Syracuse University
Electrical Engineering & Computer Science
Grove Karl Gilbert (1843-1918) was one of the most distinguished American geologists. He spent his career entirely in Government service. Gilbert joined the U.S. Geological Survey on its founding in 1879 and served as its first Chief... more
In this paper, we describe new methods for the simulation, measurement and representation of sEMG signals. With regard to simulation, we choose a 2-D state space model and suggest a 3-D model which can account for in-homogeneities,... more
Reasoning about social networks (labeled, directed, weighted graphs) is be- coming increasingly important and there are now models of how certain phenomena (e.g. adoption of products/services by consumers, spread of a given disease) \di... more
There are many applications where we observe various phenomena in space (e.g. locations of victims of a serial killer), and where we want to infer \partner" locations (e.g. the location where the killer lives) that are geospatially... more
The analytical software tools of the future will radically change intelligence analysis. Currently, the research community is utilizing the expertise of both social and computer scientists to produce these tools. Computer software... more
On June 17th, 2010, security researchers at a small Belarusian firm known as VirusBlockAda identified malicious software (malware) that infected USB memory sticks.1 In the months that followed, there was a flurry of activity in the... more
We designed the common sense analytical framework introduced in this article to help staff planners better determine locations on the ground where caches can be found. In each of our vignettes, the unit leveraged this information... more
In this paper we introduce SCARE - the Spatial Cultural Abductive Reasoning Engine which solves spatial abduction problems (Shakarian, Subrahmanian, and Sapino 2009). We review results of SCARE for activities by Iranian-sponsored... more
Geospatial abduction problems (GAPs) involve the inference of a set of locations that "best explain" a given set of locations of observations. For example, the observations might include locations where a serial killer committed murders... more
The mobile workforce is rapidly increasing, and technological advances make it feasible for these workers to have ubiquitous access to a variety of resources with various protection requirements. The dynamic computing environment of these... more
In evolutionary graph theory biologists study the problem of determining the probability that a small number of mutants overtake a population that is structured on a weighted, possibly directed graph. Currently Monte Carlo simulations are... more
Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons caches supporting road-side bomb attacks on your country’s troops. Or imagine yourself as a public health expert trying to identify the... more
In August 2008, the Russian Army invaded georgia. numerous, coordinated cyber attacks accompanied the military campaign. this represents the first instance of a large-scale computer network attack (CNA) conducted in tandem with major... more
In a "tipping" model, each node in a social network, representing an individual, adopts a behavior if a certain number of his incoming neighbors previously held that property. A key problem for viral marketers is to determine an initial... more