Now showing items 1-20 of 30

    • App behavioral analysis using system calls 

      Das, Prajit Kumar; Joshi, Anupam; Finin, Tim (IEEE, 2017-05-01)
      System calls provide an interface to the services made available by an operating system. As a result, any functionality provided by a software application eventually reduces to a set of fixed system calls. Since system ...
    • Automated Knowledge Extraction from the Federal Acquisition Regulations System (FARS) 

      Saha, Srishty; Joshi, Karuna Pande; Frank, Renee; Aebig, Michael; Lin, Jiayong (IEEE, 2017-12-11)
      With increasing regulation of Big Data, it is becoming essential for organizations to ensure compliance with various data protection standards. The Federal Acquisition Regulations System (FARS) within the Code of Federal ...
    • Bid Modification Attack in Smart Grid for Monetary Benefits 

      Khanna, Kush; Joshi, Anupam; Panigrahi, Bijaya Ketan (IEEE, 2016-12-19)
      In the quest for reliability and automation, the entire smart grid operation and control depends on the communication infrastructure. This reliance on the information and communication technologies has also opened up ...
    • CADET: Computer Assisted Discovery Extraction and Translation 

      Durme, Benjamin Van; Lippincott, Tom; Duh, Kevin; Burchfield, Deana; Poliak, Adam; Costello, Cash; Finin, Tim; Miller, Scott; Mayfield, James; Koehn, Philipp; Harmon, Craig; Lawrie, Dawn; May, Chandler; Thomas, Max; Carrell, Annabelle; Chaloux, Julianne (2017-11-27)
      Computer Assisted Discovery Extraction and Translation (CADET) is a workbench for helping knowledge workers find, label, and translate documents of interest. It combines a multitude of analytics together with a flexible ...
    • Capturing policies for fine-grained access control on mobile devices 

      Das, Prajit Kumar; Joshi, Anupam; Finin, Tim (IEEE, 2016-11-01)
      As of 2016, there are more mobile devices than humans on earth. Today, mobile devices are a critical part of our lives and often hold sensitive corporate and personal data. As a result, they are a lucrative target for ...
    • A Chromatic Dispersion Estimation Method for Arbitrary Modulation Formats 

      Zweck, John; Menyuk, Curtis R. (Optical Society of America, 2011-05-06)
      Simulations show that a modulation-format-independent method for estimating chromatic dispersion from the phase of a coherently-received signal at four frequencies can estimate 3000 ps/nm of dispersion to within 2% at an ...
    • Coupled PDEs with Initial Solution from Data in COMSOL 4 

      Huang, X.; Khuvis, S.; Askarian, S.; Gobbert, M. K.; Peercy, B. E. (2013)
      Many physical applications require the solution of a system of coupled partial differential equations (PDEs). In most cases the analytic PDE solution does not exist for this system and we need to solve the problem numerically ...
    • A Deep Learning Approach to Understanding Cloud Service Level Agreements 

      Saha, Srishty; Joshi, Karuna Pande; Gupta, Aditi (2017-05-24)
      Educational organizations, like Universities and School Systems, are rapidly adopting Cloud based services to provide Information Technology (IT) infrastructure to their students. These include course offerings, class ...
    • Deep Understanding of a Document's Structure 

      Rahman, Muhammad Mahbubur; Finin, Tim (ACM, 2017-12-05)
      Current language understanding approaches focus on small documents, such as newswire articles, blog posts, product reviews and discussion forum discussions. Understanding and extracting information from large documents ...
    • Discovering Scientific Influence using Cross-Domain Dynamic Topic Modeling 

      Sleeman, Jennifer; Finin, Tim; Cane, Mark; Halem, Milton (IEEE, 2017-01-15)
      We describe an approach using dynamic topic modeling to model influence and predict future trends in a scientific discipline. Our study focuses on climate change and uses assessment reports of the Intergovernmental Panel ...
    • Dynamic Topic Modeling to Infer the Influence of Research Citations on IPCC Assessment Reports 

      Sleeman, Jennifer; Halem, Milton; Finin, Tim; Cane, Mark (IEEE, 2016-12-05)
      A common Big Data problem is the need to integrate large temporal data sets from various data sources into one comprehensive structure. Having the ability to correlate evolving facts between data sources can be especially ...
    • Finite Element Convergence for Time-Dependent PDEs with a Point Source in COMSOL 4.2 

      Trott, David W.; Gobbert, Matthias K. (2011)
      The FEM theory provides the basis for quantification on the accuracy and reliability of a numerical solution by the a priori error estimates on the FEM error vs. the mesh spacing of the FEM mesh. This paper presents ...
    • Generating Digital Twin models using Knowledge Graphs for Industrial Production Lines 

      Banerjee, Agniva; Dalal, Raka; Mittal, Sudip; Joshi, Karuna Pande (ACM Publications, 2017-06-25)
      Digital Twin models are computerized clones of physical assets that can be used for in-depth analysis. Industrial production lines tend to have multiple sensors to generate near real-time status information for production. ...
    • Inferring Relations in Knowledge Graphs with Tensor Decompositions 

      Padia, Ankur; Kalpakis, Kostantinos; Finin, Tim (IEEE, 2017-02-06)
      Multi-relational data, like knowledge graphs, are generated from multiple data sources by extracting entities and their relationships. We often want to include inferred, implicit or likely relationships that are not ...
    • Link before you share: Managing privacy policies through blockchain 

      Banerjee, Agniva; Joshi, Karuna Pande (IEEE, 2018-01-15)
      With the advent of numerous online content providers, utilities and applications, each with their own specific version of privacy policies and its associated overhead, it is becoming increasingly difficult for concerned ...
    • Modeling the Evolution of Climate Change Assessment Research Using Dynamic Topic Models and Cross-Domain Divergence Maps 

      Sleeman, Jennifer; Halem, Milton; Finin, Tim; Cane, Mark (Association for the Advancement of Artificial Intelligence, 2017)
      Climate change is an important social issue and the subject of much research, both to understand the history of the Earth’s changing climate and to foresee what changes to expect in the future. Approximately every five ...
    • On Detecting False Data Injection with Limited Network Information using Statistical Techniques 

      Khanna, Kush; Bose, Ranjan; Joshi, Anupam (IEEE, 2018-02-01)
      Cyber-attacks poses a serious threat to power system operation. False data injection attack (FDIA) is one such severe threat, if wisely constructed, can cause flawed estimation of power system states, thereby, leading to ...
    • Participation in TAC KBP 2017: Cold Start TEDL and Low-resource EDL 

      Finin, Tim; Lawrie, Dawn; Mayfield, James; McNamee, Paul; Costello, Cash
      The JHU HLTCOE participated in the Cold Start and the edl tasks of the 2017 Text Analysis Conference Knowledge Base Population evaluation. For our sixth year of participation in Cold Start we continued our research with ...
    • A Question and Answering System for Management of Cloud Service Level Agreements 

      Mittal, Sudip; Gupta, Aditi; Joshi, Karuna P.; Pearce, Claudia; Joshi, Anupam (IEEE, 2017-09-11)
      One of the key challenges faced by consumers is to efficiently manage and monitor the quality of cloud services. To manage service performance, consumers have to validate rules embedded in cloud legal contracts, such as ...
    • Secrecy Outage of Cooperative Relay Network With and Without Eavesdropper’s Direct Link 

      Joshi, Anupam; Chopra, Khyati; Bose, Ranjan (IEEE, 2017-10-23)
      In this paper, a source communicates to the destination with the cooperation of a relay, in the presence of an eavesdropper. All the links undergo Rayleigh fading and perfect decoding at the relays is not considered. The ...