Skip to main content

Showing 1–3 of 3 results for author: Hitefield, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2101.02184  [pdf, other

    cs.NI

    VFSIE -- Development and Testing Framework for Federated Science Instruments

    Authors: Anees Al-Najjar, Nageswara S. V. Rao, Neena Imam, Thomas Naughton, Seth Hitefield, Lawrence Sorrillo, James Kohl, Wael Elwasif, Jean-Christophe Bilheux, Hassina Bilheux, Swen Boehm, Jason Kincl

    Abstract: Recent developments in softwarization of networked infrastructures combined with containerization of computing workflows promise unprecedented compute anywhere and everywhere capabilities for federations of edge and remote computing systems and science instruments. The development and testing of software stacks that implement these capabilities over physical production federations, however, is not… ▽ More

    Submitted 2 February, 2021; v1 submitted 6 January, 2021; originally announced January 2021.

    Comments: Earlier Version of VFSIE framework for emulating science workflows at a single site

  2. arXiv:1610.00564  [pdf, other

    cs.LG cs.NI

    End-to-End Radio Traffic Sequence Recognition with Deep Recurrent Neural Networks

    Authors: Timothy J. O'Shea, Seth Hitefield, Johnathan Corgan

    Abstract: We investigate sequence machine learning techniques on raw radio signal time-series data. By applying deep recurrent neural networks we learn to discriminate between several application layer traffic types on top of a constant envelope modulation without using an expert demodulation algorithm. We show that complex protocol sequences can be learned and used for both classification and generation ta… ▽ More

    Submitted 3 October, 2016; originally announced October 2016.

  3. arXiv:1311.0257  [pdf, other

    cs.CR

    Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity

    Authors: Michael D. Adams, Seth D. Hitefield, Bruce Hoy, Michael C. Fowler, T. Charles Clancy

    Abstract: A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous 'cyber cycle' of attackers scanning networks, develo** exploits and attacking systems, with defenders detecting attacks, analyzing exploits and patching systems. This reactive nature leaves sensitive systems highly vulnerable to attack due to un-patched system… ▽ More

    Submitted 1 November, 2013; originally announced November 2013.

    Comments: 12 pages, 7 figures