David Wood

David Wood
IBM · Distributed Cognitive IoT

MS Computer Science

About

33
Publications
4,629
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
286
Citations

Publications

Publications (33)
Conference Paper
Full-text available
Acoustic signals contain rich information of the environment. They can be used for detecting anomalous events such as in automated machine monitoring. In this demonstration, we present our acoustic anomaly detection system that captures acoustic signals and classifies them using machine learning techniques. Our system includes a server for sound ma...
Conference Paper
Full-text available
Smart speakers have been recently adopted and widely used in consumer homes, largely as a communication interface between human and machines. In addition, these speakers can be used to monitor sounds other than human voice, for example, to watch over elderly people living alone, and to notify if there are changes in their usual activities that may...
Technical Report
Full-text available
This technical report describes our proposed design and implementation of the system used for the DCASE 2018 Challenge submission. The work focuses on Task 5 of the challenge, which is about monitoring and classifying domestic activities based on multi-channel acoustics. We propose data augmentation techniques using shuffling and mixing two sounds...
Conference Paper
Full-text available
We present a system that uses acoustic signals to monitor equipment in commercial buildings, such as in machine rooms with HVAC system components. The system uses an ensemble of machine learning classifiers to effectively label signals as either "normal" or "abnormal". We collect audio clips from mobile devices in a machine room and an elevator sha...
Conference Paper
Softwarization of network functions running on commodity servers, switches, and storage by leveraging standard IT virtualization and cloud technologies has become a goal of communications service providers (CSPs). Management and orchestration (MANO) is crucial for achieving this network functions virtualization (NFV) vision. We propose an open plat...
Conference Paper
Full-text available
The U.S. Army Research Laboratory (ARL) Multimodal Signatures Database (MMSDB) consists of a number of colocated relational databases representing a collection of data from various sensors. Role-based access to this data is granted to external organizations such as DoD contractors and other government agencies through a client Web portal. In the cu...
Patent
Full-text available
A technique provides policy management within a policy-managed environment. A policy management agent retrieves a policy enforcement point (PEP) description from a PEP registry. The policy management agent utilizes the PEP description of the PEP to search a policy library to locate and determine matching (candidate) policies, and the matching polic...
Article
There is an increasing interest in using logic programming to specify and implement distributed algorithms, including a variety of network applications. These are applications where data and computation are distributed among several devices and where, in principle, all the devices can exchange data and share the computational results of the group....
Patent
Full-text available
A method for pre-verification of a code module when the code module is installed or updated in a virtual machine, comprising: loading codes in the installed or updated code module; performing code verification on the codes in the code module; if the code verification is passed, generating a certificate of the code module; and storing the code modul...
Conference Paper
In this paper we describe the implementation of a declarative framework to support the development of distributed management applications. The framework is based on an extension of declarative networking, an asynchronous computational model that uses recursive SQL as its foundation and has been successfully used for the implementation of multiple n...
Conference Paper
Policy supersession provides a framework for maintaining coherence in a partitioned network. This is most relevant for mission critical policy-based networks where the on-going operations of the system require a greater level of flexibility and resilience in dealing with network communication failure.
Conference Paper
Sensor networks find application in many tactical ISR/ISTAR processes and applications. However, these processes and applications depend on reliable collection, distribution and delivery of information that, typically, travels over multiple interconnecting nodes to reach processing centres, and are susceptible to various disruptions such as the one...
Conference Paper
Sensor networks are used for applications in monitoring harsh environments including reconnaissance and surveillance of areas that may be inaccessible to humans. Such applications depend on reliable collection, distribution and delivery of information to processing centres which may involve multi-hop wireless networks which experience disruptions i...
Article
Full-text available
Within a coalition environment, ad hoc Communities of Interest (CoI's) come together, perhaps for only a short time, with different sensors, sensor platforms, data fusion elements, and networks to conduct a task (or set of tasks) with different coalition members taking different roles. In such a coalition, each organization will have its own inhere...
Article
This paper evaluates the performance of a popular open-source Session Initiation Protocol (SIP) server on three different multicore architectures. We examine the baseline performance and introduce three analysis-driven optimizations that involve increasing the number of slots in hash tables, an in-memory database for user authentication information...
Article
The salient characteristic of a coalition network is that two networks that may have evolved independently are brought together for a common operation. Dynamic communities of interests need to be established among the two networks, and establishing such communities requiring federating the assets and resources available in the disparate networks th...
Article
Full-text available
We discuss the techniques and benefits of migrating the bodies of loaded, but unused (cold), Java methods to secondary classes which need not be loaded, thus reducing the amount of resources required for Java class loading, storage and verification. The migration is done using binary refactoring of compiled Java classes. We tested two popular appli...
Conference Paper
Full-text available
When data from two or more coalition members is used in a joint mission, the flow of any information over the respective networks must be tightly controlled. Data sent over the networks would be routed through nodes that should enforce policies concerning: what information about each coalition member's assets will be exchanged with other coalition...
Article
Advances in GPS, personal locator technology, Internet and network technology, and the rapidly growing number of mobile personal devices are helping to drive the fast growth of mobile e-commerce, we refer to as m-commerce. A special case of m-commerce is enabled with location based services (LBS) where often the actual position of the terminal is u...
Chapter
Advances in GPS, personal locator technology, Internet and network technology, and the rapidly growing number of mobile personal devices are helping to drive the fast growth of mobile e-commerce, we refer to as m-commerce. A special case of m-commerce is enabled with location based services (LBS) where often the actual position of the terminal is u...
Conference Paper
From manufacturers, distributors, and retailers of consumer goods to government departments, enterprises of all kinds are gearing up to use RFID technology to increase the visibility of goods and assets within their supply chain and on their premises. However, RFID technology alone lacks the capability to track the location of items once they are m...
Article
Full-text available
We introduce a telematics-oriented event detection service, and programming framework supporting it, that enables application developers to more easily develop applications based on the sense-and-respond model. The system pro-vides a rule-based programming model in which the application is partitioned in two parts: (1) a set of rules that op-erate...
Patent
A system and method to facilitate communications among team members or subscribers using a virtual assistant and a derived points of contact (POC) list to initiate contacts. The virtual assistant automates the task of reaching a party to be contacted through trying a variety of POC options until a connection is established or the options are exhaus...
Conference Paper
To better support location-aware applications for mobile users, we introduce "adaptive service binding middleware." Though location-aware applications are highly valuable for mobile users, this very mobility presents a significant challenge for application developers. Location-based services available in one region become unavailable or irrelevant...
Article
Full-text available
The advent of mobile devices and the wireless Internet is having a profound impact on the way people communicate, as well as on the user interaction paradigms used to access information that was traditionally accessible only through visual interfaces. Applications for mobile devices entail the integration of various data sources optimized for deliv...
Conference Paper
Full-text available
A study was conducted with 78 subjects to evaluate the comprehensibility of synthetic speech for various tasks ranging from short, simple e-mail messages to longer news articles on mostly obscure topics. Comprehension accuracy for each subject was measured for synthetic speech and for recorded human speech. Half the subjects were allowed to take no...
Article
Full-text available
A Resilient Distributed Policy Repository (RDPR) supports the modification, dissemination and uniform execution of operational policies across complex network topologies spanning multiple organizations, geographies and domains. Operating in a highly dynamic environment, such as in Mobile Ad Hoc Networks (MANETs), network partitions form due to node...

Network

Cited By

Projects

Projects (2)
Archived project
The International Technology Alliance in Network and Information Sciences (NIS-ITA) refers to a series of research programs that were jointly sponsored by UK Ministry of Defence (United Kingdom) and the US Army Research Laboratory (ARL). One such program focusing on network sciences NIS-ITA ran from 2006 to 2016. The other program focusing on distributed analytics DAIS-ITA was initiated in 2016. https://en.wikipedia.org/wiki/International_Technology_Alliance