Patents
- J. Mugan and M. Thanky. (2021). U.S. patent 11,188,827. Minimal Trust Data Sharing.
- J. Mugan, L. Hitt, J. Goode, R. Gregory, and Y. Qu. (2019). U.S. patent 10,445,356. Method and System for Analyzing Entities.
- T. Coffman, J. Mugan, and E. McDermid. (2014). U.S. patent 8,874,616 B1. Method and Apparatus for Fusion of Multi-Modal Interaction Data.
- L. Hitt and M. McClain. (2011). U.S. patent 9,276,948 B2. Method and System for Identifying a Threatening Network.
- T. Coffman. (2008). U.S. patent 8,467,628 B2 and 8,929,645 B2. Method and System for Fast Dense Stereoscopic Ranging.
- M. McClain. (2008). U.S. patent 9,020,816 A1. Hidden Markov Model for Speech Processing with Training Method.
- T. Coffman and R. Larcom. (2008). U.S. patent 8,611,591 B2. Method and System for Visually Tracking with Occlusions.
- D. Taylor and L. Alford. (2007). U.S. patent 8,069,127. Method and System for Solving an Optimization Problem with Dynamic Constraints.
Publications
Note: our recent customers have not wanted us to publish our specific technical advances, so we have not. We have, however, written general overviews of AI, such as Strong AI Requires Autonomous Building of Composable Models published in The Gradient, and blog posts published here.
Jonathan Mugan, Ranga Chari, Laura Hitt, Eric McDermid, Marsha Sowell, Yuan Qu, and Thayne Coffman. “Entity Resolution Using Inferred Relationships and Behavior.” IEEE International Conference on Big Data (BigData-14). 2014.
Jonathan Mugan and Aram Khalili. “The Application of Top-Down Abstraction Learning Using Prediction as a Supervisory Signal to Cyber Security.” SPIE Defense, Security, and Sensing. Machine Intelligence and Bio-inspired Computation: Theory and Applications VIII (SPIE+DSS-14). 2014.
Jonathan Mugan, Eric McDermid, Abbey McGrew, and Laura Hitt. “Identifying Groups of Interest through Temporal Analysis and Event Response Monitoring.” IEEE Conference on Intelligence and Security Informatics (ISI-13). 2013.
Jonathan Mugan and Matt McClain. “The Application of Developmental Learning to Cyber Security.” Biologically Inspired Cyber Defense Workshop (BICD-12). 2012.
L. Hitt, M. McClain, “Identifying Threatening Networks from Transactional Data,” Extended Abstract in Proceedings of IEEE Information and Security Informatics 2013.
L. Hitt, M. McClain, “Asymmetric Threat Human Network Behavior Signatures from Network Data,” Military Operations Research Society (MORS) 79th Symposium 2011.
McClain, M. and Romanowski, B., “Speech endpoint detection with non-language speech sounds for generic speech processing applications,” in Proc. SPIE 2009 Defense, Security, and Sensing, Vol. 7305, 2009.
S. Marcus, “Presentation on Dynamic Network Aggregation.” Presented to Office of Naval Research Code 30 Performers at Naval Post Graduate School, August 2007.
S. Marcus, M. Moy, and T. Coffman, “Social Network Analysis,” in Mining Graph Data, D.J. Cook and L.B. Holder, eds., pp. 443-468, John Wiley & Sons, Hoboken, NJ, 2007.
S. Greenblatt, T. Coffman, and S. Marcus, “Behavioral Network Analysis for Terrorist Detection,” in Emergent Information Technologies and Enabling Policies for Counter-Terrorism, R. L. Popp, J. Yen, eds., pp. 331-348, IEEE Press, Piscataway, NJ, 2006.
T. Coffman, S. Greenblatt, and S. Marcus, “Graph-Based Technologies for Intelligence Analysis,” Communications of the ACM: Special Edition on Emerging Technologies for Homeland Security, Vol. 47, No. 3, pp. 45-47, March 2004.
S. Marcus and T. Coffman, “Pattern Classification in Social Network Analysis: A Case Study,” Proceedings of the 2004 IEEE Aerospace Conference, March 6-13, 2004
S. Marcus, B. Thomason and T. Coffman, “Sensitivity of Social Network Analysis Metrics to Observation Noise,” Proc. IEEE Aerospace Conf., March 6-13, 2004, Big Sky, MT.
S. Marcus and T. Coffman, “Dynamic Classification of Suspicious Groups Using Social Network Analysis and HMMs,” Proceedings of the 2004 IEEE Aerospace Conference, March 6-13, 2004.
S. Marcus and T. Coffman, “Graph Matching and Link Analysis in Computer Security.” Proceedings of the 2002 International Conference on Information and Knowledge Engineering: 32-38. CSREA Press. June 24-27 2002, Las Vegas, NV.
S. Marcus and D. Taylor, “IMPACT: Intelligent Mining Platform for Counter Terrorism.” IEEE Data Fusion Conference. July 1999.
S. Marcus. “Data Mining Techniques for Very Large Database Systems,” IEEE Transactions on Knowledge and Data Engineering, Third Annual Conference on Data Engineering, Rome, New York Oct. 1998 pp 324-328.
S. Marcus. “Information Exploitation using Data Mining Techniques.” IEEE Conference on Information Technologies. Sept 1998.
T. Coffman, “Fast and Accurate 3D Reconstruction from Calibrated Monocular Video,” Ph.D. dissertation, in preparation, defense expected Spring 2010.
T. Coffman and A.C. Bovik, “Dense stereoscopic ranging via stochastic sampling of match quality,” accepted for publication in IEEE Transactions on Image Processing, 2009.
S. Dubuque, T. Coffman, P. McCarley, A. C. Bovik, and C.W. Thomas, “A comparison of foveated acquisition and tracking performance relative to uniform resolution approaches,” Proc. SPIE Defense, Security, and Sensing, Vol. 7321, 2009.
T. Coffman and A.C. Bovik, “Fast computation of dense stereo correspondences by stochastic sampling of match quality,” Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, Las Vegas, March 30 – April 4, 2008.
S. Marcus, M. Moy, and T. Coffman, “Social Network Analysis,” in Mining Graph Data, D.J. Cook and L.B. Holder, eds., pp. 443-468, John Wiley & Sons, Hoboken, NJ, 2007.
P. Fidelman, T. Coffman, and R. Miikkulainen, “Detecting Motion in the Environment with a Moving Quadruped Robot,” Proc. RoboCup-2006: Robot Soccer World Cup X. G. Lakemeyer et al, editors, Springer-Verlag, Berlin, 2007.
J. Wan, M. Moy, T. Darr, T. Coffman, J. Snyder, M. Hollinger, and B. Thomason, “Key Elements of an Evidence Detection System,” AAAI Fall Symposium on Capturing and Using Patterns for Evidence Detection, pp. 62-67, Oct 13-15, 2006.
T. Coffman and C. Julien, “Geodesic packet routing over self-organizing mobile ad-hoc virtual coordinates,” Technical Report TR-UTEDGE-2006-011, University of Texas at Austin, 2006.
S. Greenblatt, T. Coffman, and S. Marcus, “Behavioral Network Analysis for Terrorist Detection,” in Emergent Information Technologies and Enabling Policies for Counter-Terrorism, R. L. Popp, J. Yen, eds., pp. 331-348, IEEE Press, Piscataway, NJ, 2006.
T. Coffman, “Graph-based intelligence analysis,” in 2006 McGraw-Hill Yearbook of Science & Technology, E. Geller, et al, eds., pp. 146-148, McGraw-Hill, New York, NY, 2006.
T. Coffman, B.L. Evans, and A.C. Bovik, “Halftoning-Inspired Methods for Foveation in Variable-Acuity Superpixel Imager Cameras,” Proc. IEEE Asilomar Conf. on Signals, Systems, and Computers, Oct. 30 - Nov. 2, 2005, Pacific Grove, CA.
T. Coffman, S. Greenblatt, and S. Marcus, “Graph-Based Technologies for Intelligence Analysis,” Communications of the ACM: Special Edition on Emerging Technologies for Homeland Security, Vol. 47, No. 3, pp. 45-47, March 2004.
T. Coffman and S. Marcus, “Pattern Classification in Social Network Analysis: A Case Study,” Proc. IEEE Aerospace Conf., March 6-13, 2004, Big Sky, MT.
T. Coffman and S. Marcus, “Dynamic Classification of Groups Using Social Network Analysis and HMMs,” Proc. IEEE Aerospace Conf., March 6-13, 2004, Big Sky, MT.
B. Thomason, T. Coffman, and S. Marcus, “Sensitivity of Social Network Analysis Metrics to Observation Noise” Proc. IEEE Aerospace Conf., March 6-13, 2004, Big Sky, MT.
T. Coffman and S. Marcus, “Graph Matching and Link Analysis in Computer Security,” Proc. Int. Conf. on Information and Knowledge Engineering (IKE’02), June 24-27, 2002, Las Vegas, NV.
T. Coffman, “A Framework for Automated System Testing,” M.Eng. Thesis, MIT Press, June 1996.