Now showing items 536-555 of 911

    • Obtaining more energetic modelocked pulses from a SESAM-based fiber laser 

      Wang, Shaokang; Tu, Chaoran; Mahabadi, Seyed Ehsan Jamali; Droste, Stefan; Sinclair, Laura C.; Coddington, Ian; Newbury, Nathan R.; Carruthers, Thomas F.; Menyuk, Curtis R. (OSA Publishing, 2020)
      A major design goal for femtosecond fiber lasers is to increase the output power but not at the cost of increasing the noise level or narrowing the bandwidth. Here, we perform a computational study to optimize the cavity ...
    • On Creating Adaptive Web Servers Using Weblog Mining 

      Kamdar, Tapan; Joshi, Anupam (2000-11-20)
      Personalization of content returned from a web site is an important problem in general, and affects e-commerce and e-services in particular. Targeting appropriate information or products to the end user can significantly ...
    • On Data Management in Pervasive Computing Environments 

      Perich, Filip; Joshi, Anupam; Yesha, Yelena (IEEE, 2004-05-31)
      This paper presents a framework to address new data management challenges introduced by data-intensive, pervasive computing environments. These challenges include a spatio-temporal variation of data and data source ...
    • On Detecting False Data Injection with Limited Network Information using Statistical Techniques 

      Khanna, Kush; Bose, Ranjan; Joshi, Anupam (IEEE, 2018-02-01)
      Cyber-attacks poses a serious threat to power system operation. False data injection attack (FDIA) is one such severe threat, if wisely constructed, can cause flawed estimation of power system states, thereby, leading to ...
    • On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework 

      Ding, Li; Kolari, Pranam; Finin, Tim; Joshi, Anupam; Peng, Yun; Yesha, Yelena (AAAI, 2005)
      Discovering and evaluating interesting patterns and semantic associations in vast amount of information provided by many different sources is an important and time-consuming work for homeland security analysts. By ...
    • On intrusion detection and response for mobile ad hoc networks 

      Parker, James; Undercoffer, Jeffrey; Pinkston, John; Joshi, Anupam (IEEE, 2004-04-16)
      We present network intrusion detection mechanisms that rely upon packet snooping to detect aberrant behavior in mobile ad hoc networks. Our extensions, which are applicable to several mobile ad hoc routing protocols, offer ...
    • On Mining Web Access Logs 

      Joshi, Anupam; Krishnapuram, Raghu (2000-05-14)
      The proliferation of information on the world wide web has made the personalization of this information space a necessity. One possible approach to web personalization is to mine typical user profiles from the vast amount ...
    • On Mining Web Access Logs 

      Joshi, Anupam; Joshi, Karuna; Krishnapuram, Raghu (1999-10-24)
      The proliferation of information on the world wide web has made the personalization of this information space a necessity. One possible approach to web personalization is to mine typical user profiles from the vast amount ...
    • On Mobility and Agents 

      Joshi, Anupam (1999-03-24)
      The ability to access networked resources, both computational and information, form mobile client will become increasingly importance in the emerging pervasive computing scenario. There is significant ongoing work in the ...
    • On Modeling Trust in Social Media using Link Polarity 

      Kale, Anubhav; Kolari, Pranam; Java, Akshay; Finin, Tim; Joshi, Anupam (University of Maryland, Baltimore County, 2007-05-14)
      There is a growing interest in exploring the role of social networks to understand how communities and individuals spread influence. In a densely connected online world, social media and networks have a great potential in ...
    • On Proxy Agents, Mobility, and Web Access 

      Joshi, Anupam (Kluwer Academic Publishers, 2000-12-24)
      With the emerging need for ubiquitous access to information, web access from mobile clients is gaining increasing importance. Unfortunately, the underlying protocols of the web are not designed to support operations from ...
    • On the Ability to Provide Demonstrations on a UAS: Observing 90 Untrained Participants Abusing a Flying Robot 

      Scott, Mitchell; Peng, Bei; Chili, Madeline; Nigam, Tanay; Pascua, Francis; Matuszek, Cynthia; Taylor, Matthew E. (AAAI, 2015)
      This paper presents an exploratory study where participants piloted a commercial UAS (unmanned aerial system) through an obstacle course. The goal was to determine how varying the instructions given to participants affected ...
    • On the Complementary Nature of Knowledge Graph Embedding, Fine Grain Entity Types, and Language Modeling 

      Patel, Rajat; Ferraro, Francis (Association for Computational Linguistics, 2020-11-19)
      We demonstrate the complementary natures of neural knowledge graph embedding, fine-grain entity type prediction, and neural language modeling. We show that a language model-inspired knowledge graph embedding approach yields ...
    • On the Origins and Variations of Blockchain Technologies 

      Sherman, Alan T.; Javani, Farid; Zhang, Haibin; Golaszewski, Enis (2018-10-15)
      We explore the origins of blockchain technologies to better understand the enduring needs they address. We identify the five key elements of a blockchain, show embodiments of these elements, and examine how these elements ...
    • On the structural properties of massive telecom call graphs: findings and implications 

      Nanavati, Amit Anil; Gurumurthy, Siva; Das, Gautam; Chakraborty, Dipanjan; Dasgupta, Koustuv; Mukherjea, Sougata; Joshi, Anupam (ACM, 2006-11-01)
      With ever growing competition in telecommunications markets, operators have to increasingly rely on business intelligence to offer the right incentives to their customers. Toward this end, existing approaches have almost ...
    • On the transition to secondary Kerr combs in whispering-gallery mode resonators 

      Coillet, Aurélien; Qi, Zhen; Balakireva, Irina V.; Lin, Guoping; Menyuk, Curtis R.; Chembo, Yanne K. (Optical Society of America, 2019)
      We demonstrate that extended dissipative structures in Kerr-nonlinear whispering-gallery mode resonators undergo a spatiotemporal instability, as the pumping parameters are varied. We show that the dynamics of the patterns ...
    • On the Universally Composable Security of OpenStack 

      Hogan, Kyle; Maleki, Hoda; Rahaeimehr, Reza; Canetti, Ran; van Dijk, Marten; Hennessey, Jason; Varia, Mayank; Zhang, Haibin (2018)
      OpenStack is the prevalent open-source, non-proprietary package for managing cloud services and data centers. It is highly complex and consists of multiple inter-related components which are developed by separate, loosely ...
    • On the use of Deep Autoencoders for Efficient Embedded Reinforcement Learning 

      Prakash, Bharat; Horton, Mark; Waytowich, Nicholas R.; Hairston, William David; Oates, Tim; Mohsenin, Tinoosh (2019-03-25)
      In autonomous embedded systems, it is often vital to reduce the amount of actions taken in the real world and energy required to learn a policy. Training reinforcement learning agents from high dimensional image ...
    • On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study 

      Joshi, Anupam; Undercoffer, Jeffrey (2003-05-01)
      We examine the intersection of data mining and semantic web in this paper. We briefly identify some points where they can impact one another, and then develop a specific example of intrusion detection, an application of ...
    • Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem 

      Chukkapalli, Sai Sree Laya; Mittal, Sudip; Gupta, Maanak; Abdelsalam, Mahmoud; Joshi, Anupam; Sandhu, Ravi; Joshi, Karuna (IEEE, 2020-09-08)
      Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid advancements in technologies that support ...