This work presents a data visualization technique that combines graph-based topology representation and dimensionality reduction methods to visualize the intrinsic data structure in a low-dimensional vector space. The application of graphs in clustering and visualization has several advantages. A graph of important edges (where edges characterize relations and weights represent similarities or distances) provides a compact representation of the entire complex data set. This text describes clustering and visualization methods that are able to utilize information hidden in these graphs, based...
This work presents a data visualization technique that combines graph-based topology representation and dimensionality reduction methods to visualize ...
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mob...
This brief provides methods for harnessing Twitter data to discover solutions to complex inquiries. The brief introduces the process of collecting data through Twitter's APIs and offers strategies for curating large datasets. The text gives examples of Twitter data with real-world examples, the present challenges and complexities of building visual analytic tools, and the best strategies to address these issues. Examples demonstrate how powerful measures can be computed using various Twitter data sources. Due to its openness in sharing data, Twitter is a prime example of social media in which...
This brief provides methods for harnessing Twitter data to discover solutions to complex inquiries. The brief introduces the process of collecting dat...
A new unsupervised approach to the problem of Information Extraction by Text Segmentation (IETS) is proposed, implemented and evaluated herein. The authors' approach relies on information available on pre-existing data to learn how to associate segments in the input string with attributes of a given domain relying on a very effective set of content-based features. The effectiveness of the content-based features is also exploited to directly learn from test data structure-based features, with no previous human-driven training, a feature unique to the presented approach. Based on the...
A new unsupervised approach to the problem of Information Extraction by Text Segmentation (IETS) is proposed, implemented and evaluated herein. The...
This book looks at the convergent nature of technology and its relationship to the field of photogrammetry and 3D design. This is a facet of a broader discussion of the nature of technology itself and the relationship of technology to art, as well as an examination of the educational process. In the field of technology-influenced design-based education it is natural to push for advanced technology, yet within a larger institution the constraints of budget and adherence to tradition must be accepted. These opposing forces create a natural balance; in some cases constraints lead to greater...
This book looks at the convergent nature of technology and its relationship to the field of photogrammetry and 3D design. This is a facet of a broader...
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to...
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the...
This book investigates key security issues in connection with the physical layer for random wireless cellular networks. By examining recently introduced security techniques for wireless point-to-point communications, the book proposes new solutions to physical layer security based on stochastic geometric frameworks for random cellular networks.
This book investigates key security issues in connection with the physical layer for random wireless cellular networks. By examining recently introduc...
This brief explores two of the main challenges of spatial network data analysis: the many connected components in the spatial network and the many candidates that have to be processed. Within this book, these challenges are conceptualized, well-defined problems are explored, and critical techniques are discussed.The process of summarizing spatial network data entails finding a compact description or representation of observations or activities on large spatial or spatiotemporal networks. However, summarizing spatial network data can be computationally challenging for various reasons,...
This brief explores two of the main challenges of spatial network data analysis: the many connected components in the spatial network and the many can...
And what are the most prominent solution paradigms for the different types? Overall, this book saves a great deal of time for everyone pursuing research in the area of automated software composition who needs a comprehensive guide that helps them understand the field, and that relates new approaches to existing ones.
And what are the most prominent solution paradigms for the different types? Overall, this book saves a great deal of time for everyone pursuing resear...
This work examines the challenges of distributed map merging and localization in multi-robot systems, which enables robots to acquire the knowledge of their surroundings needed to carry out coordinated tasks. After identifying the main issues associated with this problem, each chapter introduces a different distributed strategy for solving them.
In addition to presenting a review of distributed algorithms for perception in localization and map merging, the text also provides the reader with the necessary tools for proposing new solutions to problems of multi-robot perception, as...
This work examines the challenges of distributed map merging and localization in multi-robot systems, which enables robots to acquire the knowledge...