North Middletown, NJ, United States
North Middletown, NJ, United States

Time filter

Source Type

Chhatwal R.,ATandT Inc. | Huber-Fliflet N.,Navigant Consulting | Keeling R.,Complex Commercial Litigation | Zhang J.,Navigant Consulting | Zhao H.,Navigant Consulting
Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016 | Year: 2016

Predictive coding, once used in only a small fraction of legal and business matters, is now widely deployed to quickly cull through increasingly vast amounts of data and reduce the need for costly and inefficient human document review. Previously, the sole front-end input used to create a predictive model was the exemplar documents (training data) chosen by subject-matter experts. Many predictive coding tools require users to rely on static preprocessing parameters and a single machine learning algorithm to develop the predictive model. Little research has been published discussing the impact preprocessing parameters and learning algorithms have on the effectiveness of the technology. A deeper dive into the generation of a predictive model shows that the settings and algorithm can have a strong effect on the accuracy and efficacy of a predictive coding tool. Understanding how these input parameters affect the output will empower legal teams with the information they need to implement predictive coding as efficiently and effectively as possible. This paper outlines different preprocessing parameters and algorithms as applied to multiple real-world data sets to understand the influence of various approaches. © 2016 IEEE.

Archibald R.,University of California at Davis | Liu Y.,ATandT Inc. | Corbett C.,Johns Hopkins University | Ghosal D.,University of California at Davis
IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference | Year: 2011

One of the key challenges facing network administrators in securing an enterprise network is the anonymity of the traffic on the network. Although current research has taken steps forward addressing the issue of identifying the application layer protocols (e.g., SSH, HTTP, or FTP) a more fine-grained identification is required for a variety of applications that run over these established application layer protocols. We are specifically interested in disambiguating traffic that is carried by the HTTP application layer protocol. In this paper, we investigate representatives of classes of applications, namely social networking (Facebook), web-mail (Gmail), and streaming video applications (YouTube), all of which communicate via the HTTP protocol. We use specific features derived from network traffic (i.e., the TCP/IP packet headers) that can be used to classify the flows as belonging to each application. An important aspect of our work is to classify the applications based on any segment of the traffic flow. We consider different signals that can be derived from the network flow such as the packet sizes and inter-arrival times and apply simple statistical and spectral analysis to identify distinguishing features of the applications. Our classification system yields a classification rate of 93% or better using only packet size statistics. We evaluate our system on network flows collected from the backbone of the UC Davis campus network. Furthermore, we consider two types of noise an adversary may inject to evade detection: packet padding and altering the inter-packet delays. Despite these two types of noise, using our classification method we are still able to achieve a reasonable classification rate. © 2011 IEEE.

Liu Y.,University of California at Davis | Huynh M.,ATandT Inc. | Ghosal D.,University of California at Davis
2015 International Conference on Computing, Networking and Communications, ICNC 2015 | Year: 2015

Long Term Evolution (LTE) is being widely deployed to support real-time applications, such as voice over IP and video games. These power consuming applications create new challenges for resource allocation. Therefore, providing efficient resource allocation as well as extending user equipment's (UE) battery lifetime are two important goals in LTE network. Maximum Largest Weighted Delay First (M-LWDF) algorithm is one of the primary downlink scheduling mechanisms currently used for real-time applications. The Discontinuous Reception (DRX) mechanism, which is widely adopted in LTE to conserve the mobile phone's battery resources, results in higher latency and higher packet loss rate due to its sleep mode. The impact of DRX mechanism on downlink scheduling by using M-LWDF algorithm was studied comprehensively for the first time. Then a novel scheme, utility based scheduling scheme (USS), was proposed to reduce packet loss which was caused by DRX sleep mode by considering the remaining DRX awake time at UE and adjusting the DRX parameters. The simulation results show that by using this proposed scheme, significant performance gain will be achieved when compared with traditional scheduling algorithms, such as Proportional Fairness (PF) and M-LWDF. Packet delay and packet drop rate will be decreased by 23.5% and 59.5% respectively. © 2015 IEEE.

Liu Y.,University of California at Davis | Huynh M.,ATandT Inc. | Ghosal D.,University of California at Davis
2016 International Conference on Computing, Networking and Communications, ICNC 2016 | Year: 2016

The Discontinuous Reception (DRX) mechanism which is widely adopted in LTE to conserve the user equipment (UE)'s battery resources, not only introduces high handover latency but also reduces the downlink scheduler efficiency. A key objective of this work is to design battery power aware scheduling by incorporating the per-UE DRX parameters (such as the On Duration Timer) in downlink scheduling. This allows maximizing the UEs battery lifetime while satisfying the application qualify of service (QoS) requirement. In this paper, we propose an enhanced DRX-Aware scheduling (eDAS) mechanism that can balance the trade-off between application QoS requirements and UE's power consumption. The eDAS scheduler accounts for both static and mobile UEs. Simulation analysis shows that the proposed eDAS scheme achieves lower packet loss rate and packet delay when compared with traditional scheduling algorithms such as Proportional Fairness (PF) and Maximum Largest Weighted Delay First (M-LWDF), while still achieving significant power conservation. © 2016 IEEE.

Xu G.,ATandT Inc. | Borcea C.,New Jersey Institute of Technology | Iftode L.,Rutgers University
IEEE Transactions on Dependable and Secure Computing | Year: 2011

To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However, enforcing policies in MANETs is challenging because they lack the infrastructure and trusted entities encountered in traditional distributed systems. This paper presents the design and implementation of a policy enforcing mechanism based on Satem, a kernel-level trusted execution monitor built on top of the Trusted Platform Module. Under this mechanism, each application or protocol has an associated policy. Two instances of an application running on different nodes may engage in communication only if these nodes enforce the same set of policies for both the application and the underlying protocols used by the application. In this way, nodes can form trusted application-centric networks. Before allowing a node to join such a network, Satem verifies its trustworthiness of enforcing the required set of policies. Furthermore, Satem protects the policies and the software enforcing these policies from being tampered with. If any of them is compromised, Satem disconnects the node from the network. We demonstrate the correctness of our solution through security analysis, and its low overhead through performance evaluation of two MANET applications. © 2011 IEEE.

Dalton M.J.,Air Force Research Lab | Dalton M.J.,General Dynamics Corporation | Kannan R.,Air Force Research Lab | Kannan R.,ATandT Inc. | And 7 more authors.
Macromolecules | Year: 2011

A new bis(4-aminophenoxy) monomer containing a two-photon absorbing (2PA) and fluorescent diphenylaminodiethylfluorene-benzothiazole chromophore (AF240) was synthesized and used as a comonomer in preparing a series of heat-resistant, 2PA-active polyimides. Highly organo-soluble, these polymers easily formed optically clear, but nonfluorescent, films that contained covalently bound, AF240-like dye in concentrations up to ∼1.0 M. For comparison purposes, a model compound (AF349) with phthalimido end-caps was also prepared. From the fluorescence data, the presence of phthalimido moieties in both the model compound and the polymers drastically quenched the fluorescence emission from the 2PA moieties of these materials in solution as well as in solid state. Their intrinsic (at 780 nm and with 160 fs pulses) and effective (at 800 nm and 8 ns pulses) two-photon properties in THF solutions (0.02 M), and film samples (40-65 μm thick) were determined by a direct nonlinear transmission technique. Thus, their intrinsic (σ(2) fs) and effective cross-section (σ(2) ns) values in solution are 7.7-37 and 1070-6000 GM per repeat unit, respectively. Surprisingly for the film samples, while the σ(2) fs values agree with those determined in solutions, the σ(2) ns values are 7-9 times larger, depending on the dye content. On the basis of the results of photophysical characterization of these polymers, we propose that on a nanosecond or slower time scale a stabilized/confined excited state complex is formed in an intrachain mode between an AF240-like moiety and a phthalimido unit to reasonably account for the fluorescence quenching and enhancement in the effective two-photon responses in film form. © 2011 American Chemical Society.

Priebe S.,TU Braunschweig | Priebe S.,Terahertz Communications Laboratory | Britz D.M.,ATandT Inc. | Jacob M.,TU Braunschweig | And 7 more authors.
IEEE Transactions on Terahertz Science and Technology | Year: 2012

At Terahertz (THz) frequencies, passive space-borne Earth exploration services may be interfered by upcoming active communication applications. Aiming for coexistent use of the THz band by both active and passive applications, this paper identifies critical scenarios where interference can possibly occur. Atmospheric attenuation simulations are used along with appropriate propagation models to account for correct scenario-specific wave propagation conditions. Furthermore, distance-dependent measurements of the path loss are taken at 300 GHz. The atmospheric attenuation and propagation models are then employed in order to simulate possible interference powers for the individual reference scenarios under worst case-conditions. Based on existing data for the maximum allowed interference, guidelines for appropriate system specifications of active THz hardware (e.g., transmit power constraints) are developed and achievable system performances are evaluated. Countermeasures against potential interference are discussed. Thus, any interference can be anticipated and compensated for already in the early design phase of THz communication systems. © 2011-2012 IEEE.

Huang J.S.,ATandT Inc. | Hsueh K.,IFOSSF | Reynolds A.,IFOSSF
IEEE International Conference on Digital Ecosystems and Technologies | Year: 2013

Traditional approaches to Social, Economic and Environmental Development (SEED) have historically employed a closed, top-down model in which problems are viewed narrowly and the input of local stakeholders is rarely sought. More recent efforts to address development from a holistic, multidisciplinary perspective-while a major step in the right direction-have been hindered by a lack of appropriate tools and well-defined processes to enable disparate resources to work effectively together towards common goals. The proposed SEED Framework leverages and expands the mandate of Digital Agenda set forth by several nations, and the resulting technology development with additional design patterns for the purpose of building a collaborative SEED Digital Ecosystem. The framework aims to effectively support self-organizing, multidisciplinary collaborations and, most importantly, to translate concepts and ideas into actions for holistic and sustained social, economic and environmental development with a deep awareness of the local culture. © 2013 IEEE.

Liu Q.,ATandT Inc.
Conference on Optical Fiber Communication, Technical Digest Series | Year: 2014

Changes in the telecommunication services are getting bigger and faster. To be agile to these changes, metro transport network architectures for the future need to support dynamic connectivity management with switching technologies at different levels that can be controlled via a programmable interface. The right combination of switching technologies depends on the level of transparency expected by the service layer through the transitions and the scale and extent of connectivity needed. © 2014 OSA.

Gupta N.,ATandT Inc. | Gilbert M.,ATandT Inc. | Di Fabbrizio G.,ATandT Inc.
Computational Intelligence | Year: 2013

Prompt and knowledgeable responses to customers' email are critical in maximizing customer satisfaction. Such messages often contain complaints about unfair treatment due to negligence, incompetence, rigid protocols, unfriendly systems, and unresponsive personnel. In this paper, we refer to these email messages as emotional email. They provide valuable feedback to improve contact center efficiency and the quality of the overall customer care experience, which in turn results in increased customer retention. We describe a method that uses salient features to identify emotional email in the customer care domain. Salient features in customer care related email are expressions of customer frustration, dissatisfaction with the business, and threats to either leave, take legal action, and/or report to authorities. Compared to a baseline system using word unigram features, our proposed approach significantly improves emotional email detection performance. © 2012 AT&T Labs, Inc.

Loading ATandT Inc. collaborators
Loading ATandT Inc. collaborators