Mountain search and rescue is a vital form of emergency response to assist people in austere environments (e.g., extreme terrain, poor weather). Volunteer mountain search and rescue teams in the United States have begun adopting consumer- grade unmanned aerial vehicles to assist a variety of tasks (e.g., search, resource delivery);...
Variation in cheese quality due to geographic location is important to cheese producers, consumers, and retailers on a global level. Understanding the impacts of geographic location of cheese plants may be useful to businesses for marketing, cost reduction, and quality improvement. Many aspects of variation due to geography have been...
Distributed version control allows developers to manage software evolution among distributed development teams. But it does not eliminate all consistency and concurrency issues, and instead introduces additional complexity when merging code. And resolving merge conflicts is nontrivial when automated merging fails. In such cases, developers are forced to inspect the...
A secret sharing scheme allows a dealer to distribute a secret with a set of parties, such that only a certain subset of parties can collaborate and learn the shared secret. Traditional secret sharing schemes have been used as building blocks in various subdomains of cryptography. Recently, two new extensions...
One of the pervasive problems arising in our modern, digital world surrounds data breaches where an adversary, through zero-day exploitations, phishing, or old-fashioned social engineering attacks, gains access to a service’s data stores. Our society increasingly relies on these cloud-based services for everything from our taxes to personal communication. As...
Over time, Open Source Software (OSS) has become indispensable in the creation and upkeep of software products, serving as the fundamental building block for widely used solutions in our daily lives, including applications that enable communication, entertainment, and productivity. A sustainable OSS ecosystem is one that attracts and retains a...
Structure Query Language (SQL) is widely used to access data stored in relational database systems. Although a powerful and flexible language, SQL can also be complex and hard to learn. For most new SQL users, it's easy to write SQL statement by following SQL grammar and syntax rules, but it's...
Deep learning is now being utilized widely in applications where sensitive data is being used for model training, for example, in health care. In this scenario, any data leakage will cause privacy concerns to whose data records are used to train the model. An attacker can actively cause privacy leakage...
Shape transformation is a technique for gradually changing one geometric shape to another. A recent approach presents the use of thin-plate radial basis functions as opposed to traditional "blobby sphere" implicit functions. Without the explicit evaluation of he energy function, this approach combined the two traditional steps into one by...