Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty Publications

2013

Discipline
Institution
Keyword

Articles 91 - 93 of 93

Full-Text Articles in Physical Sciences and Mathematics

The Road To Deterministic Matrices With The Restricted Isometry Property, Afonso S. Bandeira, Matthew C. Fickus, Dustin G. Mixon, Percy Wong Jan 2013

The Road To Deterministic Matrices With The Restricted Isometry Property, Afonso S. Bandeira, Matthew C. Fickus, Dustin G. Mixon, Percy Wong

Faculty Publications

The restricted isometry property (RIP) is a well-known matrix condition that provides state-of-the-art reconstruction guarantees for compressed sensing. While random matrices are known to satisfy this property with high probability, deterministic constructions have found less success. In this paper, we consider various techniques for demonstrating RIP deterministically, some popular and some novel, and we evaluate their performance. In evaluating some techniques, we apply random matrix theory and inadvertently find a simple alternative proof that certain random matrices are RIP. Later, we propose a particular class of matrices as candidates for being RIP, namely, equiangular tight frames (ETFs). Using the known …


Ensemble Forecasting Of Coronal Mass Ejections Using The Wsa-Enlil With Coned Model, D. Emmons, Ariel O. Acebal, A. Pulkkinen, A. Taktakishvili, Peter Macneice, D. Odstrcil Jan 2013

Ensemble Forecasting Of Coronal Mass Ejections Using The Wsa-Enlil With Coned Model, D. Emmons, Ariel O. Acebal, A. Pulkkinen, A. Taktakishvili, Peter Macneice, D. Odstrcil

Faculty Publications

The combination of the Wang‐Sheeley‐Arge (WSA) coronal model, ENLIL heliospherical model version 2.7, and CONED Model version 1.3 (WSA‐ENLIL with CONED Model) was employed to form ensemble forecasts for 15 halo coronal mass ejections (halo CMEs). The input parameter distributions were formed from 100 sets of CME cone parameters derived from the CONED Model. The CONED Model used image processing along with the bootstrap approach to automatically calculate cone parameter distributions from SOHO/LASCO imagery based on techniques described by Pulkkinen et al. (2010). The input parameter distributions were used as input to WSA‐ENLIL to calculate the temporal evolution of the …


Insider Threat Detection Using Virtual Machine Introspection, M. Crawford, Gilbert L. Peterson, Robert F. Mills, Michael R. Grimaila Jan 2013

Insider Threat Detection Using Virtual Machine Introspection, M. Crawford, Gilbert L. Peterson, Robert F. Mills, Michael R. Grimaila

Faculty Publications

This paper presents a methodology for signaling potentially malicious insider behavior using virtual machine introspection (VMI). VMI provides a novel means to detect potential malicious insiders because the introspection tools remain transparent and inaccessible to the guest and are extremely difficult to subvert. This research develops a four step methodology for development and validation of malicious insider threat alerting using VMI. A malicious attacker taxonomy is used to decompose each scenario to aid identification of observables for monitoring for potentially malicious actions. The effectiveness of the identified observables is validated using two data sets. Results of the research show the …