Information & computer science publications
-
Efficiently Gap-Filling Reaction Networks
We present a computational technique, called FastGapFilling, that efficiently completes a reaction network by using only Linear Programming, not MILP.
-
PIDGIN: Privacy-Preserving Interest and Content Sharing in Opportunistic Networks
This paper addresses the research challenges inherent to the exchange of content and interests without compromising the privacy of subscribers, and allowing unauthorised access to untrusted brokers. Specifically, this paper…
-
The CHERI Capability Model: Revisiting RISC in an Age of Risk
Motivated by contemporary security challenges, we reevaluate and refine capability-based addressing for the RISC era. We present CHERI, a hybrid capability model that extends the 64-bit MIPS ISA with byte-granularity…
-
Constrained Optimal Selection for Multi-Sensor Robot Navigation Using Plug-and-Play Factor Graphs
This paper proposes a real-time navigation approach that is able to integrate many sensor types while fulfilling performance needs and system constraints.
-
Simplified VTS-Based I-Vector Extraction in Noise-Robust Speaker Recognition
In this work, we propose an efficient simplification scheme, named sVTS, in order to show that the VTS approach gives improvements in large scale applications compared to state-of-the-art systems.
-
Submodular Subset Selection for Large-Scale Speech Training Data
We address the problem of subselecting a large set of acoustic data to train automatic speech recognition (ASR) systems. To this end, we apply a novel data selection technique based…
-
Clock Synchronization on the RAX Spacecraft
The Radio Aurora Explorer (RAX) is a CubeSat that was developed to study space weather in Earth׳s ionosphere. Accuracy of the onboard clock is critical for processing the radar measurements.
-
Tripod Fall: Concept and Experiments of a Novel Approach to Humanoid Robot Fall Damage Reduction
This paper addresses a new control strategy to reduce the damage to a humanoid robot during a fall. Instead of following the traditional approach of finding a favorable configuration with…
-
Forensic Prescreening System Using Coded Aperture Snapshot Spectral Imager
We present a camera system for instantaneous, non-destructive capture of spectral signatures for forensic analysis. Our system detects highly probative samples in the forensic scene mixed by the multiple target…
-
Unscented Transform for iVector-Based Noisy Speaker Recognition
In this paper, it is proposed to substitute the first order VTS by an unscented transform, where unlike VTS, the nonlinear function is not applied over the clean model parameters…
-
Automatic Characterization of Speaking Styles in Educational Videos
We use crowd-sourcing to explore speaking style dimensions in online educational videos, and then propose techniques based solely on acoustic features for automatically identifying a subset of the dimensions.
-
The IEEE Symposium on Security and Privacy, in Retrospect
We focus on SSP’s evolution and its vital relevance to the research and development communities along its path from community gathering to premier security research meeting.