Now showing items 97-116 of 918

    • CADET: Computer Assisted Discovery Extraction and Translation 

      Durme, Benjamin Van; Lippincott, Tom; Duh, Kevin; Burchfield, Deana; Poliak, Adam; Costello, Cash; Finin, Tim; Miller, Scott; Mayfield, James; Koehn, Philipp; Harmon, Craig; Lawrie, Dawn; May, Chandler; Thomas, Max; Carrell, Annabelle; Chaloux, Julianne (2017-11-27)
      Computer Assisted Discovery Extraction and Translation (CADET) is a workbench for helping knowledge workers find, label, and translate documents of interest. It combines a multitude of analytics together with a flexible ...
    • Calculation of the expected output spectrum for a mid-infrared supercontinuum source based on As₂S₃ chalcogenide photonic crystal fibers 

      Weiblen, R. J.; Docherty, A.; Menyuk, C. R.; Shaw, L. B.; Sanghera, J. S.; Aggarwal, I. D. (Optical Society of America, 2014-09-08)
      We computationally investigate supercontinuum generation in an As₂S₃ solid core photonic crystal fiber (PCF) with a hexagonal cladding of air holes. With a goal of obtaining a supercontinuum output spectrum that can predict ...
    • Calculation of the impulse response and phase noise of a high-current photodetector using the drift-diffusion equations 

      Mahabadi, Seyed Ehsan Jamali; Wang, Shaokang; Carruthers, Thomas F.; Menyuk, Curtis R.; Quinlan, Franklyn J.; Hutchinson, Meredith N.; McKinney, Jason D.; Williams, Keith J. (OSA, 2019)
      We describe a procedure to calculate the impulse response and phase noise of high-current photodetectors using the drift-diffusion equations while avoiding computationally expensive Monte Carlo simulations. We apply this ...
    • Capturing policies for fine-grained access control on mobile devices 

      Das, Prajit Kumar; Joshi, Anupam; Finin, Tim (IEEE, 2016-11-01)
      As of 2016, there are more mobile devices than humans on earth. Today, mobile devices are a critical part of our lives and often hold sensitive corporate and personal data. As a result, they are a lucrative target for ...
    • CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies 

      Li, Wenjia; Jagtap, Pramod; Zavala, Laura; Joshi, Anupam; Finin, Tim (IEEE, 2011-06-06)
      A Cyber-Physical System (CPS) involves a tight coupling between the physical and computational elements. Security is a key challenge for the deployment of CPS. Therefore, it is highly desirable to extract correct information ...
    • CASIE: Extracting Cybersecurity Event Information from Text 

      Satyapanich, Taneeya; Ferraro, Francis; Finin, Tim (2020-02)
      We present CASIE, a system that extracts information about cybersecurity events from text and populates a semantic model, with the ultimate goal of integration into a knowledge graph of cybersecurity data. It was trained ...
    • CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies 

      Li, Wenjia; Joshi, Anupam; Finin, Tim
      Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with ...
    • Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel 

      Fink, Russell A.; Sherman, Alan T.; Mitchell, Alexander O.; Challener, David C. (Springer, Berlin, Heidelberg, 2011-06-22)
      We present a Trusted Platform Module (TPM) application protocol that detects a certain man in the middle attack where an adversary captures and replaces a legitimate computing platform with an imposter that forwards ...
    • The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories 

      Sherman, Alan T.; Oliva, Linda; Golaszewski, Enis; Phatak, Dhananjay; Scheponik, Travis; Herman, Geoffrey L.; Choi, Dong San; Offenberger, Spencer E.; Peterson, Peter; Dykstra, Josiah; Bard, Gregory V.; Chattopadhyay, Ankur; Sharevski, Filipo; Verma, Rakesh; Vrecenar, Ryan (2019-01-29)
      For two days in February 2018, 17 cybersecurity educators and professionals from government and industry met in a "hackathon" to refine existing draft multiple-choice test items, and to create new ones, for a Cybersecurity ...
    • CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS 

      Huang, Cheng; Yi, Ping; Zou, Futai; Yao, Yao; Wang, Wei; Zhu, Ting (Hindawi, 2019-02-20)
      This study presents a new method for detecting ShrewDDoS (DistributedDenial of Service) attacks and analyzes the characteristics of the Shrew DDoS attack. Shrew DDoS is periodic to be suitable for the server’s TCP ...
    • CCVis: Visual Analytics of Student Online Learning Behaviors Using Course Clickstream Data 

      Goulden, Maggie Celeste; Gronda, Eric; Yang, Yurou; Zhang, Zihang; Tao, Jun; Wang, Chaoli; Duan, Xiaojing; Ambrose, G. Alex; Abbott, Kevin; Miller, Patrick
      As more and more college classrooms utilize online platforms to facilitate teaching and learning activities, analyzing student online behaviors becomes increasingly important for instructors to effectively monitor and ...
    • Centaurus : A Framework for Intelligent Services in a Mobile Environment 

      Kagal, Lalana; Korolev, Vladimir; Chen, Harry; Joshi, Anupam; Finin, Tim (IEEE, 2001-04-01)
      In an age where wirelessly networked appliances and devices are becoming commonplace, there is a necessity for connecting them to work together for a mobile user. The design outlined in this paper provides an infrastructure ...
    • Characterizing the Semantic Web on the Web 

      Ding, Li; Finin, Tim (2006-11-05)
      Semantic Web languages are being used to represent, encode and exchange semantic data in many contexts beyond the Web -- in databases, multiagent systems, mobile computing, and ad hoc networking environments. The core ...
    • Characterizing the Splogosphere 

      Kolari, Pranam; Java, Akshay; Finin, Tim (2006-05-23)
      Weblogs or blogs collectively constitute the Blogosphere, forming an influential and interesting subset on theWeb. As with most Internet-enabled applications, the ease of content creation and distribution makes the blogosphere ...
    • Chatbot Application on Cryptocurrency 

      Xie, Qitao; Zhang, Qingquan; Tan, Dayuan; Zhu, Ting; Xiao, Shen; Li, Beibei; Sun, Lei; Yi, Ping; Wang, Junyu (IEEE, 2019-07-11)
      Many chatbots have been developed that provide a multitude of services through a wide range of methods. A chatbot is a brand-new conversational agent in the highspeed changing technology world. With the advance of Artificial ...
    • Chemical and biological sensing using polarity of material 

      Emge, Ian; Su, Charmain; Sood, Rachit; Arnold, Bradley; Choa, Fow-Sen; Kelly, Lisa; Mandal, K. D.; Verma, Manish K.; Singh, N. B. (SPIE, 2020-04-24)
      Polarity is very important in developing materials with colossal dielectric. To meet the demands for the tunable devices and high dielectric parallel plate capacitors, several perovskites such as CaCu₃Ti₄O₁₂ (CCTO), ...
    • Choose Your Color from the Photonic Band Edge Nonlinear Frequency Conversion 

      Scalora, Michael; Bloemer, Mark J.; Bowden, Charles M.; D'Aguanno, Giuseppe; Centini, Marco; Sibilia, Concita; Bertolotti, Mario; Dumeige, Yannick; Sagnes, Isabel; Vidakovic, Petar; Levenson, Ariel (OSA Publishing, 2001)
      Ordinary Bragg reflectors, also known as one-dimensional photonic band gap structures (PBGs), display extraordinary linear and nonlinear optical properties that present a remarkable opportunity: the simultaneous availability ...
    • Cleaning Noisy Knowledge Graphs 

      Padia, Ankur (CEUR Workshop Proceedings, 2017-10-22)
      My dissertation research is developing an approach to identify and explain errors in a knowledge graph constructed by extracting entities and relations from text. Information extraction systems can automatically construct ...
    • Cluster Quality Analysis Using Silhouette Score 

      Shahapure, Ketan Rajshekhar; Nicholas, Charles (IEEE, 2020-11-20)
      Clustering is an important phase in data mining. Selecting the number of clusters in a clustering algorithm, e.g. choosing the best value of k in the various k-means algorithms [1], can be difficult. We studied the use of ...
    • Cluster-based Instance Consolidation For Subsequent Matching 

      Sleeman, Jennifer; Finin, Tim (2012-11-11)
      Instance consolidation is a way to merge instances that are thought to be the same or closely related that can be used to support coreference resolution and entity linking. For Semantic Web data, consolidating instances ...