth Asteroid Research (LINEAR) program, funded by the National Aeronautics and Space Administration (NASA), has transitioned to asteroid search operations using the new 3.5-meter wide-field-of-view Space Surveillance Telescope (SST) located at the Atom Site on White Sands Missile Range, N.M. The SST...
SoK: privacy on mobile devices - it's complicated
Summary
Summary
Modern mobile devices place a wide variety of sensors and services within the personal space of their users. As a result, these devices are capable of transparently monitoring many sensitive aspects of these users' lives (e.g., location, health, or correspondences). Users typically trade access to this data for convenient applications...