Skip to main content

Showing 1–5 of 5 results for author: Champion, A

.
  1. arXiv:2102.11171  [pdf, other

    cs.SI cs.CY

    WLAN-Log-Based Superspreader Detection in the COVID-19 Pandemic

    Authors: Cheng Zhang, Yunze Pan, Yunqi Zhang, Adam C. Champion, Zhaohui Shen, Dong Xuan, Zhiqiang Lin, Ness B. Shroff

    Abstract: Identifying "superspreaders" of disease is a pressing concern for society during pandemics such as COVID-19. Superspreaders represent a group of people who have much more social contacts than others. The widespread deployment of WLAN infrastructure enables non-invasive contact tracing via people's ubiquitous mobile devices. This technology offers promise for detecting superspreaders. In this paper… ▽ More

    Submitted 29 March, 2021; v1 submitted 22 February, 2021; originally announced February 2021.

    Comments: Accepted to Elsevier High-Confidence Computing Journal

  2. arXiv:2006.13362  [pdf, other

    cs.CR cs.NI cs.SD cs.SI eess.AS

    ACOUSTIC-TURF: Acoustic-based Privacy-Preserving COVID-19 Contact Tracing

    Authors: Yuxiang Luo, Cheng Zhang, Yunqi Zhang, Chaoshun Zuo, Dong Xuan, Zhiqiang Lin, Adam C. Champion, Ness Shroff

    Abstract: In this paper, we propose a new privacy-preserving, automated contact tracing system, ACOUSTIC-TURF, to fight COVID-19 using acoustic signals sent from ubiquitous mobile devices. At a high level, ACOUSTIC-TURF adaptively broadcasts inaudible ultrasonic signals with randomly generated IDs in the vicinity. Simultaneously, the system receives other ultrasonic signals sent from nearby (e.g., 6 feet) u… ▽ More

    Submitted 23 June, 2020; originally announced June 2020.

  3. arXiv:1803.03367  [pdf, other

    q-bio.OT

    NeuroStorm: Accelerating Brain Science Discovery in the Cloud

    Authors: Gregory Kiar, Robert J. Anderson, Alex Baden, Alexandra Badea, Eric W. Bridgeford, Andrew Champion, Vikram Chandrashekhar, Forrest Collman, Brandon Duderstadt, Alan C. Evans, Florian Engert, Benjamin Falk, Tristan Glatard, William R. Gray Roncal, David N. Kennedy, Jeremy Maitin-Shepard, Ryan A. Marren, Onyeka Nnaemeka, Eric Perlman, Sharmishtaas Seshamani, Eric T. Trautman, Daniel J. Tward, Pedro Antonio Valdés-Sosa, Qing Wang, Michael I. Miller , et al. (2 additional authors not shown)

    Abstract: Neuroscientists are now able to acquire data at staggering rates across spatiotemporal scales. However, our ability to capitalize on existing datasets, tools, and intellectual capacities is hampered by technical challenges. The key barriers to accelerating scientific discovery correspond to the FAIR data principles: findability, global access to data, software interoperability, and reproducibility… ▽ More

    Submitted 20 March, 2018; v1 submitted 8 March, 2018; originally announced March 2018.

    Comments: 10 pages, 4 figures, hackathon report

  4. arXiv:1501.02484  [pdf, other

    cs.LG cs.CR cs.DC cs.NI

    Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices

    Authors: Jihun Hamm, Adam Champion, Guoxing Chen, Mikhail Belkin, Dong Xuan

    Abstract: Smart devices with built-in sensors, computational capabilities, and network connectivity have become increasingly pervasive. The crowds of smart devices offer opportunities to collectively sense and perform computing tasks in an unprecedented scale. This paper presents Crowd-ML, a privacy-preserving machine learning framework for a crowd of smart devices, which can solve a wide range of learning… ▽ More

    Submitted 11 January, 2015; originally announced January 2015.

  5. arXiv:1301.0039  [pdf, other

    cs.LO cs.CE cs.SE

    Generating Property-Directed Potential Invariants By Backward Analysis

    Authors: Adrien Champion, Rémi Delmas, Michael Dierkes

    Abstract: This paper addresses the issue of lemma generation in a k-induction-based formal analysis of transition systems, in the linear real/integer arithmetic fragment. A backward analysis, powered by quantifier elimination, is used to output preimages of the negation of the proof objective, viewed as unauthorized states, or gray states. Two heuristics are proposed to take advantage of this source of info… ▽ More

    Submitted 31 December, 2012; originally announced January 2013.

    Comments: In Proceedings FTSCS 2012, arXiv:1212.6574

    Journal ref: EPTCS 105, 2012, pp. 22-38