Now showing items 21-40 of 287

    • Authentication Using Tactile Feedback 

      Kuber, Ravi; Yu, Wai
      As current knowledge-based systems do not take into account human limitations when recalling authenticating strings, individuals often select short or guessable passwords. As a result, a compromise is created between ...
    • AutoCogniSys: IoT Assisted Context-Aware Automatic Cognitive Health Assessment 

      Alam, Mohammad Arif Ul; Roy, Nirmalya; Holmes, Sarah; Gangopadhyay, Aryya; Galik, Elizabeth (2020-03-17)
      Cognitive impairment has become epidemic in older adult population. The recent advent of tiny wearable and ambient devices, a.k.a Internet of Things (IoT) provides ample platforms for continuous functional and cognitive ...
    • Automated Detection of Substance Use-Related Social Media Posts Based on Image and Text Analysis 

      Roy, Arpita; Paul, Anamika; Pirsiavash, Hamed; Pan, Shimei (IEEE, 2017)
      Abstract—Nowadays, teens and young adults spend a significant amount of time on social media. According to the national survey of American attitudes on substance abuse, American teens who spend time on social media sites ...
    • Automated Functional and Behavioral Health Assessment of Older Adults with Dementia 

      Alam, Mohammad Arif Ul; Roy, Nirmalya; Holmes, Sarah; Gangopadhyay, Aryya; Galik, Elizabeth (IEEE, 2016-08-18)
      Dementia is a clinical syndrome of cognitive deficits that involves both memory and functional impairments. While disruptions in cognition is a striking feature of dementia, it is also closely coupled with changes in ...
    • Automated Knowledge Extraction from the Federal Acquisition Regulations System (FARS) 

      Saha, Srishty; Joshi, Karuna Pande; Frank, Renee; Aebig, Michael; Lin, Jiayong (IEEE, 2017-12-11)
      With increasing regulation of Big Data, it is becoming essential for organizations to ensure compliance with various data protection standards. The Federal Acquisition Regulations System (FARS) within the Code of Federal ...
    • Automatic Extraction of Metrics from SLAs for Cloud Service Management 

      Mittal, Sudip; Joshi, Karuna Pande; Pearce, Claudia; Joshi, Anupam (IEEE, 2016-04-04)
      To effectively manage cloud based services, organizations need to continuously monitor the performance metrics listed in the Cloud service contracts. However, these legal documents, like Service Level Agreements (SLA) or ...
    • Automatic Speech Recognition: A Shifted Role in Early Speech Intervention 

      Hamidi, Foad; Baljko, Melanie (Association for Computational Linguistics, 2013-08)
      Although automatic speech recognition (ASR) has been used in several systems that support speech training for children, this particular design domain poses on-going challenges: an input domain of non-standard speech and ...
    • Automatically Infer Human Traits and Behavior from Social Media Data 

      Pan, Shimei; Ding, Tao (2018)
      Given the complexity of human minds and their behavioral flexibility, it requires sophisticated data analysis to sift through a large amount of human behavioral evidence to model human minds and to predict human behavior. ...
    • Automating Cloud Service Level Agreements using Semantic Technologies 

      Joshi, Karuna Pande; Pearce, Claudia (IEEE, 2015-03-12)
      Cloud related legal documents, like terms of service or customer agreement are usually managed as plain text files. Hence extensive manual effort is required to monitor the cloud service performance by cross referencing ...
    • Automating Cloud Services Lifecycle through Semantic technologies 

      Joshi, Karuna Pande; Yesha, Yelena; Finin, Tim (IEEE, 2014-01-01)
      Managing virtualized services efficiently over the cloud is an open challenge. Traditional models of software development are not appropriate for the cloud computing domain, where software (and other) services are acquired ...
    • Automating GDPR Compliance using Policy Integrated Blockchain 

      Mahindrakar, Abhishek; Joshi, Karuna Pande
      Data Protection regulations, like GDPR, mandate security controls to secure Personal Identifiable Information (PII) of the users which they share with service providers. With the volume of shared data reaching exascale ...
    • Automating Privacy Compliance Using Policy Integrated Blockchain 

      Joshi, Karuna Pande; Banerjee, Agniva (MDPI, 2019-02-05)
      An essential requirement of any information management system is to protect data and resources against breach or improper modifications, while at the same time ensuring data access to legitimate users. Systems handling ...
    • Baseline Measurements of Shoulder Surfing Analysis and Comparability for Smartphone Unlock Authentication 

      Davin, John T.; Aviv, Adam J.; Wolf, Flynn; Kuber, Ravi (Association for Computing Machinery, 2017-05)
      In this paper, we describe a novel approach to measure the susceptibility of smartphone unlock authentication to shoulder surfing attacks. In our methodology, participants play the role of attackers, viewing video-recorded ...
    • A Bayesian Data Analytics Approach to Buildings’ Thermal Parameter Estimation 

      Pathak, Nilavra; Foulds, James; Roy, Nirmalya; Banerjee, Nilanjan; Robucci, Ryan (Association for Computing Machinery, 2019-06-28)
      Modeling buildings’ heat dynamics is a complex process which depends on various factors including weather, building thermal capacity, insulation preservation, and residents’ behavior. Gray-box models offer an explanation ...
    • Behavior Analysis of Team Performance: A Case Study of Membership Replacement 

      Emurian, Henry (Originally published by: The Behavior Analyst Today, 2010)
      A three-person team performance task (TPT) is described, and evaluative results are presented under conditions of individual fixed ratios required to complete a work component and a team fixed ratio required to complete ...
    • Behavioral Health Management of Space Dwelling Groups: Safe Passage Beyond Earth Orbit 

      Emurian, Henry (Originally published by: The Behavior Analyst Today, 2010)
      Plans to pursue space expeditionary missions beyond Earth orbit have occasioned renewed concern that crew behavioral health and performance effectiveness, along with spacecraft habitability, will present major challenges ...
    • Benchmarking parallel implementations of cloud type clustering from satellite data 

      Barajas, Carlos A.; Mukherjee, Lipi; Guo, Pei; Hoban, Susan; Jin, Daeho; Gangopadhyay, Aryya; Wang, Jianwu
      The study of clouds, i.e., where they occur and what are their characteristics, plays a key role in the understanding of climate change. The aim of this project is to use machine learning in conjunction with parallel ...
    • Benchmarking Parallel K-Means Cloud Type Clustering from Satellite Data 

      Barajas, Carlos; Guo, Pei; Mukherjee, Lipi; Hoban, Susan; Wang, Jianwu; Jin, Daeho; Gangopadhyay, Aryya; Gobbert, Matthias K. (Springer, Cham, 2019-10-08)
      The study of clouds, i.e., where they occur and what are their characteristics, plays a key role in the understanding of climate change. Clustering is a common machine learning technique used in atmospheric science to ...
    • Beyond being human: The (in)accessibility consequences of modeling VAPAs after human-human conversation 

      Roy, Mukkath; Rishin, Antony; Ali, Abdolrahmani; Kuber, Ravi; Branham, Stacy M. (iSchools, 2201-03-15)
      Voice-Activated Personal Assistants (VAPAs) like Amazon's Alexa and Google Assistant have rapidly become pervasive, with users spanning from the youngest young to the oldest old of our society. However, little is known ...
    • Blind People Are Power Users: An Argument for Centering Blind Users in Design of Voice Interfaces 

      Abdolrahmani, Ali; Mukkath, Rishin; Kuber, Ravi; Branham, Stacy M.
      Voice interfaces in the form of Voice Activated Personal Assistants (VAPAs)–like Google Assistant and Microsoft Cortana–have rapidly become pervasive technologies. Recent studies reveal that these interfaces are particularly ...