Information & computer science publications
-
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption without Obfuscation
We construct the first implementable encryption system supporting greater-than comparisons on encrypted data that provides the “best-possible” semantic security.
-
Channel and Noise Robustness of Articulatory Features in a Deep Neural Net Based Speech Recognition System
This work presents a deep neural network (DNN)—hidden Markov model (HMM) based acoustic model where articulatory features are used in addition to mel-frequency cepstral coefficients (MFCC) for the Aurora-4 speech recognition task.
-
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine
We propose a new memory-safe interpretation of the C abstract machine that provides stronger protection to benefit security and debugging.
-
Blueswitch: Enabling Provably Consistent Configuration of Network Switches
In this paper, we focus on the behavior of individual switches, and demonstrate that even simple rule updates result in inconsistent packet switching in multi-table datapaths.
-
Review of Materials Science for Studying the Fleischmann and Pons Effect
Fleischmann and Pons effect (FPE) is the production of excess power during electrochemical loading of deuterium in palladium.
-
Marine Tar Residues: A Review
Methods of detection and removal of marine tar residues and their possible ecological effects are discussed, in addition to topics of marine tar research that warrant further investigation.
-
A Case Study on Occurrence of an Unusual Structure in the Sodium Layer over Gadanki, India
An investigation is carried out combining the data from multiple instruments that include the meteor wind radar over Thiruvananthapuram, India and the SABER instrument onboard the TIMED satellite.
-
Learning grounded finite-state representations from unstructured demonstrations
We present a series of algorithms that draw from recent advances in Bayesian nonparametric statistics and control theory to automatically detect and leverage repeated structure at multiple levels of abstraction…
-
Far-Sighted Thinking About Deleterious Computer-Related Events
It suggests that advanced planning for certain major disasters relating to security, cryptography, safety, reliability, and other critical system requirements is well worth consideration.
-
Soft Agents: Exploring Soft Constraints to Model Robust Adaptive Distributed Cyber-Physical Agent Systems
We are interested in principles for designing and building open distributed systems consisting of multiple cyber-physical agents, specifically, where a coherent global view is unattainable and timely consensus is impossible.
-
De-Correlating CNN Features for Generative Classification
The proposed approach to solving this problem builds on the idea of training LDA classifiers using only class specific foreground images and a large collection of unlabelled images.
-
Effects of Tidal Forcing, Conductivity Gradient, and Active Seeding on the Climatology of Equatorial Spread F over Kwajalein
ESF climatology over the Kwajalein Atoll was compared with properties of the postsunset rise (PSSR) of the F layer and seeding activity in the troposphere.