Zum Hauptinhalt springen

Showing 1–16 of 16 results for author: Harrison, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.15935  [pdf, other

    cs.IT

    Optimizing Secrecy Codes Using Gradient Descent

    Authors: David Hunn, Willie K. Harrison

    Abstract: Recent theoretical developments in coset coding theory have provided continuous-valued functions which give the equivocation and maximum likelihood (ML) decoding probability of coset secrecy codes. In this work, we develop a method for incorporating these functions, along with a complex set of constraints, into a gradient descent optimization algorithm. This algorithm employs a movement cost funct… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: 25 pages, 23 figures. Submitted to Transactions on Information Theory

  2. arXiv:2401.07141  [pdf, other

    cs.IT

    Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming

    Authors: Ali Nikkhah, Morteza Shoushtari, Bahareh Akhbari, Willie K. Harrison

    Abstract: In this paper, we use a linear programming (LP) optimization approach to evaluate the equivocation for a wiretap channel where the main channel is noiseless, and the wiretap channel is a binary symmetric channel (BSC). Using this technique, we present an analytical limit for the achievable secrecy rate in the finite blocklength regime that is tighter than traditional fundamental limits. We also pr… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: Submitted for possible Journal publication

  3. Supervised Neural Networks for RFI Flagging

    Authors: Kyle Harrison, Amit Kumar Mishra

    Abstract: Neural network (NN) based methods are applied to the detection of radio frequency interference (RFI) in post-correlation,post-calibration time/frequency data. While calibration doesaffect RFI for the sake of this work a reduced dataset inpost-calibration is used. Two machine learning approachesfor flagging real measurement data are demonstrated usingthe existing RFI flagging technique AOFlagger as… ▽ More

    Submitted 29 July, 2020; originally announced July 2020.

    Comments: This paper has been published in the Proceedings of RFI 2019 Workshop by IEEE Xplorer at: https://ieeexplore.ieee.org/xpl/conhome/9108774/proceeding

    Report number: INSPEC Accession Number: 19675340 INSPEC Accession Number: 19675340

  4. arXiv:2007.12332  [pdf, other

    cs.NE cs.HC

    Image-Based Benchmarking and Visualization for Large-Scale Global Optimization

    Authors: Kyle Robert Harrison, Azam Asilian Bidgoli, Shahryar Rahnamayan, Kalyanmoy Deb

    Abstract: In the context of optimization, visualization techniques can be useful for understanding the behaviour of optimization algorithms and can even provide a means to facilitate human interaction with an optimizer. Towards this goal, an image-based visualization framework, without dimension reduction, that visualizes the solutions to large-scale global optimization problems as images is proposed. In th… ▽ More

    Submitted 23 July, 2020; originally announced July 2020.

    Comments: Preprint submitted to Applied Intelligence. 43 pages, 30 figures

  5. arXiv:1811.06591  [pdf, other

    cs.CR

    Physical-Layer Security: Does it Work in a Real Environment?

    Authors: Benjamin Jensen, Bradford Clark, Dakota Flanary, Kalin Norman, Michael Rice, Willie K. Harrison

    Abstract: This paper applies channel sounding measurements to enable physical-layer security coding. The channel measurements were acquired in an indoor environment and used to assess the secrecy capacity as a function of physical location. A variety of Reed-Muller wiretap codes were applied to the channel measurements to determine the most effective code for the environment. The results suggest that deploy… ▽ More

    Submitted 15 November, 2018; originally announced November 2018.

    Comments: 7 pages, 7 figures

  6. arXiv:1701.05484  [pdf, other

    cs.IT

    Quantifying Equivocation for Finite Blocklength Wiretap Codes

    Authors: Jack Pfister, Marco A. C. Gomes, Joao P. Vilela, Willie K. Harrison

    Abstract: This paper presents a new technique for providing the analysis and comparison of wiretap codes in the small blocklength regime over the binary erasure wiretap channel. A major result is the development of Monte Carlo strategies for quantifying a code's equivocation, which mirrors techniques used to analyze normal error correcting codes. For this paper, we limit our analysis to coset-based wiretap… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

    Comments: Submitted to ICC 2017

  7. arXiv:1509.07092  [pdf, other

    cs.CR cs.IT

    Analysis of Short Blocklength Codes for Secrecy

    Authors: Willie K. Harrison, Dinis Sarmento, João P. Vilela, Marco Gomes

    Abstract: In this paper we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap channel models. Our metrics go beyond some of the known practical secrecy measures, such as bit error rate and security gap, so as to make lower bound probabilistic guarantees on error rates over short blocklengths both preceding and following a secrecy… ▽ More

    Submitted 23 September, 2015; originally announced September 2015.

    Comments: 10 pages, 9 figures

  8. arXiv:1307.6360  [pdf

    cs.GR physics.chem-ph

    Electronic Visualisation in Chemistry: From Alchemy to Art

    Authors: Karl Harrison, Jonathan P. Bowen, Alice M. Bowen

    Abstract: Chemists now routinely use software as part of their work. For example, virtual chemistry allows chemical reactions to be simulated. In particular, a selection of software is available for the visualisation of complex 3-dimensional molecular structures. Many of these are very beautiful in their own right. As well as being included as illustrations in academic papers, such visualisations are often… ▽ More

    Submitted 24 July, 2013; originally announced July 2013.

    Comments: 8 pages, 27 figures, EVA London 2013

    ACM Class: I.3.m; J.3; J.5

    Journal ref: EVA London 2013 Conference Proceedings, Electronic Workshops in Computing (eWiC), British Computer Society, 29-31 July 2013

  9. arXiv:1209.3315  [pdf, ps, other

    cs.PF

    Storage Workload Modelling by Hidden Markov Models: Application to FLASH Memory

    Authors: P. G. Harrison, S. K. Harrison, N. M. Patel, S. Zertal

    Abstract: A workload analysis technique is presented that processes data from operation type traces and creates a Hidden Markov Model (HMM) to represent the workload that generated those traces. The HMM can be used to create representative traces for performance models, such as simulators, avoiding the need to repeatedly acquire suitable traces. It can also be used to estimate directly the transition probab… ▽ More

    Submitted 14 September, 2012; originally announced September 2012.

    Comments: 29 pages, 18 figures

    Journal ref: Performance Evaluation 69, 1 (2012), 17-40

  10. Physical-Layer Security over Correlated Erasure Channels

    Authors: W. K. Harrison, J. Almeida, S. W. McLaughlin, J. Barros

    Abstract: We explore the additional security obtained by noise at the physical layer in a wiretap channel model setting. Security enhancements at the physical layer have been proposed recently using a secrecy metric based on the degrees of freedom that an attacker has with respect to the sent ciphertext. Prior work focused on cases in which the wiretap channel could be modeled as statistically independent p… ▽ More

    Submitted 17 February, 2011; originally announced February 2011.

    Comments: 5 pages, 4 figures, submitted to ISIT 2011

  11. Coding for Cryptographic Security Enhancement using Stopping Sets

    Authors: W. K. Harrison, J. Almeida, S. W. McLaughlin, J. Barros

    Abstract: In this paper we discuss the ability of channel codes to enhance cryptographic secrecy. Toward that end, we present the secrecy metric of degrees of freedom in an attacker's knowledge of the cryptogram, which is similar to equivocation. Using this notion of secrecy, we show how a specific practical channel coding system can be used to hide information about the ciphertext, thus increasing the diff… ▽ More

    Submitted 15 February, 2011; originally announced February 2011.

    Comments: 13 pages, 8 figures

  12. Tandem Coding and Cryptography on Wiretap Channels: EXIT Chart Analysis

    Authors: Willie K Harrison, Steven W. McLaughlin

    Abstract: Traditional cryptography assumes an eavesdropper receives an error-free copy of the transmitted ciphertext. Wyner's wiretap channel model recognizes that at the physical layer both the intended receiver and the passive eavesdropper inevitably receive an error-prone version of the transmitted message which must be corrected prior to decryption. This paper considers the implications of using both… ▽ More

    Submitted 4 May, 2009; originally announced May 2009.

    Comments: 11 pages, 5 figures, accepted at 2009 IEEE International Symposium on Information Theory (ISIT 2009)

  13. Ganga: a tool for computational-task management and easy access to Grid resources

    Authors: J. T. Mościcki, F. Brochu, J. Ebke, U. Egede, J. Elmsheuser, K. Harrison, R. W. L. Jones, H. C. Lee, D. Liko, A. Maier, A. Muraru, G. N. Patrick, K. Pajchel, W. Reece, B. H. Samset, M. W. Slater, A. Soroko, C. L. Tan, D. C. Vanderster, M. Williams

    Abstract: In this paper, we present the computational task-management tool Ganga, which allows for the specification, submission, bookkeeping and post-processing of computational tasks on a wide set of distributed resources. Ganga has been developed to solve a problem increasingly common in scientific projects, which is that researchers must regularly switch between different processing systems, each with… ▽ More

    Submitted 9 June, 2009; v1 submitted 16 February, 2009; originally announced February 2009.

    Comments: Extended and clarified information on the Grid computing context for Ganga, supported job model etc. Additional minor corrections and clarifications. Updated the author list as agreed with the Ganga team

    ACM Class: C.2.4; H.3.4; J.2; J.3

  14. Physical-Layer Security: Combining Error Control Coding and Cryptography

    Authors: Willie K Harrison, Steven W. McLaughlin

    Abstract: In this paper we consider tandem error control coding and cryptography in the setting of the {\em wiretap channel} due to Wyner. In a typical communications system a cryptographic application is run at a layer above the physical layer and assumes the channel is error free. However, in any real application the channels for friendly users and passive eavesdroppers are not error free and Wyner's wi… ▽ More

    Submitted 16 April, 2009; v1 submitted 2 January, 2009; originally announced January 2009.

    Comments: 12 pages, 5 figures. Submitted and accepted to the International Conference on Communications (ICC) 2009. v2: equivalent to the version that will be published in the conference proceedings. Has some altered notation from version 1 as well as slight changes in the wording to make the paper more readable and easier to understand

    ACM Class: H.1.1; K.6.5

  15. arXiv:cs/0306085  [pdf, ps, other

    cs.SE

    GANGA: a user-Grid interface for Atlas and LHCb

    Authors: K. Harrison, W. T. L. P. Lavrijsen, P. Mato, A. Soroko, C. L. Tan, C. E. Tull, N. Brook, R. W. L. Jones

    Abstract: The Gaudi/Athena and Grid Alliance (GANGA) is a front-end for the configuration, submission, monitoring, bookkeeping, output collection, and reporting of computing jobs run on a local batch system or on the grid. In particular, GANGA handles jobs that use applications written for the Gaudi software framework shared by the Atlas and LHCb experiments. GANGA exploits the commonality of Gaudi-based… ▽ More

    Submitted 13 June, 2003; originally announced June 2003.

    Comments: 9 pages, 3 figures, CHEP 2003, March 2003, La Jolla, California, PSN TUCT002

    ACM Class: D.2.6

  16. arXiv:cs/0306060  [pdf

    cs.DC

    DIRAC - Distributed Infrastructure with Remote Agent Control

    Authors: N. Brook, A. Bogdanchikov, A. Buckley, J. Closier, U. Egede, M. Frank, D. Galli, M. Gandelman, V. Garonne, C. Gaspar, R. Graciani Diaz, K. Harrison, E. van Herwijnen, A. Khan, S. Klous, I. Korolko, G. Kuznetsov, F. Loverre, U. Marconi, J. P. Palacios, G. N. Patrick, A. Pickford, S. Ponce, V. Romanovski, J. J. Saborido , et al. (5 additional authors not shown)

    Abstract: This paper describes DIRAC, the LHCb Monte Carlo production system. DIRAC has a client/server architecture based on: Compute elements distributed among the collaborating institutes; Databases for production management, bookkeeping (the metadata catalogue) and software configuration; Monitoring and cataloguing services for updating and accessing the databases. Locally installed software agents im… ▽ More

    Submitted 12 June, 2003; originally announced June 2003.

    Comments: Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 8 pages, Word, 5 figures. PSN TUAT006

    ACM Class: C.2.4