Publications

Refine Results

(Filters Applied) Clear All

A Fun and Engaging Interface for Crowdsourcing Named Entities(275.07 KB)

Date:
May 23, 2016
Published in:
Proceedings of Tenth International Conference on Language Resources and Evaluation (LREC 2016)
Type:
Conference Paper

Summary

In this paper, we provide a case study in using crowd sourcing to curate an in-domain corpus for named entity recognition, a common problem in natural language processing. In particular, we present our use of fun, engaging user interfaces as a way to entice workers to partake in our crowd sourcing task while avoiding inflating our payments in a way that would attract more mercenary workers than conscientious ones.
READ LESS

Summary

In this paper, we provide a case study in using crowd sourcing to curate an in-domain corpus for named entity recognition, a common problem in natural language processing. In particular, we present our use of fun, engaging user interfaces as a way to entice workers to partake in our crowd...
READ MORE

Operational Assessment of Keyword Search on Oral History(313.43 KB)

Date:
May 23, 2016
Published in:
Proceedings of Tenth International Conference on Language Resources and Evaluation (LREC 2016)
Type:
Conference Paper

Summary

This project assesses the resources necessary to make oral history searchable by means of automatic speech recognition (ASR). We assess the impact of dataset size, word error rate and term-weighted value on human search capability through an information retrieval task on Mechanical Turk, we use English oral history data collected by Story Corps, and we show comparable search performance using a standard speech recognition system.
READ LESS

Summary

This project assesses the resources necessary to make oral history searchable by means of automatic speech recognition (ASR). We assess the impact of dataset size, word error rate and term-weighted value on human search capability through an information retrieval task on Mechanical Turk, we use English oral history data collected...
READ MORE

Feedback-Based Social Media Filtering Tool for Improved Situational Awareness(421.81 KB)

Date:
May 10, 2016
Published in:
Proceedings of IEEE Symposium on Technologies for Homeland Security
Type:
Conference Paper

Summary

This paper describes a feature-rich model of data relevance, designed to aid first responder retrieval of useful information from social media sources during disasters or emergencies. The approach is meant to address the failure of traditional keyword-based methods to sufficiently suppress clutter during retrieval.
READ LESS

Summary

This paper describes a feature-rich model of data relevance, designed to aid first responder retrieval of useful information from social media sources during disasters or emergencies. The approach is meant to address the failure of traditional keyword-based methods to sufficiently suppress clutter during retrieval.
READ MORE

Cryptography for Big Data Security(538.97 KB)

Date:
May 3, 2016
Published in:
Chapter in Big Data: Storage, Sharing, and Security, Fei Hu (editor), Auerbach Publications
Type:
Book Chapter
Topic:

Summary

New and improved security tools are needed to protect systems collecting and handling big data to allow applications to reap the benefits of big data analysis without the risk of such catastrophic attacks. Modern cryptography offers many powerful technologies that can help protect big data applications throughout the data lifecycle, as it is being collected, stored in repositories, and processed by analysts. In this chapter, we give a brief survey of several of these technologies and explain how they can help big data security.
READ LESS

Summary

New and improved security tools are needed to protect systems collecting and handling big data to allow applications to reap the benefits of big data analysis without the risk of such catastrophic attacks. Modern cryptography offers many powerful technologies that can help protect big data applications throughout the data lifecycle,...
READ MORE

A Reverse Approach to Named Entity Extraction and Linking in Microposts(370.29 KB)

Date:
April 11, 2016
Published in:
Proceedings of 6th workshop on Making Sense of Microposts (#Microposts2016)
Type:
Conference Paper

Summary

In this paper, we present a pipeline for named entity extraction and linking that is designed specifically for noisy, grammatically inconsistent domains where traditional named entity techniques perform poorly. Our approach leverages a large knowledge base to improve entity recognition, while maintaining the use of traditional NER to identify mentions that are not co-referent with any entities in the knowledge base.
READ LESS

Summary

In this paper, we present a pipeline for named entity extraction and linking that is designed specifically for noisy, grammatically inconsistent domains where traditional named entity techniques perform poorly. Our approach leverages a large knowledge base to improve entity recognition, while maintaining the use of traditional NER to identify mentions...
READ MORE

Named Entity Recognition in 140 Characters or Less(158.84 KB)

Date:
April 11, 2016
Published in:
Proceedings of 6th workshop on Making Sense of Microposts (#Microposts2016)
Type:
Conference Paper

Summary

In this paper, we explore the problem of recognizing named entities in microposts, a genre with notoriously little context surrounding each named entity and inconsistent use of grammar, punctuation, capitalization, and spelling conventions by authors. This paper presents the MIT Information Extraction Toolkit (MITIE) and explores its adaptability to the micropost genre.
READ LESS

Summary

In this paper, we explore the problem of recognizing named entities in microposts, a genre with notoriously little context surrounding each named entity and inconsistent use of grammar, punctuation, capitalization, and spelling conventions by authors. This paper presents the MIT Information Extraction Toolkit (MITIE) and explores its adaptability to the...
READ MORE

Side Channel Authenticity Discriminant Analysis for Device Class Identification(247.57 KB)

Date:
March 16, 2016
Published in:
Proceedings of GOMACTech 2016, Orlando, Fla.
Type:
Conference Paper

Summary

Counterfeit microelectronics present a significant challenge to commercial and defense supply chains. Many modern anti-counterfeit strategies rely on manufacturer cooperation to include additional identification components. We instead propose Side Channel Authenticity Discriminant Analysis (SICADA) to leverage physical phenomena manifesting from device operation to match suspect parts to a class of authentic parts.
READ LESS

Summary

Counterfeit microelectronics present a significant challenge to commercial and defense supply chains. Many modern anti-counterfeit strategies rely on manufacturer cooperation to include additional identification components. We instead propose Side Channel Authenticity Discriminant Analysis (SICADA) to leverage physical phenomena manifesting from device operation to match suspect parts to a class of...
READ MORE

2015 operational observation of CoSPA and traffic flow impact(4.3 MB)

Date:
March 15, 2016
Published in:
Project Report ATC-429, MIT Lincoln Laboratory
Type:
Project Report
Topic:

Summary

This technical report summarizes the operational observations recorded by MIT Lincoln Laboratory (MIT LL) aviation subject matter experts during the period 13 April to 31 October 2015. Three separate field observations were conducted over four convective weather days across the eastern National Airspace System (NAS) with visits to five separate FAA facilities and five different airline operation centers.
READ LESS

Summary

This technical report summarizes the operational observations recorded by MIT Lincoln Laboratory (MIT LL) aviation subject matter experts during the period 13 April to 31 October 2015. Three separate field observations were conducted over four convective weather days across the eastern National Airspace System (NAS) with visits to five separate...
READ MORE

SoK: Privacy on Mobile Devices – It’s Complicated(1.07 MB)

Date:
March 2, 2016
Published in:
Proceedings of2016 Privacy Enhancing Technologies Symposium (PETS)
Type:
Conference Paper
Topic:

Summary

Modern mobile devices place a wide variety of sensors and services within the personal space of their users. As a result, these devices are capable of transparently monitoring many sensitive aspects of these users’ lives (e.g., location, health, or correspondences). Users typically trade access to this data for convenient applications and features, in many cases without a full appreciation of the nature and extent of the information that they are exposing to a variety of third parties.

READ LESS

Summary

Modern mobile devices place a wide variety of sensors and services within the personal space of their users. As a result, these devices are capable of transparently monitoring many sensitive aspects of these users’ lives (e.g., location, health, or correspondences). Users typically trade access to this data for convenient applications...
READ MORE

Microhydraulic Electrowetting Actuators

Date:
March 2, 2016
Published in:
IEEE Journal of Microelectromechanical Systems, vol. 25, no. 2
Type:
Journal Article
Topic:

Summary

The conversion of electrical to mechanical power on a sub-centimeter scale is a key technology in many microsystems and energy harvesting devices. In this paper, we present a type of a capacitive energy conversion device that uses capillary pressure and electrowetting to reversibly convert electrical power to hydraulic power. These microhydraulic actuators use a high surface-to-volume ratio to deliver high power at a relatively low voltage with an energy conversion efficiency of over 65%. The capillary pressure generated grows linearly with shrinking capillary diameter, as does the frequency of actuation. We present the pressure, frequency, and power scaling properties of these actuators and demonstrate that power density scales up as the inverse capillary diameter squared, leading to high-efficiency actuators with a strength density exceeding biological muscle. Two potential applications for microhydraulics are also demonstrated: soft-microrobotics and energy harvesting.
READ LESS

Summary

The conversion of electrical to mechanical power on a sub-centimeter scale is a key technology in many microsystems and energy harvesting devices. In this paper, we present a type of a capacitive energy conversion device that uses capillary pressure and electrowetting to reversibly convert electrical power to hydraulic power. These...
READ MORE