Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Georgiy Levchuk"'
Autor:
Louis Penafiel, Georgiy Levchuk
Publikováno v:
Signal Processing, Sensor/Information Fusion, and Target Recognition XXX.
Trajectory data has numerous commercial applications, e.g., location-based services, travel forecasting, health monitoring, land use analysis, urban planning, and robotics. However, traditional trajectory mining algorithms do not explain how and why
Publikováno v:
Disruptive Technologies in Information Sciences V.
In both military and commercial domains, tasks are increasingly entrusted to autonomous systems and robots. These artificial intelligence (AI) systems are expected to be safe and intelligent, adapt to changing environments, and interact with other ac
Publikováno v:
AAAI Spring Symposia
The Internet of things (IoT), from heart monitoring implants to home-heating control systems, is becoming integral to our daily lives. We expect the technologies that comprise IoT to become smarter; to autonomously reason, act, and communicate with o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0dd1de6853e90397ab7bc17f4abf3b31
https://doi.org/10.1016/b978-0-12-817636-8.00004-1
https://doi.org/10.1016/b978-0-12-817636-8.00004-1
Autor:
Daniel Serfaty, Krishna R. Pattipati, Georgiy Levchuk, Adam Fouse, Robert McCormack, Nathan Schurr
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030110505
IHSI
IHSI
Future hybrid human-machine teams will need to optimize their performance in uncertain environments by adapting their team structure. To address this need, we have developed a framework based on minimization of variational free energy, an information
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::936ebb51291cdf2be16e0d8f072f5089
https://doi.org/10.1007/978-3-030-11051-2_71
https://doi.org/10.1007/978-3-030-11051-2_71
Autor:
John Colonna-Romano, Georgiy Levchuk
Publikováno v:
Signal Processing, Sensor/Information Fusion, and Target Recognition XXVII.
In this paper, we study two methods to optimize distributed collaborative computations: (a) data partitioning, which exploits locality to reduce data dependencies between local computations, and (b) computation aggregation, which reduces communicatio
Publikováno v:
Next-Generation Analyst VI.
Many novel DoD missions, from disaster relief to cyber reconnaissance, require teams of humans and machines with diverse capabilities and intelligence. To succeed, DoD planners organize available personnel and technologies into mission-based teams an
Publikováno v:
Disruptive Technologies in Information Sciences.
In the last several years, the volume and diversity of cyber attacks on the U.S. commercial and government networks have increased dramatically, including malware, web attacks (e.g., drive-by downloads), zero-day exploits, and men in the middle (e.g.
Publikováno v:
IEEE BigData
Data from cyber logs can often be represented as a bipartite graph (e.g. internal IP-external IP, user-application, or client-server). State-of-the-art graph based anomaly detection often generalizes across all types of graphs — namely bipartite an
Publikováno v:
IEEE BigData
Graph analysis can capture relationships between network entities and can be used to identify and rank anomalous hosts, users, or applications from various types of cyber logs. It is often the case that the data in the logs can be represented as a bi
When an Intelligence Surveillance and Reconnaissance (ISR) pilot encounters an object of interest that seems to be unexpected with respect to the ATO, the Air Force has standard procedures for coordinating a complex Offensive Team to assist in identi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b1c4eb8c24f91cc840ddd415cf6d826f
https://doi.org/10.1201/9781315587387-17
https://doi.org/10.1201/9781315587387-17