Information & computer science publications
-
PIDGIN: Privacy-Preserving Interest and Content Sharing in Opportunistic Networks
This paper addresses the research challenges inherent to the exchange of content and interests without compromising the privacy of subscribers, and allowing unauthorised access to untrusted brokers. Specifically, this paper…
-
The CHERI Capability Model: Revisiting RISC in an Age of Risk
Motivated by contemporary security challenges, we reevaluate and refine capability-based addressing for the RISC era. We present CHERI, a hybrid capability model that extends the 64-bit MIPS ISA with byte-granularity…
-
A Genome-Scale Metabolic Flux Model of Escherichia coli K-12 Derived from the EcoCyc Database
We present EcoCyc–18.0–GEM, a genome-scale model of the E. coli K–12 MG1655 metabolic network.
-
Constrained Optimal Selection for Multi-Sensor Robot Navigation Using Plug-and-Play Factor Graphs
This paper proposes a real-time navigation approach that is able to integrate many sensor types while fulfilling performance needs and system constraints.
-
Automatic Characterization of Speaking Styles in Educational Videos
We use crowd-sourcing to explore speaking style dimensions in online educational videos, and then propose techniques based solely on acoustic features for automatically identifying a subset of the dimensions.
-
The IEEE Symposium on Security and Privacy, in Retrospect
We focus on SSP’s evolution and its vital relevance to the research and development communities along its path from community gathering to premier security research meeting.
-
DCAD: Dynamic Cell Anomaly Detection for Operational Cellular Networks
In this paper, we present Dynamic Cell Anomaly Detection (DCAD), a tool that implements an adaptive ensemble method for modeling cell behavior [5], [6].
-
Emotion Detection in Speech Using Deep Networks
We propose a novel staged hybrid model for emotion detection in speech. Hybrid models exploit the strength of discriminative classifiers along with the representational power of generative models.
-
Global Ethics and Virtual Worlds: Ensuring Functional Integrity in Transnational Research Studies
This paper examines a number of issues in this research context, with particular stress on the challenges posed by transnational experimental projects in virtual worlds and social networks.
-
Neuroscience Meets Cryptography: Crypto Primitives Secure against Rubber Hose Attacks
We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. We use a carefully crafted computer game to plant a secret password in the participant’s brain…
-
NV-CMOS HD Camera for Day/Night Imaging
SRI International (SRI) has developed a new multi-purpose day/night video camera with low-light imaging performance comparable to an image intensifier, while offering the size, weight, ruggedness, and cost advantages enabled…
-
Medium-Duration Modulation Cepstral Feature for Robust Speech Recognition
In this paper, we present the Modulation of Medium Duration Speech Amplitude feature, which is a composite feature capturing subband speech modulations and a summary modulation.