SlideShare una empresa de Scribd logo
1 de 29
Descargar para leer sin conexión
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Integrity  Service  Excellence
Complex Networks/
Foundations of
Information Systems
6 March 2013
Robert J. Bonneau, Ph.D.
Division Chief
AFOSR/RTC
DISTRIBUTION A: Approved for public release; distribution is unlimited.
NAME: Complex Networks/Foundations of Information Systems
BRIEF DESCRIPTION OF PORTFOLIO:
Complex Networks and Foundations of Information Systems uses measured information
to assure, manage, predict, and design distributed networks, systems, and architectures
2013 Spring Review
• Local Network Research: Guarantee and assure information transmission
• Network Management Research: Network and system protocols for resilient and
robust
• Global Network Research: Mathematically represent network performance and
design robustness
• Foundations of Information Systems Research: Measure, predict, and verify
information system properties
LIST SUB-AREAS IN PORTFOLIO:
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Goals:
• Measure system performance and calculate risk
• Preserve critical information structure and minimize latency over a
heterogeneous distributed network and system
• Ensure network and system robustness and resilience under a diverse set of
resource constraints and manage using dynamic models
• Represent global properties of a networked system in a unified
mathematical framework for architecture and design
• Assess and Predict heterogeneous distributed systems performance using
unified mathematical framework
Complex Networks &
Foundations of Information Systems
Foundations Goals Complex Networks Goals
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Complex Networks &
Foundations of Information Systems
Payoffs:
• Preserve critical information structure in a network rather than just delivering
packets or bits
• Quantify likelihood of a given network management policy to support critical
mission functions
• Predict and manage network and system failure comprehensively
• Assess and verify properties of a distributed heterogeneous system where
there is limited access to its elements
• Assess dynamic Air Force system mission performance and assess risk of
failure
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Complex Networks and Information Systems uses measured information to assure,
manage, predict, and design distributed networks, systems, and architectures
Complex Networks and
Information Systems Roadmap
Heterogeneous Dynamic
Air Force Systems
Global System
Local
System
System
Management Critical Information
System Analysis
& Prediction
Information Systems
Research
(System Measurement
& Assessment)
Diverse
Types of Systems
Local Network/Systems
Research
Global Network/Systems
Research
Complex Networks
(Unified Representation, Design,
Architecture)
Preserve
Critical
Information
Network/Systems
Management Research
System
Measurement
DISTRIBUTION A: Approved for public release; distribution is unlimited.
What to measure?
How to measure?
Information Systems
Measurement
We wish to understand what and how to measure systems for representations that
are traceable to mission performance and have quantifiable risk
DISTRIBUTION A: Approved for public release; distribution is unlimited.
System Measurement
and Probabilistic Model Checking
Ed Clarke, CMU, David Musliner, SIFT
Approach: Techniques on what and how to measure on any software, network, and
hardware integrated system with probabilistic model checking.
Payoff: Large system state spaces can be verified and risk calculated in a computationally
efficient way.
Dynamic System
Model of Critical System
Parameters
Heterogeneous
Systems
Toward Online
System Analysis With Measurement
Probabilistic System Prediction and
System Risk Analysis
System Probability Logic
State Using Geometric
Invariants
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Dan Speilman, Yale
Accurate Measurement of
Systems Graph Parameters
Approach: There are many different ways to represent networked systems. There needs to be
a principled way of selecting the best inputs for geometric models to parameterize system
performance.
Payoff: Systems can be parameterized in such a way as to minimize computational overhead
and inaccuracies in model prediction using sparse geometric graph theory.
MacArthur Genius Award Winner 2012
Critical Systems
Information
Sparse Regression of Graph
To Build Best Geometric
Model
Best Model?
Best System
Parameterization
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Statistical System
Estimation and Risk Analysis
Eric Kolaczyk, Boston University
Approach: Sample large systems guided by understanding of geometric invariants and risk
analysis in how measurements were constructed.
Payoff: Minimum risk can be incurred from measurements of large system while still
sampling in most computationally efficient way.
Minimum Risk Outcome for Graph Sampling Geometric Strategies for Sampling Graph
Risk Performance Peer to Peer Network Data
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Less: Information Loss Under
Disruption
More: Latency, Resource
Intensive
Less: Latency/Disruption
Tolerant
More: Controllable
Information
Sources
Information
Timescale ∆t
Architecture Information
Distribution
Architecture
Information Loss
With Interference
Architecture
Information
Recovery
• We wish to characterize network and system performance from measurement and
develop coding, protocol, and architectures that adapt according to network/system state
Complex Networks
System Representation
Deterministic
Routing
(ex: Core/Backbone)
Random Network
(ex: Mobile Ad Hoc)
Hybrid Network
(Mesh)
Deterministic
Routing
(ex: OSPF)
Hybrid Routing
(ex: OLSR)
Random Protocol
(ex: Flooding)
Hybrid Code
(ex: Network Code)
Random Code
(ex: Rateless Code)Packets
Packets Groups
Packets Blocks
Deterministic Code
(eg. Trellis Code)
Source 1
Source 2
Source 3
Source 1
Source 2
Source 3
Information
Receivers
Algorithm State Adapts
According to
Conditions (Feedback)
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Network
Taxonomy
Approach: Develop a taxonomy of network properties through curvature and timescale
invariants from hyperbolic geometry
Payoff: Space of network models can be developed and design principles and analysis
algorithms derived to predict network behavior
Narayan, Saniee UC Santa Cruz/Lucent
Social Network
Application
Protocol
Architecture
Taxonomy of Physical Architecture
Across Networks
Curvature vs. Timescale and
Network LayerGeometric Curvature Invariant
Characterization of
Network
Stack Across
Layers
(curvature connected
to congestions)
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Entropy Classes for Dynamic
Network Models
Approach: Deriving models for network protocol analysis has assumed fixed protocols
without the benefit of feedback or dynamic correlations in coding and protocol. Using Renyi
correlation analysis and entropy to model this wider class of models allows greater flexibility
in describing statistical classes.
Payoff: Complex phenomena such as feedback in coding can be modeled under dynamic
heterogeneous conditions.
Lizhong Zheng, MIT
Renyi Channel Correlation Analysis
(connected to geometric curvature)
Network Channel Architecture
Feedback Channel & Geometric Invariants
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Approach: Coding theory classically assumes fixed statistic and fixed methods of
coding for a given set of network and interference conditions
Payoff: Feedback in coding methods can significantly improve throughput under
dynamic network and interference conditions
D. Tse, Berkeley, P. Gupta, Alcatel Lucent, D. Shah, MIT
Feedback in Coding Theory
Feedback Coding Approach Areas Where Improves Performance
(including side information)
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Information Systems
Assessment
Hybrid Architecture
Hybrid Protocol
Hybrid Content
Random Architecture
Random Protocol
Random
Content
Deterministic
Architecture
Deterministic
Protocol
Deterministic Content
Measured Performance RegionsHeterogeneous
Information
Network States
(packets, packet blocks,
packet groups)
Software States
(variable, subroutine,
program)
Hardware States
(register, ram, virt. mem)
System
Measurements
Less: Information Loss Under
Disruption/Live
More: Latency, Resource
Intensive/Safe
Less: Latency/Disruption
Tolerant/Safe
More: Controllable/Live
Best Integrated
Performance Region
(timescale/level
of abstraction)
Global
Properties
Statistical
Properties
Stable/Resourced
SecureUnstable/Un-resourced
Insecure
Predict system performance using mathematical invariants from measured data
Invariants Predict
Performance
DISTRIBUTION A: Approved for public release; distribution is unlimited.
ST Yau, Harvard, Ali Jadbabaie, UPenn, Fan Chung Graham, UCSD
Hodge Theory for Invariants in Network Algorithms
Approach: Hodge decompositions allow natural functional invariants to be used on
extremely complex structures
Payoff: Analysis of Hodge decomposition can be applied to whole classes of
networks to characterize invariant parameters and predict performance.
Hodge Decomposition
Gives Powerful Functional Invariants
Invariant Analysis of
Page Rank (Google)
Invariant Analysis of
Google’s Page Rank Algorithm
for Different Values of Beta
DISTRIBUTION A: Approved for public release; distribution is unlimited.
John Harer/Sayan Mukherjee Duke Konstantin Mischaikow/Rutgers, Samson Abramsky Oxford, Peter Chin Johns Hopkins
Approach: Dynamic measured data has correlated structures that are difficult to
characterize by standard tools in algebraic topology such as homology. Additional features
such as Conley index can augment invariants provided by algebraic topology.
Payoff: Dynamic modes of networks and networked systems can be captured by new
methods in discrete Morse theory and algebraic topology to predict performance
Topological Invariants for Model Checking
Network & System Dynamics
Dynamic Time Series
Initial Time Series
Graphs from
Time Series
Graphs With
Invariant Cycle
Time Series Data
Use of Conley Index Allows
Verification of Dynamics for System Assurance
?
Geometric
Invariant
(homology)
Model Equivalence Checking
A
B
Bugs and System Instabilities Can Be Measured and Model Checked in Real Time
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Categorical Invariants on
Information Flows
Rob Ghrist, UPenn
Approach: Dynamic network information flow can be parameterized by its max flow
min cut value relative to the network topology
Payoff: Categories of flows can be developed using sheaf theoretic formulation for
max-flow min-cut parameters to characterize and verify system performance
Sheaf Formulation For Max Flow Min Cut
and Network Code Flow Parameters Cut Parameters Max Flow =
Min Cut Invariant
Categorical Invariants For Coded Information Flows
Corresponding Network Flow Conditions
Joint project with DARPA/DSO GRAPHS program
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Complex Networks Transition Activities
Complex Networks uses advanced mathematical analysis of information systems
measurements to resource, verify, and secure distributed Air Force infrastructures
- Princeton MURI – dynamic analysis of packets for airborne network resource management
- Yale/Telcordia commercial grant – real time system security policy verification
- Columbia/MIT – information theory for new quantum semiconductors
New Systems Components in
Architecture
Cloud Security/Cyber
Airborne Networks
Resource Analysis Scheduling
Geometric Analysis
Of Distributed System
Resources Dynamics
Intelligent Automation
STTR
AFRL
Lab Tasks
University
Research
Transition
Mechanisms
DARPA InPho
Information Theory for
Quantum
Semiconductors
Cloud Analysis
Using Operator
Algebras
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Space and Airborne
Cognitive RF
Approach: Use advanced non-parametric geometric measurement and game theoretic
techniques with Generalized Likelihood ratio test to enable training on RF interference data in
conjunction with advanced MIMO beam-forming techniques to remove interference
Payoff: AF will be able to conduct operations in crowded dynamic spectrum environment
Scott Erwin, AFRL/RV, John Matyjas, AFRL/RI, Vasu Chakravarthy, AFRL/RY
Space Time Network Adaptive Detection
Network
Measurement
& Invariants
Complex RF Environment
5 10 15 20 25 30 35
10
- 6
10
- 5
10
- 4
10
- 3
10
- 2
10
- 1
10
0
Transmit power to noise ratio, P/N0
, dB
BitErrorRate(BER)
BPSK signals, CDMA (L = 16), ds, d
= 100m, UAV height = 1Km
Direct transmissions
Two-hop relaying
Cooperative transmissions
Direct MIMO: [2x1] Alamouti scheme
Improved ThroughputImproved Detection
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Quantum Network & System
Measurements
Jeff Yepez/AFRL/RD, Paul Alsing/AFRL/RI, Atilla Szep, AFRL/RY
Data from Quantum
Network & System
Measurements
Photonic Device
Measurements Optical
Measurements
Approach: Verification of classical vs. quantum states in a network provides a new class of
measurement problems which need invariants for analysis of states of large scale quantum
systems for information assurance, communication, and computing
Payoff: Integrating new invariant network techniques with new quantum representations will
allow a much more integrated way of analyzing large scale quantum network and
computational systems
Representation of Quantum Logic
New MURI 2012: Measurement and Verification in Quantum Information Systems
DISTRIBUTION A: Approved for public release; distribution is unlimited.
2D Ricci flow
Approach: Verification of classical and quantum states in a network and system provides a new class of
measurement problems which need invariants such as computational homology for analysis of states
Payoff: Integrating new invariant network techniques with new classical and quantum representations
will allow a much more integrated way of analyzing & securing large scale networked and computational
systems
Computational Homology and Ricci
Flow for Verification of Classical and Quantum States
Paul Alsing/AFRL RI, Howard Bramson/Syracuse, Warner Miller, FAU
Network/System Decomposition
Network Information
Properties Of Curvature
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Approach: Complex Networks invariants can be used to assess risk on human vs. machine operation
when faced with complex decision task.
Payoff: Detailed understanding and automation of how to trade human vs. machine performance in time
critical functions such as cyber security, autonomous operation of air vehicles
Warfighter
Machine Learning
On Computational Infrastructure
Performance and
Representation
Estimate Decision Risk
Using Complex Network Invariants
Measurement
Machine Learning Risk
Lower
Human Risk
Lower
Complex Networks Invariants for Risk Assessment
Measurement of Human vs. Machine Performance
Leslie Blaha, AFRL/RH
Network RepresentationHidden Variable
Theory
Human
Behavior
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Recent Program Awards
• Dan Speilman
– MacArthur Genius Award (2012)
• Ingrid Daubechies
– Fellow of the American Mathematical Society 2012
– Benjamin Franklin Institute Medal, 2012
– Leroy Steel Prize From American Mathematical Society 2012
– IEEE Jack Kirby Signal Processing Medal 2011
• Robert Calderbank
- IEEE/Hamming Medal Winner (2012)
• Vincent Poor
- National Academy of Science (2011)
• Emmanuel Candes:
– Collatz Prize (Mathematics) , (ICIAM) (2011)
– Winner, Sixth Vasil A. Popov Prize (Mathematics) ,(2010)
• ST Yau
– Wolf Prize Mathematics, 2010
• Joel Tropp:
– Eighth Monroe H. Martin Prize, 2011
• Yonina Eldar
– IEEE Fellow 2013
• Mung Chiang:
– IEEE Fellow 2012
– IEEE Kiyo Tomiyasu Award in 2012
• Junshan Zhang
– IEEE Fellow 2012
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Academia/Commercial Outreach
• Keynote Lecture, American Society of Mechanical Engineers, Complex
Systems 2012
• Keynote Lecture, International Conference on Complex Networks,
2012
• Keynote Lecture, IEEE, CogSima, 2013
• Invited Lecture, Yale Mathematics, Anniversary of Coifman, Jones,
Rokhlin Achievements
• Organizer: London Institute of Mathematics: Mathematics of on
Statistical Verification, March 2012
• Organizer, OSTP Meeting on Complex Engineered Systems, 2012
• Invited Speaker, Allerton, IEEE Conference on Information Theory,
University of Illinois 2012
• Invited Speaker, IDGA Big Data, Federal Meeting Washington DC, 2013
• Invited Speaker, Neuro-Information Processing, Lake Tahoe, 2012
• Invited Speaker: Dagstuhl Germany, Mathematics of Information Flow,
2012
• Invited Speaker: USCD Information Theory and Applications, LaJolla
2013
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Program Impact &
Collaboration with Agencies
• OSTP/NITRD – Co-Chair Large Scale Networks Working Group
- New national thrust – Complex Networks and Systems inspired by AFOSR
program – Workshop “Complex Engineered Networks” organized by leader of
AFOSR Complex Networks MURI “Information Dynamics in Networks”
• ASDR&E
- Engineered Resilient Systems – Complex Networks and Foundations of
Information Systems on Roadmap
• DARPA Collaboration/joint program reviews
– Graphs – Mathematics of graphs and networks agent
– Defense Science Office Mathematics Advisory Panel
– InPho – Information in a photon/quantum network collaborative funding
– Com-EX cognitive network program transition agent
• IARPA – Quantum Computer Science Working Group
• ARL/ARO Network Science Board of Advisors
• NSF Future Internet, Cyber Physical Systems
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Complex Networks Trends
• Local Network Theory
– Geometric and binary information coding
– Coding information with network performance objectives
– Integration with verification and quantum methods
• Network Management
– Nonparametric strategies for assessing network performance
– Distributed strategies for measuring and assessing network information
transfer
– Sparse network management
• Global Network Theory
– Geometric flow analysis for prediction and management of network
performance
– Global state space taxonomy and categorization
• Information Systems Research
- Combined network, software, and hardware analysis
- Defining correct input data for given mathematical assessment
- Invariant metrics for analysis of network performance
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Cyber Operations: Joint University Center of Excellence:
“Cyber Vision 2025” – Enabling Technologies workshops
“Secure Cloud Computing” with university and AFRL/RI
Dynamics and Control : Verification and Validation of Complex Systems
Physics and Materials: New Joint MURI Topic: “Large Scale Integrated
Hybrid Nanophotonics”
Socio-Cultural Analysis: Social Networks – Joint MURI Topic: “Stable
Metrics for Inference in Social Networks ” – UCLA/USC/ASU
Quantum: Interaction with quantum network and quantum estimation
processes through lab tasks
- Joint EOARD initiative at Cambridge
Information Fusion: Critical feature selection in sensor networks
Optimization: Competing optimization requirements.
Decision: Networks of neurons.
Biology: Systems biological processes as networks.
Other Program Interactions
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Transition Activities
• AFRL
– AFRL/RI – Cyber Vision 2025 workshops/Illinois Center for Secure
Cloud Computing/
– AFRL/RI/RY – DARPA InPho program/DARPA Graphs program
– AFRL/RI/RY/RV – distributed secure space communications
– AFRL/RW/RV/RH – verification and validation of complex systems
• STTR
– Intelligent Automation: Transition to ESC of Airborne Networks
management – transition to Boeing for test-bed
– Avirtek: Secure router application interface- AFRL/RI
– Andro – Joint Spectrum Center Lockheed transition of automated
spectrum management tool
DISTRIBUTION A: Approved for public release; distribution is unlimited.
Transition Activities
• Customer/Industry
– Collaboration with ACC/GCIC, Air Force Spectrum Management
Agency on JALIN ICD
– Collaboration with Boeing, ESC, IAI for transition of coding and
routing management protocols baseline CORE tools to Rome
Lab for possible integration in CABLE JCTD
– Briefing to Space Command/Peterson for potential collaboration
– Interaction with Northrop Grumman/BACN airborne networking
program for potential collaboration
• OSD
– Complex Systems Engineering and Systems 20/20 initiative
– Software Assurance and Security Initiative
– Robust Command and Control Initiative
• Commercial
– Interaction with Stanford on real time network information
recovery
– New initiatives with Akamai for content distribution analysis
– Interaction with USFA/DHS/CISCO on router algorithm design

Más contenido relacionado

La actualidad más candente

First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...DETER-Project
 
Energy Consumption Minimization in WSN using BFO
 Energy Consumption Minimization in WSN using BFO Energy Consumption Minimization in WSN using BFO
Energy Consumption Minimization in WSN using BFOrahulmonikasharma
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...ijassn
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
 
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksA Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksIRJET Journal
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
An Overview and Classification of Approaches to Information Extraction in Wir...
An Overview and Classification of Approaches to Information Extraction in Wir...An Overview and Classification of Approaches to Information Extraction in Wir...
An Overview and Classification of Approaches to Information Extraction in Wir...M H
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...IJECEIAES
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
Internet Traffic Classification Using Bayesian Analysis Techniques
Internet Traffic Classification Using Bayesian Analysis TechniquesInternet Traffic Classification Using Bayesian Analysis Techniques
Internet Traffic Classification Using Bayesian Analysis TechniquesDenis Zuev
 

La actualidad más candente (19)

First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
 
Energy Consumption Minimization in WSN using BFO
 Energy Consumption Minimization in WSN using BFO Energy Consumption Minimization in WSN using BFO
Energy Consumption Minimization in WSN using BFO
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
 
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksA Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
 
D035418024
D035418024D035418024
D035418024
 
J031101064069
J031101064069J031101064069
J031101064069
 
An Overview and Classification of Approaches to Information Extraction in Wir...
An Overview and Classification of Approaches to Information Extraction in Wir...An Overview and Classification of Approaches to Information Extraction in Wir...
An Overview and Classification of Approaches to Information Extraction in Wir...
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Curtis Resume
Curtis ResumeCurtis Resume
Curtis Resume
 
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
Internet Traffic Classification Using Bayesian Analysis Techniques
Internet Traffic Classification Using Bayesian Analysis TechniquesInternet Traffic Classification Using Bayesian Analysis Techniques
Internet Traffic Classification Using Bayesian Analysis Techniques
 

Destacado

Interntional Symposium On Service Systems Science 2012 Kwan
Interntional Symposium On Service Systems Science 2012 KwanInterntional Symposium On Service Systems Science 2012 Kwan
Interntional Symposium On Service Systems Science 2012 KwanStephen Kwan
 
Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...
Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...
Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...Stephen Kwan
 
CIO Event - Why I banned the internal customer
CIO Event - Why I banned the internal customerCIO Event - Why I banned the internal customer
CIO Event - Why I banned the internal customerGlobal Business Intel
 
How BAE Systems Changed the World with Content Management
How BAE Systems Changed the World with Content ManagementHow BAE Systems Changed the World with Content Management
How BAE Systems Changed the World with Content ManagementXenith Document Systems Ltd
 
Moving from B2X to B2X2Y Value Propositions in Service System Networks
Moving from B2X to B2X2Y Value Propositions in Service System NetworksMoving from B2X to B2X2Y Value Propositions in Service System Networks
Moving from B2X to B2X2Y Value Propositions in Service System NetworksStephen Kwan
 
INFORMS 2014 - The Integration Quality Gap in Service System Networks
INFORMS 2014 - The Integration Quality Gap in Service System NetworksINFORMS 2014 - The Integration Quality Gap in Service System Networks
INFORMS 2014 - The Integration Quality Gap in Service System NetworksStephen Kwan
 
Continuously improving our people - achieiving the win-win - David MacLean
Continuously improving our people - achieiving the win-win - David MacLeanContinuously improving our people - achieiving the win-win - David MacLean
Continuously improving our people - achieiving the win-win - David MacLeanAssociation for Project Management
 
The role of electronic services in transformational government: a unified ser...
The role of electronic services in transformational government: a unified ser...The role of electronic services in transformational government: a unified ser...
The role of electronic services in transformational government: a unified ser...Luciano Batista
 
BAE Systems Inc - Learning
BAE Systems Inc - LearningBAE Systems Inc - Learning
BAE Systems Inc - LearningSIKM
 
CPO Event - John Champion, Purchasing Value Creation
CPO Event - John Champion, Purchasing Value CreationCPO Event - John Champion, Purchasing Value Creation
CPO Event - John Champion, Purchasing Value CreationGlobal Business Intel
 
Using Analogies to Frame a Value Proposition
Using Analogies to Frame a Value PropositionUsing Analogies to Frame a Value Proposition
Using Analogies to Frame a Value PropositionStephen Kwan
 
Measuring Integration Service Quality Gap in A Service System Network
Measuring Integration Service Quality Gap in A Service System NetworkMeasuring Integration Service Quality Gap in A Service System Network
Measuring Integration Service Quality Gap in A Service System NetworkStephen Kwan
 
Barile S., Polese F., Saviano M., Di Nauta P., Drawing boundaries in complex ...
Barile S., Polese F., Saviano M., Di Nauta P., Drawing boundaries in complex ...Barile S., Polese F., Saviano M., Di Nauta P., Drawing boundaries in complex ...
Barile S., Polese F., Saviano M., Di Nauta P., Drawing boundaries in complex ...pdinauta
 
Systemic Design Principles & Methods (Royal College of Art)
Systemic Design Principles & Methods (Royal College of Art)Systemic Design Principles & Methods (Royal College of Art)
Systemic Design Principles & Methods (Royal College of Art)Peter Jones
 
"Case Study: Sustainable Business Practise at BAE Systems" - James Pollington...
"Case Study: Sustainable Business Practise at BAE Systems" - James Pollington..."Case Study: Sustainable Business Practise at BAE Systems" - James Pollington...
"Case Study: Sustainable Business Practise at BAE Systems" - James Pollington...Sustainable Business Partnership
 
BEE Solving Problems Web
BEE Solving Problems WebBEE Solving Problems Web
BEE Solving Problems Webebarrows
 
Ford Motors SCQ Analysis
Ford Motors SCQ AnalysisFord Motors SCQ Analysis
Ford Motors SCQ Analysissunilngupta
 
Case Interviews, Killer Frameworks - Nevin Kamath and Ivy Exec
Case Interviews, Killer Frameworks - Nevin Kamath and Ivy ExecCase Interviews, Killer Frameworks - Nevin Kamath and Ivy Exec
Case Interviews, Killer Frameworks - Nevin Kamath and Ivy ExecIvy Exec
 
Useful Consulting Case Frameworks
Useful Consulting Case Frameworks Useful Consulting Case Frameworks
Useful Consulting Case Frameworks Joao Rendon Kahn
 
How NOT To Introduce Yourself
How NOT To Introduce YourselfHow NOT To Introduce Yourself
How NOT To Introduce YourselfBernard Marr
 

Destacado (20)

Interntional Symposium On Service Systems Science 2012 Kwan
Interntional Symposium On Service Systems Science 2012 KwanInterntional Symposium On Service Systems Science 2012 Kwan
Interntional Symposium On Service Systems Science 2012 Kwan
 
Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...
Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...
Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...
 
CIO Event - Why I banned the internal customer
CIO Event - Why I banned the internal customerCIO Event - Why I banned the internal customer
CIO Event - Why I banned the internal customer
 
How BAE Systems Changed the World with Content Management
How BAE Systems Changed the World with Content ManagementHow BAE Systems Changed the World with Content Management
How BAE Systems Changed the World with Content Management
 
Moving from B2X to B2X2Y Value Propositions in Service System Networks
Moving from B2X to B2X2Y Value Propositions in Service System NetworksMoving from B2X to B2X2Y Value Propositions in Service System Networks
Moving from B2X to B2X2Y Value Propositions in Service System Networks
 
INFORMS 2014 - The Integration Quality Gap in Service System Networks
INFORMS 2014 - The Integration Quality Gap in Service System NetworksINFORMS 2014 - The Integration Quality Gap in Service System Networks
INFORMS 2014 - The Integration Quality Gap in Service System Networks
 
Continuously improving our people - achieiving the win-win - David MacLean
Continuously improving our people - achieiving the win-win - David MacLeanContinuously improving our people - achieiving the win-win - David MacLean
Continuously improving our people - achieiving the win-win - David MacLean
 
The role of electronic services in transformational government: a unified ser...
The role of electronic services in transformational government: a unified ser...The role of electronic services in transformational government: a unified ser...
The role of electronic services in transformational government: a unified ser...
 
BAE Systems Inc - Learning
BAE Systems Inc - LearningBAE Systems Inc - Learning
BAE Systems Inc - Learning
 
CPO Event - John Champion, Purchasing Value Creation
CPO Event - John Champion, Purchasing Value CreationCPO Event - John Champion, Purchasing Value Creation
CPO Event - John Champion, Purchasing Value Creation
 
Using Analogies to Frame a Value Proposition
Using Analogies to Frame a Value PropositionUsing Analogies to Frame a Value Proposition
Using Analogies to Frame a Value Proposition
 
Measuring Integration Service Quality Gap in A Service System Network
Measuring Integration Service Quality Gap in A Service System NetworkMeasuring Integration Service Quality Gap in A Service System Network
Measuring Integration Service Quality Gap in A Service System Network
 
Barile S., Polese F., Saviano M., Di Nauta P., Drawing boundaries in complex ...
Barile S., Polese F., Saviano M., Di Nauta P., Drawing boundaries in complex ...Barile S., Polese F., Saviano M., Di Nauta P., Drawing boundaries in complex ...
Barile S., Polese F., Saviano M., Di Nauta P., Drawing boundaries in complex ...
 
Systemic Design Principles & Methods (Royal College of Art)
Systemic Design Principles & Methods (Royal College of Art)Systemic Design Principles & Methods (Royal College of Art)
Systemic Design Principles & Methods (Royal College of Art)
 
"Case Study: Sustainable Business Practise at BAE Systems" - James Pollington...
"Case Study: Sustainable Business Practise at BAE Systems" - James Pollington..."Case Study: Sustainable Business Practise at BAE Systems" - James Pollington...
"Case Study: Sustainable Business Practise at BAE Systems" - James Pollington...
 
BEE Solving Problems Web
BEE Solving Problems WebBEE Solving Problems Web
BEE Solving Problems Web
 
Ford Motors SCQ Analysis
Ford Motors SCQ AnalysisFord Motors SCQ Analysis
Ford Motors SCQ Analysis
 
Case Interviews, Killer Frameworks - Nevin Kamath and Ivy Exec
Case Interviews, Killer Frameworks - Nevin Kamath and Ivy ExecCase Interviews, Killer Frameworks - Nevin Kamath and Ivy Exec
Case Interviews, Killer Frameworks - Nevin Kamath and Ivy Exec
 
Useful Consulting Case Frameworks
Useful Consulting Case Frameworks Useful Consulting Case Frameworks
Useful Consulting Case Frameworks
 
How NOT To Introduce Yourself
How NOT To Introduce YourselfHow NOT To Introduce Yourself
How NOT To Introduce Yourself
 

Similar a Bonneau - Complex Networks Foundations of Information Systems - Spring Review 2013

Bonneau - Complex Networks/Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks/Foundations of Information Systems - Spring Review...Bonneau - Complex Networks/Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks/Foundations of Information Systems - Spring Review...The Air Force Office of Scientific Research
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerDeepak John
 
Fundamentals of network performance engineering
Fundamentals of network performance engineeringFundamentals of network performance engineering
Fundamentals of network performance engineeringMartin Geddes
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptxKISHOYIANKISH
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Dharmendrasingh417
 
Network Planning & Design: An Art or a Science?
Network Planning & Design: An Art or a Science?Network Planning & Design: An Art or a Science?
Network Planning & Design: An Art or a Science?Vishal Sharma, Ph.D.
 
Semantics in Sensor Networks
Semantics in Sensor NetworksSemantics in Sensor Networks
Semantics in Sensor NetworksOscar Corcho
 
Rose Bryant Resume 2016
Rose Bryant Resume 2016Rose Bryant Resume 2016
Rose Bryant Resume 2016Rose Bryant
 
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...ijassn
 
Cloud data management
Cloud data managementCloud data management
Cloud data managementambitlick
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSNDhaya kanthavel
 

Similar a Bonneau - Complex Networks Foundations of Information Systems - Spring Review 2013 (20)

Bonneau - Complex Networks/Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks/Foundations of Information Systems - Spring Review...Bonneau - Complex Networks/Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks/Foundations of Information Systems - Spring Review...
 
Kaplan - Systems and Software - Spring Review 2013
Kaplan - Systems and Software - Spring Review 2013Kaplan - Systems and Software - Spring Review 2013
Kaplan - Systems and Software - Spring Review 2013
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
Darema - Dynamic Data Driven Applications Systems (DDDAS) - Spring Review 2013
Darema - Dynamic Data Driven Applications Systems (DDDAS) - Spring Review 2013Darema - Dynamic Data Driven Applications Systems (DDDAS) - Spring Review 2013
Darema - Dynamic Data Driven Applications Systems (DDDAS) - Spring Review 2013
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
Routing
RoutingRouting
Routing
 
Fundamentals of network performance engineering
Fundamentals of network performance engineeringFundamentals of network performance engineering
Fundamentals of network performance engineering
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptx
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
 
Presentation1
Presentation1Presentation1
Presentation1
 
Network Planning & Design: An Art or a Science?
Network Planning & Design: An Art or a Science?Network Planning & Design: An Art or a Science?
Network Planning & Design: An Art or a Science?
 
Semantics in Sensor Networks
Semantics in Sensor NetworksSemantics in Sensor Networks
Semantics in Sensor Networks
 
Rose Bryant Resume 2016
Rose Bryant Resume 2016Rose Bryant Resume 2016
Rose Bryant Resume 2016
 
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
 

Más de The Air Force Office of Scientific Research

Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...The Air Force Office of Scientific Research
 

Más de The Air Force Office of Scientific Research (20)

Schmisseur - Aerothermodynamics & Turbulence - Spring Review 2013
Schmisseur - Aerothermodynamics & Turbulence - Spring Review 2013Schmisseur - Aerothermodynamics & Turbulence - Spring Review 2013
Schmisseur - Aerothermodynamics & Turbulence - Spring Review 2013
 
Li - Energy Conversion and Combustion Sciences - Spring Review 2013
Li - Energy Conversion and Combustion Sciences - Spring Review 2013Li - Energy Conversion and Combustion Sciences - Spring Review 2013
Li - Energy Conversion and Combustion Sciences - Spring Review 2013
 
Birkan - Space Propulsion and Power - Spring Review 2013
Birkan - Space Propulsion and Power - Spring Review 2013Birkan - Space Propulsion and Power - Spring Review 2013
Birkan - Space Propulsion and Power - Spring Review 2013
 
Berman - Molecular Dynamics & Theoretical Chemistry - Spring review 2013
Berman - Molecular Dynamics & Theoretical Chemistry - Spring review 2013Berman - Molecular Dynamics & Theoretical Chemistry - Spring review 2013
Berman - Molecular Dynamics & Theoretical Chemistry - Spring review 2013
 
Bradshaw - Sensory Information Systems - Spring Review 2013
Bradshaw - Sensory Information Systems - Spring Review 2013Bradshaw - Sensory Information Systems - Spring Review 2013
Bradshaw - Sensory Information Systems - Spring Review 2013
 
Bradshaw - Human Performance and Biosystems - Spring Review 2013
Bradshaw - Human Performance and Biosystems - Spring Review 2013Bradshaw - Human Performance and Biosystems - Spring Review 2013
Bradshaw - Human Performance and Biosystems - Spring Review 2013
 
Schmisseur - Energy, Power and Propulsion Sciences - Spring Review 2013
Schmisseur - Energy, Power and Propulsion Sciences - Spring Review 2013Schmisseur - Energy, Power and Propulsion Sciences - Spring Review 2013
Schmisseur - Energy, Power and Propulsion Sciences - Spring Review 2013
 
DeLong - Natural Materials and Systems - Spring Review 2013
DeLong - Natural Materials and Systems - Spring Review 2013DeLong - Natural Materials and Systems - Spring Review 2013
DeLong - Natural Materials and Systems - Spring Review 2013
 
Harrison - Low Density Materials - Spring Review 2013
Harrison - Low Density Materials - Spring Review 2013Harrison - Low Density Materials - Spring Review 2013
Harrison - Low Density Materials - Spring Review 2013
 
Lee - Organic Materials Chemistry - Spring Review 2013
Lee - Organic Materials Chemistry - Spring Review 2013Lee - Organic Materials Chemistry - Spring Review 2013
Lee - Organic Materials Chemistry - Spring Review 2013
 
Sayir - Aerospace Materials for Extreme Environments - Spring Review 2013
Sayir - Aerospace Materials for Extreme Environments - Spring Review 2013Sayir - Aerospace Materials for Extreme Environments - Spring Review 2013
Sayir - Aerospace Materials for Extreme Environments - Spring Review 2013
 
Weinstock - Quantum Electronic Solids - Spring Review 2013
Weinstock - Quantum Electronic Solids - Spring Review 2013Weinstock - Quantum Electronic Solids - Spring Review 2013
Weinstock - Quantum Electronic Solids - Spring Review 2013
 
Hwang - Adaptive Multimode Sensing - Spring Review 2013
Hwang - Adaptive Multimode Sensing - Spring Review 2013Hwang - Adaptive Multimode Sensing - Spring Review 2013
Hwang - Adaptive Multimode Sensing - Spring Review 2013
 
Hwang - GHz-THz Electronics - Spring Review 2013
Hwang - GHz-THz Electronics - Spring Review 2013Hwang - GHz-THz Electronics - Spring Review 2013
Hwang - GHz-THz Electronics - Spring Review 2013
 
Pomrenke - Photonics and Optoelectronics - Spring Review 2013
Pomrenke - Photonics and Optoelectronics - Spring Review 2013Pomrenke - Photonics and Optoelectronics - Spring Review 2013
Pomrenke - Photonics and Optoelectronics - Spring Review 2013
 
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
 
DeLong - Complex Materials and Devices - Spring Review 2013
DeLong - Complex Materials and Devices - Spring Review 2013DeLong - Complex Materials and Devices - Spring Review 2013
DeLong - Complex Materials and Devices - Spring Review 2013
 
Myung - Computational Cognition and Robust Decision Making - Spring Review 2013
Myung - Computational Cognition and Robust Decision Making - Spring Review 2013Myung - Computational Cognition and Robust Decision Making - Spring Review 2013
Myung - Computational Cognition and Robust Decision Making - Spring Review 2013
 
Nguyen - Sensing, Surveillance and Navigation - Spring Review 2013
Nguyen - Sensing, Surveillance and Navigation - Spring Review 2013Nguyen - Sensing, Surveillance and Navigation - Spring Review 2013
Nguyen - Sensing, Surveillance and Navigation - Spring Review 2013
 
Nguyen - Science of Information, Computation and Fusion - Spring Review 2013
Nguyen - Science of Information, Computation and Fusion - Spring Review 2013Nguyen - Science of Information, Computation and Fusion - Spring Review 2013
Nguyen - Science of Information, Computation and Fusion - Spring Review 2013
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Bonneau - Complex Networks Foundations of Information Systems - Spring Review 2013

  • 1. DISTRIBUTION A: Approved for public release; distribution is unlimited. Integrity  Service  Excellence Complex Networks/ Foundations of Information Systems 6 March 2013 Robert J. Bonneau, Ph.D. Division Chief AFOSR/RTC
  • 2. DISTRIBUTION A: Approved for public release; distribution is unlimited. NAME: Complex Networks/Foundations of Information Systems BRIEF DESCRIPTION OF PORTFOLIO: Complex Networks and Foundations of Information Systems uses measured information to assure, manage, predict, and design distributed networks, systems, and architectures 2013 Spring Review • Local Network Research: Guarantee and assure information transmission • Network Management Research: Network and system protocols for resilient and robust • Global Network Research: Mathematically represent network performance and design robustness • Foundations of Information Systems Research: Measure, predict, and verify information system properties LIST SUB-AREAS IN PORTFOLIO:
  • 3. DISTRIBUTION A: Approved for public release; distribution is unlimited. Goals: • Measure system performance and calculate risk • Preserve critical information structure and minimize latency over a heterogeneous distributed network and system • Ensure network and system robustness and resilience under a diverse set of resource constraints and manage using dynamic models • Represent global properties of a networked system in a unified mathematical framework for architecture and design • Assess and Predict heterogeneous distributed systems performance using unified mathematical framework Complex Networks & Foundations of Information Systems Foundations Goals Complex Networks Goals
  • 4. DISTRIBUTION A: Approved for public release; distribution is unlimited. Complex Networks & Foundations of Information Systems Payoffs: • Preserve critical information structure in a network rather than just delivering packets or bits • Quantify likelihood of a given network management policy to support critical mission functions • Predict and manage network and system failure comprehensively • Assess and verify properties of a distributed heterogeneous system where there is limited access to its elements • Assess dynamic Air Force system mission performance and assess risk of failure
  • 5. DISTRIBUTION A: Approved for public release; distribution is unlimited. Complex Networks and Information Systems uses measured information to assure, manage, predict, and design distributed networks, systems, and architectures Complex Networks and Information Systems Roadmap Heterogeneous Dynamic Air Force Systems Global System Local System System Management Critical Information System Analysis & Prediction Information Systems Research (System Measurement & Assessment) Diverse Types of Systems Local Network/Systems Research Global Network/Systems Research Complex Networks (Unified Representation, Design, Architecture) Preserve Critical Information Network/Systems Management Research System Measurement
  • 6. DISTRIBUTION A: Approved for public release; distribution is unlimited. What to measure? How to measure? Information Systems Measurement We wish to understand what and how to measure systems for representations that are traceable to mission performance and have quantifiable risk
  • 7. DISTRIBUTION A: Approved for public release; distribution is unlimited. System Measurement and Probabilistic Model Checking Ed Clarke, CMU, David Musliner, SIFT Approach: Techniques on what and how to measure on any software, network, and hardware integrated system with probabilistic model checking. Payoff: Large system state spaces can be verified and risk calculated in a computationally efficient way. Dynamic System Model of Critical System Parameters Heterogeneous Systems Toward Online System Analysis With Measurement Probabilistic System Prediction and System Risk Analysis System Probability Logic State Using Geometric Invariants
  • 8. DISTRIBUTION A: Approved for public release; distribution is unlimited. Dan Speilman, Yale Accurate Measurement of Systems Graph Parameters Approach: There are many different ways to represent networked systems. There needs to be a principled way of selecting the best inputs for geometric models to parameterize system performance. Payoff: Systems can be parameterized in such a way as to minimize computational overhead and inaccuracies in model prediction using sparse geometric graph theory. MacArthur Genius Award Winner 2012 Critical Systems Information Sparse Regression of Graph To Build Best Geometric Model Best Model? Best System Parameterization
  • 9. DISTRIBUTION A: Approved for public release; distribution is unlimited. Statistical System Estimation and Risk Analysis Eric Kolaczyk, Boston University Approach: Sample large systems guided by understanding of geometric invariants and risk analysis in how measurements were constructed. Payoff: Minimum risk can be incurred from measurements of large system while still sampling in most computationally efficient way. Minimum Risk Outcome for Graph Sampling Geometric Strategies for Sampling Graph Risk Performance Peer to Peer Network Data
  • 10. DISTRIBUTION A: Approved for public release; distribution is unlimited. Less: Information Loss Under Disruption More: Latency, Resource Intensive Less: Latency/Disruption Tolerant More: Controllable Information Sources Information Timescale ∆t Architecture Information Distribution Architecture Information Loss With Interference Architecture Information Recovery • We wish to characterize network and system performance from measurement and develop coding, protocol, and architectures that adapt according to network/system state Complex Networks System Representation Deterministic Routing (ex: Core/Backbone) Random Network (ex: Mobile Ad Hoc) Hybrid Network (Mesh) Deterministic Routing (ex: OSPF) Hybrid Routing (ex: OLSR) Random Protocol (ex: Flooding) Hybrid Code (ex: Network Code) Random Code (ex: Rateless Code)Packets Packets Groups Packets Blocks Deterministic Code (eg. Trellis Code) Source 1 Source 2 Source 3 Source 1 Source 2 Source 3 Information Receivers Algorithm State Adapts According to Conditions (Feedback)
  • 11. DISTRIBUTION A: Approved for public release; distribution is unlimited. Network Taxonomy Approach: Develop a taxonomy of network properties through curvature and timescale invariants from hyperbolic geometry Payoff: Space of network models can be developed and design principles and analysis algorithms derived to predict network behavior Narayan, Saniee UC Santa Cruz/Lucent Social Network Application Protocol Architecture Taxonomy of Physical Architecture Across Networks Curvature vs. Timescale and Network LayerGeometric Curvature Invariant Characterization of Network Stack Across Layers (curvature connected to congestions)
  • 12. DISTRIBUTION A: Approved for public release; distribution is unlimited. Entropy Classes for Dynamic Network Models Approach: Deriving models for network protocol analysis has assumed fixed protocols without the benefit of feedback or dynamic correlations in coding and protocol. Using Renyi correlation analysis and entropy to model this wider class of models allows greater flexibility in describing statistical classes. Payoff: Complex phenomena such as feedback in coding can be modeled under dynamic heterogeneous conditions. Lizhong Zheng, MIT Renyi Channel Correlation Analysis (connected to geometric curvature) Network Channel Architecture Feedback Channel & Geometric Invariants
  • 13. DISTRIBUTION A: Approved for public release; distribution is unlimited. Approach: Coding theory classically assumes fixed statistic and fixed methods of coding for a given set of network and interference conditions Payoff: Feedback in coding methods can significantly improve throughput under dynamic network and interference conditions D. Tse, Berkeley, P. Gupta, Alcatel Lucent, D. Shah, MIT Feedback in Coding Theory Feedback Coding Approach Areas Where Improves Performance (including side information)
  • 14. DISTRIBUTION A: Approved for public release; distribution is unlimited. Information Systems Assessment Hybrid Architecture Hybrid Protocol Hybrid Content Random Architecture Random Protocol Random Content Deterministic Architecture Deterministic Protocol Deterministic Content Measured Performance RegionsHeterogeneous Information Network States (packets, packet blocks, packet groups) Software States (variable, subroutine, program) Hardware States (register, ram, virt. mem) System Measurements Less: Information Loss Under Disruption/Live More: Latency, Resource Intensive/Safe Less: Latency/Disruption Tolerant/Safe More: Controllable/Live Best Integrated Performance Region (timescale/level of abstraction) Global Properties Statistical Properties Stable/Resourced SecureUnstable/Un-resourced Insecure Predict system performance using mathematical invariants from measured data Invariants Predict Performance
  • 15. DISTRIBUTION A: Approved for public release; distribution is unlimited. ST Yau, Harvard, Ali Jadbabaie, UPenn, Fan Chung Graham, UCSD Hodge Theory for Invariants in Network Algorithms Approach: Hodge decompositions allow natural functional invariants to be used on extremely complex structures Payoff: Analysis of Hodge decomposition can be applied to whole classes of networks to characterize invariant parameters and predict performance. Hodge Decomposition Gives Powerful Functional Invariants Invariant Analysis of Page Rank (Google) Invariant Analysis of Google’s Page Rank Algorithm for Different Values of Beta
  • 16. DISTRIBUTION A: Approved for public release; distribution is unlimited. John Harer/Sayan Mukherjee Duke Konstantin Mischaikow/Rutgers, Samson Abramsky Oxford, Peter Chin Johns Hopkins Approach: Dynamic measured data has correlated structures that are difficult to characterize by standard tools in algebraic topology such as homology. Additional features such as Conley index can augment invariants provided by algebraic topology. Payoff: Dynamic modes of networks and networked systems can be captured by new methods in discrete Morse theory and algebraic topology to predict performance Topological Invariants for Model Checking Network & System Dynamics Dynamic Time Series Initial Time Series Graphs from Time Series Graphs With Invariant Cycle Time Series Data Use of Conley Index Allows Verification of Dynamics for System Assurance ? Geometric Invariant (homology) Model Equivalence Checking A B Bugs and System Instabilities Can Be Measured and Model Checked in Real Time
  • 17. DISTRIBUTION A: Approved for public release; distribution is unlimited. Categorical Invariants on Information Flows Rob Ghrist, UPenn Approach: Dynamic network information flow can be parameterized by its max flow min cut value relative to the network topology Payoff: Categories of flows can be developed using sheaf theoretic formulation for max-flow min-cut parameters to characterize and verify system performance Sheaf Formulation For Max Flow Min Cut and Network Code Flow Parameters Cut Parameters Max Flow = Min Cut Invariant Categorical Invariants For Coded Information Flows Corresponding Network Flow Conditions Joint project with DARPA/DSO GRAPHS program
  • 18. DISTRIBUTION A: Approved for public release; distribution is unlimited. Complex Networks Transition Activities Complex Networks uses advanced mathematical analysis of information systems measurements to resource, verify, and secure distributed Air Force infrastructures - Princeton MURI – dynamic analysis of packets for airborne network resource management - Yale/Telcordia commercial grant – real time system security policy verification - Columbia/MIT – information theory for new quantum semiconductors New Systems Components in Architecture Cloud Security/Cyber Airborne Networks Resource Analysis Scheduling Geometric Analysis Of Distributed System Resources Dynamics Intelligent Automation STTR AFRL Lab Tasks University Research Transition Mechanisms DARPA InPho Information Theory for Quantum Semiconductors Cloud Analysis Using Operator Algebras
  • 19. DISTRIBUTION A: Approved for public release; distribution is unlimited. Space and Airborne Cognitive RF Approach: Use advanced non-parametric geometric measurement and game theoretic techniques with Generalized Likelihood ratio test to enable training on RF interference data in conjunction with advanced MIMO beam-forming techniques to remove interference Payoff: AF will be able to conduct operations in crowded dynamic spectrum environment Scott Erwin, AFRL/RV, John Matyjas, AFRL/RI, Vasu Chakravarthy, AFRL/RY Space Time Network Adaptive Detection Network Measurement & Invariants Complex RF Environment 5 10 15 20 25 30 35 10 - 6 10 - 5 10 - 4 10 - 3 10 - 2 10 - 1 10 0 Transmit power to noise ratio, P/N0 , dB BitErrorRate(BER) BPSK signals, CDMA (L = 16), ds, d = 100m, UAV height = 1Km Direct transmissions Two-hop relaying Cooperative transmissions Direct MIMO: [2x1] Alamouti scheme Improved ThroughputImproved Detection
  • 20. DISTRIBUTION A: Approved for public release; distribution is unlimited. Quantum Network & System Measurements Jeff Yepez/AFRL/RD, Paul Alsing/AFRL/RI, Atilla Szep, AFRL/RY Data from Quantum Network & System Measurements Photonic Device Measurements Optical Measurements Approach: Verification of classical vs. quantum states in a network provides a new class of measurement problems which need invariants for analysis of states of large scale quantum systems for information assurance, communication, and computing Payoff: Integrating new invariant network techniques with new quantum representations will allow a much more integrated way of analyzing large scale quantum network and computational systems Representation of Quantum Logic New MURI 2012: Measurement and Verification in Quantum Information Systems
  • 21. DISTRIBUTION A: Approved for public release; distribution is unlimited. 2D Ricci flow Approach: Verification of classical and quantum states in a network and system provides a new class of measurement problems which need invariants such as computational homology for analysis of states Payoff: Integrating new invariant network techniques with new classical and quantum representations will allow a much more integrated way of analyzing & securing large scale networked and computational systems Computational Homology and Ricci Flow for Verification of Classical and Quantum States Paul Alsing/AFRL RI, Howard Bramson/Syracuse, Warner Miller, FAU Network/System Decomposition Network Information Properties Of Curvature
  • 22. DISTRIBUTION A: Approved for public release; distribution is unlimited. Approach: Complex Networks invariants can be used to assess risk on human vs. machine operation when faced with complex decision task. Payoff: Detailed understanding and automation of how to trade human vs. machine performance in time critical functions such as cyber security, autonomous operation of air vehicles Warfighter Machine Learning On Computational Infrastructure Performance and Representation Estimate Decision Risk Using Complex Network Invariants Measurement Machine Learning Risk Lower Human Risk Lower Complex Networks Invariants for Risk Assessment Measurement of Human vs. Machine Performance Leslie Blaha, AFRL/RH Network RepresentationHidden Variable Theory Human Behavior
  • 23. DISTRIBUTION A: Approved for public release; distribution is unlimited. Recent Program Awards • Dan Speilman – MacArthur Genius Award (2012) • Ingrid Daubechies – Fellow of the American Mathematical Society 2012 – Benjamin Franklin Institute Medal, 2012 – Leroy Steel Prize From American Mathematical Society 2012 – IEEE Jack Kirby Signal Processing Medal 2011 • Robert Calderbank - IEEE/Hamming Medal Winner (2012) • Vincent Poor - National Academy of Science (2011) • Emmanuel Candes: – Collatz Prize (Mathematics) , (ICIAM) (2011) – Winner, Sixth Vasil A. Popov Prize (Mathematics) ,(2010) • ST Yau – Wolf Prize Mathematics, 2010 • Joel Tropp: – Eighth Monroe H. Martin Prize, 2011 • Yonina Eldar – IEEE Fellow 2013 • Mung Chiang: – IEEE Fellow 2012 – IEEE Kiyo Tomiyasu Award in 2012 • Junshan Zhang – IEEE Fellow 2012
  • 24. DISTRIBUTION A: Approved for public release; distribution is unlimited. Academia/Commercial Outreach • Keynote Lecture, American Society of Mechanical Engineers, Complex Systems 2012 • Keynote Lecture, International Conference on Complex Networks, 2012 • Keynote Lecture, IEEE, CogSima, 2013 • Invited Lecture, Yale Mathematics, Anniversary of Coifman, Jones, Rokhlin Achievements • Organizer: London Institute of Mathematics: Mathematics of on Statistical Verification, March 2012 • Organizer, OSTP Meeting on Complex Engineered Systems, 2012 • Invited Speaker, Allerton, IEEE Conference on Information Theory, University of Illinois 2012 • Invited Speaker, IDGA Big Data, Federal Meeting Washington DC, 2013 • Invited Speaker, Neuro-Information Processing, Lake Tahoe, 2012 • Invited Speaker: Dagstuhl Germany, Mathematics of Information Flow, 2012 • Invited Speaker: USCD Information Theory and Applications, LaJolla 2013
  • 25. DISTRIBUTION A: Approved for public release; distribution is unlimited. Program Impact & Collaboration with Agencies • OSTP/NITRD – Co-Chair Large Scale Networks Working Group - New national thrust – Complex Networks and Systems inspired by AFOSR program – Workshop “Complex Engineered Networks” organized by leader of AFOSR Complex Networks MURI “Information Dynamics in Networks” • ASDR&E - Engineered Resilient Systems – Complex Networks and Foundations of Information Systems on Roadmap • DARPA Collaboration/joint program reviews – Graphs – Mathematics of graphs and networks agent – Defense Science Office Mathematics Advisory Panel – InPho – Information in a photon/quantum network collaborative funding – Com-EX cognitive network program transition agent • IARPA – Quantum Computer Science Working Group • ARL/ARO Network Science Board of Advisors • NSF Future Internet, Cyber Physical Systems
  • 26. DISTRIBUTION A: Approved for public release; distribution is unlimited. Complex Networks Trends • Local Network Theory – Geometric and binary information coding – Coding information with network performance objectives – Integration with verification and quantum methods • Network Management – Nonparametric strategies for assessing network performance – Distributed strategies for measuring and assessing network information transfer – Sparse network management • Global Network Theory – Geometric flow analysis for prediction and management of network performance – Global state space taxonomy and categorization • Information Systems Research - Combined network, software, and hardware analysis - Defining correct input data for given mathematical assessment - Invariant metrics for analysis of network performance
  • 27. DISTRIBUTION A: Approved for public release; distribution is unlimited. Cyber Operations: Joint University Center of Excellence: “Cyber Vision 2025” – Enabling Technologies workshops “Secure Cloud Computing” with university and AFRL/RI Dynamics and Control : Verification and Validation of Complex Systems Physics and Materials: New Joint MURI Topic: “Large Scale Integrated Hybrid Nanophotonics” Socio-Cultural Analysis: Social Networks – Joint MURI Topic: “Stable Metrics for Inference in Social Networks ” – UCLA/USC/ASU Quantum: Interaction with quantum network and quantum estimation processes through lab tasks - Joint EOARD initiative at Cambridge Information Fusion: Critical feature selection in sensor networks Optimization: Competing optimization requirements. Decision: Networks of neurons. Biology: Systems biological processes as networks. Other Program Interactions
  • 28. DISTRIBUTION A: Approved for public release; distribution is unlimited. Transition Activities • AFRL – AFRL/RI – Cyber Vision 2025 workshops/Illinois Center for Secure Cloud Computing/ – AFRL/RI/RY – DARPA InPho program/DARPA Graphs program – AFRL/RI/RY/RV – distributed secure space communications – AFRL/RW/RV/RH – verification and validation of complex systems • STTR – Intelligent Automation: Transition to ESC of Airborne Networks management – transition to Boeing for test-bed – Avirtek: Secure router application interface- AFRL/RI – Andro – Joint Spectrum Center Lockheed transition of automated spectrum management tool
  • 29. DISTRIBUTION A: Approved for public release; distribution is unlimited. Transition Activities • Customer/Industry – Collaboration with ACC/GCIC, Air Force Spectrum Management Agency on JALIN ICD – Collaboration with Boeing, ESC, IAI for transition of coding and routing management protocols baseline CORE tools to Rome Lab for possible integration in CABLE JCTD – Briefing to Space Command/Peterson for potential collaboration – Interaction with Northrop Grumman/BACN airborne networking program for potential collaboration • OSD – Complex Systems Engineering and Systems 20/20 initiative – Software Assurance and Security Initiative – Robust Command and Control Initiative • Commercial – Interaction with Stanford on real time network information recovery – New initiatives with Akamai for content distribution analysis – Interaction with USFA/DHS/CISCO on router algorithm design