Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–7 of 7 results for author: Borowczak, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.09677  [pdf, other

    cs.NE cs.AR

    SAGA: Synthesis Augmentation with Genetic Algorithms for In-Memory Sequence Optimization

    Authors: Andey Robins, Mike Borowczak

    Abstract: The von-Neumann architecture has a bottleneck which limits the speed at which data can be made available for computation. To combat this problem, novel paradigms for computing are being developed. One such paradigm, known as in-memory computing, interleaves computation with the storage of data within the same circuits. MAGIC, or Memristor Aided Logic, is an approach which uses memory circuits whic… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: 6 pages, 2 Figures, 3 Tables

  2. arXiv:2107.00185  [pdf

    cs.DC

    A Blockchain-based Carbon Credit Ecosystem

    Authors: Soheil Saraji, Mike Borowczak

    Abstract: Climate change and global warming are the significant challenges of the new century. A viable solution to mitigate greenhouse gas emissions is via a globally incentivized market mechanism proposed in the Kyoto protocol. In this view, the carbon dioxide (or other greenhouse gases) emission is considered a commodity, forming a carbon trading system. There have been attempts in developing this idea i… ▽ More

    Submitted 30 June, 2021; originally announced July 2021.

  3. arXiv:2002.09109  [pdf, other

    cs.MA

    Adversarial Impacts on Autonomous Decentralized Lightweight Swarms

    Authors: Shaya Wolf, Rafer Cooley, Mike Borowczak

    Abstract: The decreased size and cost of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) has enabled the use of swarms of unmanned autonomous vehicles to accomplish a variety of tasks. By utilizing swarming behaviors, it is possible to efficiently accomplish coordinated tasks while minimizing per-drone computational requirements. Some drones rely on decentralized protocols that exhibit e… ▽ More

    Submitted 20 February, 2020; originally announced February 2020.

    Comments: 7 pages, 4 figures, 5th International IEEE Smart Cities Conference

    MSC Class: 68T42 ACM Class: I.2.8; I.2.9

  4. arXiv:1903.03132  [pdf, other

    cs.CR cs.LG

    Dynamic Anonymized Evaluation for Behavioral Continuous Authentication

    Authors: Rasana Manandhar, Shaya Wolf, Mike Borowczak

    Abstract: Emerging technology demands reliable authentication mechanisms, particularly in interconnected systems. Current systems rely on a single moment of authentication, however continuous authentication systems assess a users identity utilizing a constant biometric analysis. Spy Hunter, a continuous authentication mechanism uses keystroke dynamics to validate users over blocks of data. This easily-incor… ▽ More

    Submitted 7 March, 2019; originally announced March 2019.

    Comments: 6 pages, 1 figure, 3 tables

    MSC Class: 68T05 ACM Class: I.2.1; K.6.5; D.4.6

  5. Portable Tor Router: Easily Enabling Web Privacy for Consumers

    Authors: Adrian Barberis, Danny Radosevich, Wyatt Emery, Mike Borowczak

    Abstract: On-line privacy is of major public concern. Unfortunately, for the average consumer, there is no simple mechanism to browse the Internet privately on multiple devices. Most available Internet privacy mechanisms are either expensive, not readily available, untrusted, or simply provide trivial information masking. We propose that the simplest, most effective and inexpensive way of gaining privacy, w… ▽ More

    Submitted 5 October, 2017; originally announced October 2017.

    Comments: 6 pages, 5 figures, IEEE ICCE Conference

  6. S-CHIRP: Secure Communication for Heterogeneous IoTs with Round-Robin Protection

    Authors: Mike Borowczak, George Purdy

    Abstract: This work introduces CHIRP - an algorithm for communication between ultra-portable heterogeneous IoT devices with a type of round-robin protection mechanism. This algorithm is presented both in its basic form as well as in a secured form in order to secure and maintain trust boundaries and communication within specific groups of heterogeneous devices. The specific target application scenarios incl… ▽ More

    Submitted 1 October, 2017; originally announced October 2017.

    Comments: 6 Pages, 4 figures, 2 tables, IEEE International Conference on Consumer Electronics

  7. Predictive Liability Models and Visualizations of High Dimensional Retail Employee Data

    Authors: Richard R. Yang, Mike Borowczak

    Abstract: Employee theft and dishonesty is a major contributor to loss in the retail industry. Retailers have reported the need for more automated analytic tools to assess the liability of their employees. In this work, we train and optimize several machine learning models for regression prediction and analysis on this data, which will help retailers identify and manage risky employees. Since the data we us… ▽ More

    Submitted 28 March, 2018; v1 submitted 14 July, 2017; originally announced July 2017.