Publications
HEtest: a homomorphic encryption testing framework
Summary
Summary
In this work, we present a generic open-source software framework that can evaluate the correctness and performance of homomorphic encryption software. Our framework, called HEtest, automates the entire process of a test: generation of data for testing (such as circuits and inputs), execution of a test, comparison of performance to...
Engineered liquid crystal anchoring energies with nanopatterned surfaces
Summary
Summary
The anchoring energy of liquid crystals was shown to be tunable by surface nanopatterning of periodic lines and spaces. Both the pitch and height were varied using hydrogen silsesquioxane negative tone electron beam resist, providing for flexibility in magnitude and spatial distribution of the anchoring energy. Using twisted nematic liquid...
Using a big data database to identify pathogens in protein data space [e-print]
Summary
Summary
Current metagenomic analysis algorithms require significant computing resources, can report excessive false positives (type I errors), may miss organisms (type II errors/false negatives), or scale poorly on large datasets. This paper explores using big data database technologies to characterize very large metagenomic DNA sequences in protein space, with the ultimate...
Automated assessment of secure search systems
Summary
Summary
This work presents the results of a three-year project that assessed nine different privacy-preserving data search systems. We detail the design of a software assessment framework that focuses on low system footprint, repeatability, and reusability. A unique achievement of this project was the automation and integration of the entire test...
Materials and fabrication sequences for water soluble silicon integrated circuits at the 90 nm node
Summary
Summary
Tungsten interconnects in silicon integrated circuits built at the 90 nm node with releasable configurations on silicon on insulator wafers serve as the basis for advanced forms of water-soluble electronics. These physically transient systems have potential uses in applications that range from temporary biomedical implants to zero-waste environmental sensors. Systemic...
NEU_MITLL @ TRECVid 2015: multimedia event detection by pre-trained CNN models
Summary
Summary
We introduce a framework for multimedia event detection (MED), which was developed for TRECVID 2015 using convolutional neural networks (CNNs) to detect complex events via deterministic models trained on video frame data. We used several well-known CNN models designed to detect objects, scenes, and a combination of both (i.e., Hybrid-CNN)...
Wind Information Requirements for NextGen Applications - Phase 3 Final Report(3.98 MB)
Summary
Summary
Many NextGen applications depend on access to high accuracy wind data due to time-based control elements, such as required time of arrival at a meter fix under 4D-Trajectory-Based Operations/Time of Arrival Control procedures or compliance to an assigned spacing goal between aircraft under Interval Management procedures. The work described in...
Trace aerosol detection and identification by dynamic photoacoustic spectroscopy
Summary
Summary
Dynamic photoacoustic spectroscopy (DPAS) is a high sensitivity technique for standoff detection of trace vapors. A field-portable DPAS system has potential as an early warning provider for gaseous-based chemical threats. For the first time, we utilize DPAS to successfully detect the presence of trace aerosols. Aerosol identification via long-wavelength infrared...
Wind information requirements for NextGen applications, phase 3 final report
Summary
Summary
Many NextGen applications depend on access to high accuracy wind data due to time-based control elements, such as required time of arrival at a meter fix under 4D-Trajectory-Based Operations/Time of Arrival Control procedures or compliance to an assigned spacing goal between aircraft under Interval Management procedures. Any errors in the...
Runtime integrity measurement and enforcement with automated whitelist generation
Summary
Summary
This poster discusses a strategy for automatic whitelist generation and enforcement using techniques from information flow control and trusted computing. During a measurement phase, a cloud provider uses dynamic taint tracking to generate a whitelist of executed code and associated file hashes generated by an integrity measurement system. Then, at...