About
11
Publications
3,312
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
434
Citations
Introduction
Tao Lin currently works at the College of Information Sciences and Technology, Pennsylvania State University. Tao does research in Computer Engineering, Computer Communications (Networks) and Computer Security and Reliability. Their most recent publication is 'A Novel Bug Report Extraction Approach'.
Skills and Expertise
Additional affiliations
September 2010 - July 2013
September 2009 - July 2016
Publications
Publications (11)
There are two major points in the social construction of technology. In part I, human action shapes technology. In part II, SCOT argues that technological innovation is not the result of the mythical and lone man who introduce new 'technologies'. Part I Technology determining human action (technology determinism), or human action shaping technology...
From ANT, technology is not lone technology, rather technology is a network, which is the combination of knowledge, action and power. Previously, one of the authors (Lin Tao) illustrated ANT in Terms of Enhanced Interrogation Techniques. In this paper, we illustrated ANT by the example of News of the World from above three perspectives and the prof...
Because of COVID-19, A large number of tech companies transferred to virtual onboarding for new hires. Is it different or hard to virtual onboarding? This presentation is targeted at new hires, who is joined Amazon recently, for engaging a remote team quickly at Amazon. Perhaps it’s your first time onboarding a remote team. Or perhaps you’ve been o...
Data triage is a fundamental stage of cyber defense analysis for achieving cyber situational awareness in a Security Operations Center (SOC). It has a high requirement for cyber security analysts' capabilities of information processing and expertise in cyber defense. However, the present situation is that most novice analysts who are responsible fo...
Triage analysis is a fundamental stage in cyber operations in Security Operations Centers (SOCs). The massive data sources generate great demands on cyber security analysts’ capability of information processing and analytical reasoning. Furthermore, most junior security analysts perform much less efficiently than senior analysts in deciding what da...
There are more and more bug reports in software. Software companies and developers invest a large number of resources into the dramatic accumulation of reports. We introduce Bayes classifier into bug reports compression, which is the first effort in the literature. For this purpose, the vector space model as well as some conventional text mining va...