Publications
Computing on Masked Data to improve the security of big data
Summary
Summary
Organizations that make use of large quantities of information require the ability to store and process data from central locations so that the product can be shared or distributed across a heterogeneous group of users. However, recent events underscore the need for improving the security of data stored in such...
Global pattern search at scale
Summary
Summary
In recent years, data collection has far outpaced the tools for data analysis in the area of non-traditional GEOINT analysis. Traditional tools are designed to analyze small-scale numerical data, but there are few good interactive tools for processing large amounts of unstructured data such as raw text. In addition to...
Robust face recognition-based search and retrieval across image stills and video
Summary
Summary
Significant progress has been made in addressing face recognition channel, sensor, and session effects in both still images and video. These effects include the classic PIE (pose, illumination, expression) variation, as well as variations in other characteristics such as age and facial hair. While much progress has been made, there...
Quantitative evaluation of moving target technology
Summary
Summary
Robust, quantitative measurement of cyber technology is critically needed to measure the utility, impact and cost of cyber technologies. Our work addresses this need by developing metrics and experimental methodology for a particular type of technology, moving target technology. In this paper, we present an approach to quantitative evaluation, including...
Rapid sequence identification of potential pathogens using techniques from sparse linear algebra
Summary
Summary
The decreasing costs and increasing speed and accuracy of DNA sample collection, preparation, and sequencing has rapidly produced an enormous volume of genetic data. However, fast and accurate analysis of the samples remains a bottleneck. Here we present D4RAGenS, a genetic sequence identification algorithm that exhibits the Big Data handling...
Agent-based simulation for assessing network security risk due to unauthorized hardware
Summary
Summary
Computer networks are present throughout all sectors of our critical infrastructure and these networks are under a constant threat of cyber attack. One prevalent computer network threat takes advantage of unauthorized, and thus insecure, hardware on a network. This paper presents a prototype simulation system for network risk assessment that...
Broadband magnetometry and temperature sensing with a light-trapping diamond waveguide
Summary
Summary
Solid-state quantum sensors are attracting wide interest because of their sensitivity at room temperature. In particular, the spin properties of individual nitrogen-vacancy (NV) colour centres in diamond make them outstanding nanoscale sensors of magnetic fields, electric fields and temperature under ambient conditions. Recent work on NV ensemble-based magnetometers, inertial sensors...
Cryptographically secure computation
Summary
Summary
Researchers are making secure multiparty computation--a cryptographic technique that enables information sharing and analysis while keeping sensitive inputs secret--faster and easier to use for application software developers.
Measurement of ion motional heating rates over a range of trap frequencies and temperatures
Summary
Summary
We present measurements of the motional heating rate of a trapped ion at different trap frequencies and temperatures between ~0.6 and 1.5 MHz and ~4 and 295 K. Additionally, we examine the possible effect of adsorbed surface contaminants with boiling points below ~105 degrees C by measuring the ion heating...
Development and application of spherically curved charge-coupled device imagers
Summary
Summary
Operation of a CCD imager on a curved focal surface offers advantages to flat focal planes, especially for lightweight, relatively simple optical systems. The first advantage is that the modulation transfer function can approach diffraction-limited performance for a spherical focal surface employed in large field-of-view or large-format imagers. The second...