Driver of Innovation Through Intelligent Systems Research CONTACT
|
|
- Loraine McGee
- 8 years ago
- Views:
Transcription
1 Driver of Innovation Through Intelligent Systems Research CONTACT Kalyan Moy Gupta, PhD, President 163 Waterfront St., Suite 440, National Harbor, MD x700
2 LEADERSHIP STATEMENT Intelligent systems automate and simplify knowledge-intensive tasks and decision making, learn from their mistakes, and adapt to unexpected situations, offering capabilities beyond conventional systems. We provide intelligent systems R&D services, focusing on provable innovation, to help our customers develop novel products and processes. OUR MISSION is to deliver intelligent software solutions that measurably improve decision support effectiveness and autonomy levels. Our solutions shall provide sustained competitive advantage to cost-conscious providers of decision support, autonomous, and training systems. We will accomplish this by pioneering research and development in artificial intelligence techniques in close cooperation with customers. OUR VISION is that communicative autonomous and decision support systems for national security and commercial applications are widespread, modular, safe, reliable, and affordable.
3 VALUES EXCELLENCE: Leave no stone unturned and chase the last grain of rice in the lunch box in the quest for excellence in delivery of products and services. INTEGRITY: Interact with customers, partners, and team members with utmost integrity and respect. DEPENDABILITY: Strive for a reputation of utmost dependability with quality, schedule, and cost in sight at all times. TECHNICAL COURAGE, PERSISTENCE, AND COLLECTIVE INTELLIGENCE: Innovate with courage to decimate the-state-of-the-art, which may be our own, and maintain a strong sense of optimism supported by an equal measure of perseverance, and trust in the power of collective intelligence and teamwork to develop robust, lasting solutions to hard problems. EMPATHY: Empathize with customers and teammates to truly understand their point of view and develop effective solutions. ENJOYMENT: Create and sustain a work environment where innovation and research thrive and are a continuous source of purpose, enjoyment, and fulfillment. CORE COMPETENCIES BASIC AND APPLIED RESEARCH We conduct basic and applied research on a variety of artificial intelligence (AI) topics such as goaldriven autonomy, communicative autonomy, natural language understanding, relational learning, learning and acting in virtual environments and automated web services brokering. We work with you to disseminate research findings via scientific publications and presentations. PROOF-OF-CONCEPT DEVELOPMENT We develop prototypes to showcase and evaluate AI R&D products. We employ software engineering best practices to architect stand-alone and embedded cross-platform systems that can be easily transitioned to production systems. We integrate products from multiple performer teams of research programs for demonstration and evaluation. TEST-BED DEVELOPMENT We develop testbeds for evaluating AI R&D products. Our testbeds provide easy access to extensible components; test problem sets, plug-and-play interfaces for target algorithms, and evaluation metrics. These enable benchmarking and comparison of a family of AI algorithms and technologies. TEST AND EVALUATION We test and evaluate AI methods and software systems at individual performer and research program levels. We design evaluation methods and experiments, collect and prepare test data with crowdsourcing techniques if appropriate, develop evaluation software, conduct experiments, analyze observations, and report findings.
4 SAMPLE PROJECTS Spatio-Temporal Cognition SPATIO-TEMPORAL COGNITION FOR LANGUAGE & SCENE UNDERSTANDING Given a vague spoken command such as Go into the building, how should an autonomous ground vehicle (AGV) or a robot figure out where exactly in the building it should go and which way it should face, or, what it should do once it gets there? How should it respond when asked Where are you? Understanding such commands and responding to such questions requires complex spatiotemporal reasoning. In an ONR-funded basic research program, we have developed two patent pending adaptive algorithms for such reasoning tasks. Our algorithms build on psycholinguistic theories and novel AI approaches to connect perception to action through conceptualization using the ability to elegantly utilize contextualized world knowledge. We have demonstrated the effectiveness of our algorithms in virtual AGVs. Our algorithms and findings provide a strong foundation for the development of robust autonomous agents that can communicate in plain English. Keywords/Captions: Basic Research, Communicative Autonomy, Patents, Learning. Behavior Recognition for Threat Analysis BEHAVIOR RECOGNITION FOR THREAT ANALYSIS A conventional approach to maritime asset protection is to set up a defense perimeter around a high-value asset. However, this is a good approach is a crowded riverine location where enemy could be performing coordinated hostile activity? In an ONR-funded applied research program, and in cooperation with the Naval Research Laboratory, we investigated such questions and demonstrated that algorithms that learn to detect subtle changes in expected behaviors and intents of agents are better at detecting threats and reducing false alarms than perimeter-defense algorithms. We demonstrated the effectiveness of our algorithms on scenarios where multiple sentry unmanned sea surface vehicles (USSVs) protect a high-value maritime asset against multiple attackers. We published our findings in three peer-reviewed conference proceedings; IEEE, SPIE, & FLAIRS. Keywords/Captions: Applied Research, Publications, Behavior Analysis, Threat Detection, Learning Behavior Recognition for Threat Analysis Federated Architecture FEDERATED ARCHITECTURE FOR ANALYSIS OF SOCIO-CULTURAL CONTENT IN LANGUAGE Social elements in a conversation could reveal items of interest such as leadership and the power structure of members engaged in the conversation. Intelligence Advanced Projects Activity (IARPA) ran a basic research program where five leading research teams developed systems that could learn to analyze such conversations to detect power structures and influences. One question was how can the outputs of multiple systems be merged and presented in an intuitive way for intelligence analysts? We responded to this technical challenge by developing the SCIL Test and Evaluation Platform (STEP), a service-oriented architecture for federated rea-
5 soning systems that included a decision-merging algorithm. We also delivered a web user interface (UI) for intelligence analysts to visualize member relationships and access the decision justifications in a web browser. STEP, along with its UI was successfully used by the IARPA program to showcase the effectiveness and the utility of innovative S&T products of its research program. Another question we answered was can test data for such complex interpretive tasks can be cost effectively gathered using a crowdsourcing approach? We ran a series of investigative experiments to confirm that, indeed, a crowdsourcing approach can be used to reliably prepare test data for such tasks in much larger scales, in weeks as opposed to months and at a fraction of the cost it takes to prepare such data manually using in-house subject matter experts. Keywords/Captions: Government R&D program support, Applied Research, Federated Decision Support System, Intelligence Analysis, Crowdsourcing, Science & Technology showcase, Testbeds. Federated Architecture INTERACTIVE DATA MAPPING Some government agencies such as USTRANSCOM must efficiently and accurately broker data between their vendors and customers. This is challenging when vendors and customers subscribe to non-standard and different database schemata. Our client, CDM Technology Inc, now Tapestry Solutions Inc., approached us for a technological solution to reduce the effort in maintaining schema mappings and improve data quality. We delivered a robust and powerful AI symbol and semantic matching technology to support schema mapping, which CDM embedded in their tool, called IMT, and evaluated at USTRANSCOM. We showed that with IMT TRANSCOM would save over 1 person year to improve the data quality. Keywords/Captions: Applied Research, Automated Schema Mapping, Embedded Algorithms ADMINISTRATIVE INFORMATION MANAGEMENT SYSTEM (AIMS) Administrative processes in an organization can span long periods of time and multiple divisions, leading to poor service, errors, and unacceptably long delays. We are re-engineering and overhauling our client s administrative processes to dramatically improve their service quality and process transparency. To support this objective, we have developed and deployed AIMS, a powerful enterprise process engine, to the Information Technology Division of the Naval Research Laboratory to automate their administrative processes. Over 130 users are using it to perform tasks such as process funding documents and reporting scientific project accomplishments. With AIMS, we have dramatically reduced the number of data errors the associated duplicate work, and, at the same time, improved the quality of collected data. Keywords/Captions: Business Process Re-Engineering, Enterprise System, Administrative information. Interactive Data Mapping Administrative Information Management System (AIMS)
6 MARKETS AND CUSTOMERS NAVAL RESEARCH LABORATORY» Code 5510 (Navy Center for Applied Research in Artificial Intelligence)» Code 5501 (Information Technology Division) OFFICE OF NAVAL RESEARCH (ONR)» Code 341 (Human and Bio-Engineering Systems)» Code 311 (Image Analysis and Understanding Program)» Code 32 (Ocean & Battlespace Sensing) Defense Advanced Research Projects Agency (DARPA) (Defense Sciences Office) Intelligence Advanced Research Projects Activity (IARPA) (Incisive Analysis) Tapestry Solutions Inc. a Boeing Company COMPANY PROFILE Knexus Research Corp. is a privately owned company dedicated to providing intelligent systems R&D services to the government and private sectors. Our offices are located in Springfield, Virginia and National Harbor, Maryland. Dr. Kalyan Moy Gupta, an intelligent systems researcher and information technology services professional with over two decades of experience, founded Knexus Research in Since then, it has grown to 10 full-time and 1 part-time employees. Our employees hold advanced degrees (3 PhDs, 5 Masters, and 3 Bachelors) in computer and information science, business, and engineering. Their professional experience ranges from 2-25 years. ACCOMPLISHMENTS & AWARDS Our members specialize in a variety of AI topics such as goal-directed autonomy, communicative autonomy, spatial reasoning and cognition, natural language understanding, information extraction and knowledge discovery, autonomous planning, transfer learning, relational pattern learning, and object classification.» Within a short span of 7 years, along with our clients, we have pioneered the research on many of these topics, and published over 30 articles in leading journals (e.g., the Journal of Machine Learning Research and the Journal of Information Technology and Web Engineering) and peer reviewed conferences (e.g., AAAI & ICCBR).» We have received two Best Research Paper Awards. We received the Best Overall AI Video award in the International Joint Conference on AI in 2009.» For IARPA, we integrated state-of-the-art question answering algorithms from three performer teams into a next-generation Intelligent Question Answering (INQA) system for Intelligence Analysts which was demonstrated to the US Congress.
7 MANAGEMENT KALYAN MOY GUPTA, PHD, FOUNDER & PRESIDENT Kalyan Gupta is an AI Scientist and Entrepreneur with over 20 years of innovation and product development experience. A veteran of two startups, Dr. Gupta acquires funds, leads and conducts intelligent systems research to develop advanced software prototypes and transition them into commercially viable intelligent systems. He has pioneered artificial intelligence (AI) techniques on a wide range of topics such as communicative autonomy, spatial reasoning, anomaly detection, relational learning, information extraction, conversational case-based reasoning, natural language processing, and knowledge management. He has developed intelligent systems applications for activity and threat recognition, multimodal interaction with virtual agents, adaptive web-service brokering, communications prioritization, and conversational diagnosis. Dr. Gupta has over forty publications in reputed journals and peer reviewed conferences on these topics. He has four published patents and two more are pending. Dr. Gupta has lead or contributed to the development of nineteen scientific and research prototypes and six products. Products from his efforts are in use in manufacturing companies such as DuPont, Bombardier, Information Extraction companies such as Cymfony, Inc. and decision support companies such as Tapestry Solutions. He has a Ph.D. in Business Administration from McMaster University, Canada and a Masters Degree in Industrial Engineering from Indian Institute of Technology, Kharagpur, India. MEMBERSHIPS» Association of Computing Machinery» American Association of Artificial Intelligence» Cognitive Science Society» National Defense Industry Association ACCOUNTING SYSTEM» DCCA Approved SECURITY» Facilities Cleared at Secret level
8 Contact Information Kalyan Moy Gupta, PhD President 163 Waterfront Street, Suite 440, National Harbor, MD Ph: x700 KNEXUS RESEARCH Kalyan Moy Gupta, PhD, President 163 Waterfront St., Suite 440, National Harbor, MD x700
The Future of Mobile Robots In 2020, 26 Million Mobile Robots Will Enable Autonomy in Smart Factories, Unmanned Transportation, and Connected Homes
The Future of Mobile Robots In 2020, 26 Million Mobile Robots Will Enable Autonomy in Smart Factories, Unmanned Transportation, and Connected Homes NE5C-MT January 2015 NE5C-MT 1 Contents Section Slide
More informationSatCom For Net-Centric Warfare July/August 2011. MilsatMagazine
SatCom For Net-Centric Warfare July/August 2011 MilsatMagazine Emergency Communications C-COM, Hughes Boeing GPS II-F IvySys Technologies Command Center Guardian Mobility idirect Government Technologies
More informationDetect, Contain and Control Cyberthreats
A SANS Whitepaper Written by Eric Cole, PhD June 2015 Sponsored by Raytheon Websense 2015 SANS Institute Introduction Dwell Time Relates to damage because the longer a system is compromised, the bigger
More informationProject abstracts (not edited) of winners of Phase 1 of the SBRI call on Adaptive Autonomous Ocean Sampling Networks
Project abstracts (not edited) of winners of Phase 1 of the SBRI call on Adaptive Autonomous Ocean Sampling Networks NOC-DSTL-Innovate UK SBRI team Version 1: 01.04.2015 SBRI NOC-AAOSN-205 - Extending
More informationContents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions
Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces
More informationAppendices master s degree programme Artificial Intelligence 2014-2015
Appendices master s degree programme Artificial Intelligence 2014-2015 Appendix I Teaching outcomes of the degree programme (art. 1.3) 1. The master demonstrates knowledge, understanding and the ability
More informationPROPOSED BACHELOR OF SCIENCE DEGREE IN COMPUTER ENGINEERING
Shepherd University Board of Governors Meeting of April 13, 2006 Agenda Item No. 3 PROPOSED BACHELOR OF SCIENCE DEGREE IN COMPUTER ENGINEERING A new Bachelor of Science Degree in Computer Engineering is
More informationBachelor Degree in Informatics Engineering Master courses
Bachelor Degree in Informatics Engineering Master courses Donostia School of Informatics The University of the Basque Country, UPV/EHU For more information: Universidad del País Vasco / Euskal Herriko
More informationMichael E. Cleary. Curriculum Vitae. Charles Stark Draper Laboratory 555 Technology Square, M/S 3F Cambridge, MA 02139 617-258-2032 mcleary@draper.
Michael E. Cleary Curriculum Vitae Charles Stark Draper Laboratory 555 Technology Square, M/S 3F Cambridge, MA 02139 617-258-2032 mcleary@draper.com Educational History Ph.D. Received September 1997, in
More informationPanel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
More informationHow In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time
SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first
More informationImportant dimensions of knowledge Knowledge is a firm asset: Knowledge has different forms Knowledge has a location Knowledge is situational Wisdom:
Southern Company Electricity Generators uses Content Management System (CMS). Important dimensions of knowledge: Knowledge is a firm asset: Intangible. Creation of knowledge from data, information, requires
More informationProfessor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia
Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia As of today, the issue of Big Data processing is still of high importance. Data flow is increasingly growing. Processing methods
More informationThe Big Data methodology in computer vision systems
The Big Data methodology in computer vision systems Popov S.B. Samara State Aerospace University, Image Processing Systems Institute, Russian Academy of Sciences Abstract. I consider the advantages of
More informationAchieving Workforce Optimization: Merging Strategy and Technology
Achieving Workforce Optimization: Merging Strategy and Technology The healthcare industry is experiencing unprecedented change, and leaders are facing some of the most difficult challenges in the history
More informationYour Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.
INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing
More informationMaster of Artificial Intelligence
Faculty of Engineering Faculty of Science Master of Artificial Intelligence Options: Engineering and Computer Science (ECS) Speech and Language Technology (SLT) Cognitive Science (CS) K.U.Leuven Masters.
More informationA Cognitive Approach to Vision for a Mobile Robot
A Cognitive Approach to Vision for a Mobile Robot D. Paul Benjamin Christopher Funk Pace University, 1 Pace Plaza, New York, New York 10038, 212-346-1012 benjamin@pace.edu Damian Lyons Fordham University,
More information01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
More informationConcept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
More informationMaritime Threat Detection Using Probabilistic Graphical Models
Proceedings of the Twenty-Fifth International Florida Artificial Intelligence Research Society Conference Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander 1, Kalyan Moy Gupta
More informationIncrease Software Development Productivity:
Increase Software Development Productivity: Equations for Efficiency By Adam Kolawa, Parasoft Co-Founder and CEO Why Productivity Matters In today s economy, software development is a great expense for
More informationEnsighten Data Layer (EDL) The Missing Link in Data Management
The Missing Link in Data Management Introduction Digital properties are a nexus of customer centric data from multiple vectors and sources. This is a wealthy source of business-relevant data that can be
More informationInternship Opportunities Xerox Research Centre India (XRCI), Bangalore Analytics Research Group
Analytics Research Group The Analytics Research Group in Xerox Research Centre India (XRCI) is seeking bright Undergraduate, Masters and PhD students for research internships to participate in exciting
More informationNiara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning
Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments
More informationTools for Managing and Measuring the Value of Big Data Projects
Tools for Managing and Measuring the Value of Big Data Projects Abstract Big Data and analytics focused projects have undetermined scope and changing requirements at their core. There is high risk of loss
More informationDivision of Information Technology. Strategic Plan 2012 THE GEORGE WASHINGTON UNIVERSITY
Division of Information Technology Strategic Plan 2012 THE GEORGE WASHINGTON UNIVERSITY 1 FROM THE CHIEF INFORMATION OFFICER FROM THE CHIEF INFORMATION OFFICER Dear Colleagues, The George Washington University
More informationArtificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci
1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks
More informationKEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE
KEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE RAMONA-MIHAELA MATEI Ph.D. student, Academy of Economic Studies, Bucharest, Romania ramona.matei1982@gmail.com Abstract In this rapidly
More informationThe Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
More informationHow To Become A Data Scientist
Programme Specification Awarding Body/Institution Teaching Institution Queen Mary, University of London Queen Mary, University of London Name of Final Award and Programme Title Master of Science (MSc)
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationApplying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15
Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15 GENIVI is a registered trademark of the GENIVI Alliance in the USA and other countries Copyright GENIVI Alliance
More informationMaster Data Management Drivers: Fantasy, Reality and Quality
Solutions for Customer Intelligence, Communications and Care. Master Data Management Drivers: Fantasy, Reality and Quality A Review and Classification of Potential Benefits of Implementing Master Data
More informationHuman Dimension in Cyber Operations Research and Development Priorities
Human Dimension in Cyber Operations Research and Development Priorities Chris Forsythe a, Austin Silva a, Susan Stevens-Adams a, Jeffrey Bradshaw b a Sandia National Laboratories, Albuquerque, NM, USA,
More informationMalay A. Dalal Madhav Erraguntla Perakath Benjamin. Knowledge Based Systems, Inc. (KBSI) College Station, TX 77840, U.S.A.
AN INTRODUCTION TO USING PROSIM FOR BUSINESS PROCESS SIMULATION AND ANALYSIS Malay A. Dalal Madhav Erraguntla Perakath Benjamin Knowledge Based Systems, Inc. (KBSI) College Station, TX 77840, U.S.A. ABSTRACT
More informationPANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA
PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA Panel Chair: Dr. Susan M. Bridges, Mississippi State University Panelists: Dr. Blaine W. Burnham, Georgia Tech Dr. Dipankar Dasgupta,
More informationState of the Art Observations: Maritime Information Systems
State of the Art Observations: Maritime Information Systems Global Maritime Information Sharing Symposium Baltimore, MD 14-16 SEP 2010 John Mittleman, PhD Naval Research Laboratory Washington DC Where
More informationIAI/Malat Solutions for the Maritime Arena
IAI/Malat Solutions for the Maritime Arena Any country with a proximity to the sea has an important operational need to positively and unambiguously identify, in time, threats that originate in the maritime
More informationGraduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina
Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures
More informationMaking critical connections: predictive analytics in government
Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse
More informationVisualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC
Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, jfeasel@t-sciences.com Technical POC: George Romas, gromas@t-sciences.com
More informationPresented By: Leah R. Smith, PMP. Ju ly, 2 011
Presented By: Leah R. Smith, PMP Ju ly, 2 011 Business Intelligence is commonly defined as "the process of analyzing large amounts of corporate data, usually stored in large scale databases (such as a
More informationApplications of Deep Learning to the GEOINT mission. June 2015
Applications of Deep Learning to the GEOINT mission June 2015 Overview Motivation Deep Learning Recap GEOINT applications: Imagery exploitation OSINT exploitation Geospatial and activity based analytics
More informationIntegrating Enterprise Reporting Seamlessly Using Actuate Web Services API
Any User. Any Data. Any Deployment. Technical White Paper Integrating Enterprise Reporting Seamlessly Using Actuate Web Services API How Web Services Can Be Used to Perform Fast, Efficient, Future-Proof
More informationDr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory. The Nation s Premier Laboratory for Land Forces UNCLASSIFIED
Dr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory 21 st Century Research Continuum Theory Theory embodied in computation Hypotheses tested through experiment SCIENTIFIC METHODS
More informationWHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective
WHITE PAPER OCTOBER 2014 Unified Monitoring A Business Perspective 2 WHITE PAPER: UNIFIED MONITORING ca.com Table of Contents Introduction 3 Section 1: Today s Emerging Computing Environments 4 Section
More informationSMAL BUSINESS INNOVATIVE RESEARCH
POSITION STATEMENT SMAL BUSINESS INNOVATIVE RESEARCH Adopted by the IEEE-USA Board of Directors, 18 Sept. 2014 The Small Business Innovation Research (SBIR) and related Small Business Technology Transfer
More informationDoctoral Programs. the globally networked management school
Doctoral Programs the globally networked management school Accreditation Accreditation is the review of the quality of higher education institutions and programs. Why is accreditation important? It is
More informationUSING SECURITY METRICS TO ASSESS RISK MANAGEMENT CAPABILITIES
Christina Kormos National Agency Phone: (410)854-6094 Fax: (410)854-4661 ckormos@radium.ncsc.mil Lisa A. Gallagher (POC) Arca Systems, Inc. Phone: (410)309-1780 Fax: (410)309-1781 gallagher@arca.com USING
More informationTITUS Data Security for Cloud Email Identify and Control Sensitive Data Sent to the Cloud
Business Brief TITUS Data Security for Cloud Email Identify and Control Sensitive Data Sent to the Cloud Nine out of 10 businesses cite security as the top obstacle for cloud adoption. - IDC Control Data
More informationMichael W. Floyd. Education
Michael W. Floyd Education Carleton University, Ottawa, Canada Ph.D., Electrical and Computer Engineering (2013), Supervisor: Prof. Babak Esfandiari Medal for Outstanding Academic Achievement (awarded
More informationPALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
More informationAn Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
More informationGSAW 98. COTS AI Technologies for Satellite Control
GSAW 98 COTS AI Technologies for Satellite Control Capt Steve Lindsay Satellite Autonomy Program Lead Air Force Research Laboratory lindsays@plk.af.mil 505/853-4140 (DSN 263) Overview Position: identifying
More informationIntroduction to SOA governance and service lifecycle management.
-oriented architecture White paper March 2009 Introduction to SOA governance and Best practices for development and deployment Bill Brown, executive IT architect, worldwide SOA governance SGMM lead, SOA
More informationGian Luca Sacco Marketing Director South & Central Europe. Smarter decisions, better products.
Gian Luca Sacco Marketing Director South & Central Europe Smarter decisions, better products Smarter decisions, better products. Today s Product Challenges are More Difficult Than Ever Before Landing on
More informationBusiness Process Services. White Paper. Improving Efficiency in Business Process Services through User Interface Re-engineering
Business Process Services White Paper Improving Efficiency in Business Process Services through User Interface Re-engineering About the Authors Mahesh Kshirsagar Mahesh has a vast experience of about 24
More informationPROP OSAL FOR A GRA DUA TE CE RTIFIC ATE P ROG RAM IN COGNITIVE SCIENCE AT THE UNIVERSITY OF MASSACH USETTS/AMHE RST
PROPOSAL FOR A GRADUATE CERTIFICATE PROGRAM IN COGNITIVE SCIENCE AT THE UNIVERSITY OF MASSACHUSETTS/AMHERST May 30, 2000 (errors corrected and amendments added December 3, 2000, and May 23, 2001) Proposing
More informationInvenio: A Modern Digital Library for Grey Literature
Invenio: A Modern Digital Library for Grey Literature Jérôme Caffaro, CERN Samuele Kaplun, CERN November 25, 2010 Abstract Grey literature has historically played a key role for researchers in the field
More informationSystem Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
More informationApplying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
More information3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
More informationVisual Interfaces for the Development of Event-based Web Agents in the IRobot System
Visual Interfaces for the Development of Event-based Web Agents in the IRobot System Liangyou Chen ACM Member chen_liangyou@yahoo.com Abstract. Timely integration and analysis of information from the World-Wide
More informationHow To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
More informationInformation and Understanding (IFU) Overview
Information and Understanding (IFU) Overview Jun 8 th, 2010 Mark Pronobis IFU CTC Lead AFRL/RIEF mark.pronobis@rl.af.mil Approved for Public Release; Distribution Unlimited: 88ABW-2010-2619 dated 13 May
More informationPosition Title: Business Development Manager (BDM) Department: Business Development. Reports to: Vice President, Business Development
Position Title: Business Development Manager (BDM) Department: Business Development Reports to: Vice President, Business Development Overall Responsibilities The Business Development Manager is responsible
More informationBest Practices to Improve Breach Readiness
Best Practices to Improve Breach Readiness Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC http://blog.emc2.de/trust-security @RobtWesGriffin 1 Security Breaches 2 Security
More informationWMD Incident Management Simulation and Tutor
WMD Incident Management Simulation and Tutor NIEHS 30 March 2007 Presented by: Jim Ong ong@stottlerhenke.com 650 931 2710 http://www.stottlerhenke.com Project Team Stottler Henke - Artificial intelligence
More informationLASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
More informationSenior Business Intelligence/Engineering Analyst
We are very interested in urgently hiring 3-4 current or recently graduated Computer Science graduate and/or undergraduate students and/or double majors. NetworkofOne is an online video content fund. We
More informationOpportunities for Joint International Doctoral Candidates in Law, Science and Technology at the University of Pittsburgh Intelligent Systems Program
Opportunities for Joint International Doctoral Candidates in Law, Science and Technology at the University of Pittsburgh Intelligent Systems Program Kevin Ashley Professor of Law and Intelligent Systems
More informationVertafore Analytics: Turning Raw Data Into Revenue A CASE STUDY
Vertafore Analytics: Turning Raw Data Into Revenue A CASE STUDY Summary OPPORTUNITY Turn raw data into an analytics product Overview When Vertafore wanted to turn raw data into Vertafore Analytics an intelligence
More informationPIVOTAL CRM. CRM that does what you want it to do BROCHURE
PIVOTAL CRM CRM that does what you want it to do BROCHURE THE PIVOTAL CRM PHILOSOPHY THE PIVOTAL ADVANTAGE Today s business world is a fast moving and dynamic environment one in which your teams expect
More informationWHITE PAPER. Build or Buy. Assessing the Gaps, Risks & Opportunites
Build or Buy Assessing the Gaps, Risks & Opportunites Introduction Companies today face a significant challenge in growing sales and squeezing out more margin across multiple sales and distribution channels,
More informationMEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
More informationScalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens
Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many
More informationII. TOPIC DESCRIPTION
Special Notice N00014-16-R-SN02 Special Program Announcement for 2016 Office of Naval Research Research Opportunity: Undersea Technologies for Autonomous Detection and Communications I. INTRODUCTION This
More informationWindows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
More informationWhite Paper: SAS and Apache Hadoop For Government. Inside: Unlocking Higher Value From Business Analytics to Further the Mission
White Paper: SAS and Apache Hadoop For Government Unlocking Higher Value From Business Analytics to Further the Mission Inside: Using SAS and Hadoop Together Design Considerations for Your SAS and Hadoop
More informationCRM Solutions. Banking Sector
CRM Solutions Banking Sector BY COMMUNICATION PROGRESS Agenda Changing Sales/Marketing Trends Distinct Markets Banks Strategic Goals Introduction to CRM CRM as a Business Strategy Design an effective segmentation
More informationUsing Data Mining to Detect Insurance Fraud
IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts
More informationCreate Operational Flexibility with Cost-Effective Cloud Computing
IBM Sales and Distribution White paper Create Operational Flexibility with Cost-Effective Cloud Computing Chemicals and petroleum 2 Create Operational Flexibility with Cost-Effective Cloud Computing Executive
More informationUNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES. Approved by SBA General Faculty (April 2012)
UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES Approved by SBA General Faculty (April 2012) Introduction In 1926, we embarked on a noble experiment the creation
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Background The command over cloud computing infrastructure is increasing with the growing demands of IT infrastructure during the changed business scenario of the 21 st Century.
More informationMaking Business Intelligence Relevant for Mid-sized Companies. Improving Business Results through Performance Management
Making Business Intelligence Relevant for Mid-sized Companies Improving Business Results through Performance Management mydials Inc. 2009 www.mydials.com - 1 Contents Contents... 2 Executive Summary...
More informationEthar Ibrahim Elsaka
ethar.elsaka@gmail.com 9348 Cherry Hill Rd., Apt 621 College Park MD, 20740 USA Tel: 240 581 2664 Ethar Ibrahim Elsaka Education PhD Student, Department of Computer Science, University of Maryland at College
More informationMaritime Threat Detection using Plan Recognition
Maritime Threat Detection using Plan Recognition Bryan Auslander 1, Kalyan Moy Gupta 1, & David W. Aha 2 1 Knexus Research Corp.; 163 Waterfront Street; National Harbor, MD 20745 2 Navy Center for Applied
More informationPreempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 info@coresecurity.com www.coresecurity.com blog.coresecurity.com Preempting
More informationThe Three Lenses ORGANIZATION. Managerial Psychology Fall, 2006 John S. Carroll. Strategic Design Lens. Political Lens.
The Three Lenses Strategic Design Lens Managerial Psychology Fall, 2006 John S. Carroll Political Lens ORGANIZATION Cultural Lens Goals For Today Introduce the idea that organizations are a context for
More informationSymantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
More informationHow To Understand The Power Of Decision Science In Insurance
INFINILYTICS, INC. NEXT GENERATION DECISION SCIENCE FOR the INSURANCE INDUSTRY Whitepaper series: Big Data, Data Science, Fact-based Decisions, Machine Learning and Advanced Analytics: An Introduction
More informationContinuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
More informationTurning Strategic Insight Into Business Impact
Turning Strategic Insight Into Business Impact VMware Accelerate Advisory Services Identify Opportunities and Create Strategies for the Journey to IT as a Service No longer relegated to simply keeping
More informationCYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
More informationEngineering and Applied Science Programs for Professionals
Engineering and Applied Science Programs for Professionals Allan W. Bjerkaas The Engineering and Applied Science Programs for Professionals (EPP), a part of the Whiting School of Engineering, has the mission
More informationService Oriented Architecture (SOA) An Introduction
Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages
More informationMEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
More informationCENTRE FOR MARITIME RESEARCH AND EXPERIMENTATION
CENTRE FOR MARITIME RESEARCH AND EXPERIMENTATION Gabriel Grenon, Dr.Alain Maguer Per Arne Sletner Head, Autonomous Unmanned Vehicles Section Dronitaly Slide 1 Mission CMRE organises and conducts scientific
More information