George Cybenko

ORCID: 0000-0001-7734-2912
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Advanced Malware Detection Techniques
  • Distributed and Parallel Computing Systems
  • Mobile Agent-Based Network Management
  • Neural Networks and Applications
  • Parallel Computing and Optimization Techniques
  • Target Tracking and Data Fusion in Sensor Networks
  • Complex Network Analysis Techniques
  • Peer-to-Peer Network Technologies
  • Algorithms and Data Compression
  • Matrix Theory and Algorithms
  • Opinion Dynamics and Social Influence
  • Advanced Database Systems and Queries
  • Smart Grid Security and Resilience
  • Blind Source Separation Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Distributed systems and fault tolerance
  • Cloud Computing and Resource Management
  • Optimization and Search Problems
  • Bayesian Methods and Mixture Models
  • Machine Learning and Algorithms
  • Software System Performance and Reliability
  • Service-Oriented Architecture and Web Services
  • Adversarial Robustness in Machine Learning

Dartmouth College
2014-2024

Dartmouth Hospital
2006-2024

Tufts University
1982-2005

Health Affairs
2005

University of Technology Malaysia
2002

University of Illinois Urbana-Champaign
1988-1992

National Center for Supercomputing Applications
1990-1991

Massachusetts Institute of Technology
1983-1987

Purdue University West Lafayette
1987

Decision Systems (United States)
1983

10.1007/bf02551274 article EN Mathematics of Control Signals and Systems 1989-12-01

10.1016/0743-7315(89)90021-x article EN Journal of Parallel and Distributed Computing 1989-10-01

10.1007/bf02134016 article EN Mathematics of Control Signals and Systems 1992-12-01

In this paper we examine the role of very simple and noisy sensors for tracking problem. We propose a binary sensor model, where each sensor's value is converted reliably to one bit information only: whether object moving toward or away from sensor. show that network has geometric properties can be used develop solution with present resulting algorithms simulation experiments. particle filtering style algorithm target using such minimalist sensors. an analysis fundamental limitation under...

10.1145/958491.958509 article EN 2003-11-05

10.1016/s1389-1286(00)00045-1 article EN Computer Networks 2000-06-01

The numerical stability of the Levinson-Durbin algorithm for solving Yule-Walker equations with a positive-definite symmetric Toeplitz matrix is studied. Arguments based on analytic results an error analysis fixed-point and floating-point arithmetics show that stable in fact comparable to Cholesky algorithm. Conflicting evidence accuracy performance explained by demonstrating underlying typically ill-conditioned most applications.

10.1137/0901021 article EN SIAM Journal on Scientific and Statistical Computing 1980-09-01

Mobile computers have become increasingly popular as users discover the benefits of having their electronic work available at all times. Using Internet resources from a mobile platform, however, is major challenge. do not permanent network connection and are often disconnected for long periods. When computer connected, prone to sudden failure, such when physical obstruction blocks signal cellular modem. In addition, performs poorly can vary dramatically one session next, since might use...

10.1109/4236.612217 article EN IEEE Internet Computing 1997-01-01

Abstract D'Agents is a general‐purpose mobile‐agent system that has been used in several information‐retrieval applications. In this paper, we first examine one such application, operational support for military field personnel, where greatly simplifies the task of providing efficient, application‐specific access to remote information resources. After describing discuss key differences between and most other systems, notably its strong mobility multiple agent languages. Finally, derive...

10.1002/spe.449 article EN Software Practice and Experience 2002-04-12

Most information depreciates over time, so keeping Web pages current presents new design challenges. This article quantifies what "current" means for search engines and estimates how often they must reindex the to keep with its changing structure.

10.1109/2.841784 article EN Computer 2000-05-01

The gossip problem involves communicating a unique item from each node in graph to every other node. This paper studies the minimum time required do this under weakest model of parallel communication, which allows participate just one communication at as either sender or receiver. A number topologies are studied, including omplete graph, grids, hypercubes, and rings. Definitive new optimal algorithms derived for complete graphs, rings, regular toroidal grids that significantly extend...

10.1137/0221010 article EN SIAM Journal on Computing 1992-02-01

The training problem for feedforward neural networks is nonlinear parameter estimation that can be solved by a variety of optimization techniques. Much the literature on has focused variants gradient descent. using such techniques known to slow process with more sophisticated not always performing significantly better. This paper shows have ill-conditioned Hessians and this ill-conditioning quite common. analysis experimental results in lead conclusion many network problems are ill...

10.1137/0914044 article EN SIAM Journal on Scientific Computing 1993-05-01

In the past three years, Perfect Benchmark TM Suite has evolved from a supercomputer performance evaluation plan, presented by Kuck and Sameh at 1987 International Conference on Supercomputing, to vigorous international activity. This paper surveys current state of this effort with particular focus adopted methodology. While there been considerable success in achieving goals some issues remain unresolved, new questions have surfaced.

10.1145/255129.255163 article EN ACM SIGARCH Computer Architecture News 1990-06-01

QuERIES offers a novel multidisciplinary approach to quantifying risk associated with security technologies resulting in investment-efficient cybersecurity strategies. R esearchers can use the methodology rigorously determine, for first time, appropriate investment levels and strategies protection of intellectual property complex systems. As result, it have significant immediate impact on critical IP, including weapons systems chip designs, computer software, databases containing personal...

10.1109/mc.2008.295 article EN Computer 2008-08-01

Vulnerability remediation is a critical task in operational software and network security management. In this article, an effective vulnerability management strategy, called VULCON (VULnerability CONtrol), developed evaluated. The strategy based on two fundamental performance metrics: (1) time-to-vulnerability (TVR) (2) total exposure (TVE). takes as input real scan reports, metadata about the discovered vulnerabilities, asset criticality, personnel resources. uses mixed-integer...

10.1145/3196884 article EN ACM Transactions on Privacy and Security 2018-06-12

Quantum computations are intimately connected with unitary operators. This article shows that standard techniques from numerical linear algebra can be used to represent quantum as sequences of simple operations, called Givens operators, on single bits.

10.1109/5992.908999 article EN Computing in Science & Engineering 2001-01-01

On 25 August 2000, stockholders were stunned by news that server and storage provider Emulex was revising its earnings from a per-share gain to loss, while lowering reported net the previous quarter as well. Within minutes, shares plummeted. Yet none of this fostered hacker's bogus press release - true. The case illustrates speed, scale, subtlety with which networked information can propagate how quickly severe consequences occur. This rapid dissemination, makes such cognitive hacking...

10.1109/mc.2002.1023788 article EN Computer 2002-08-01

A method for computing the smallest eigenvalue of a symmetric positive definite Toeplitz matrix is given. It relies solely upon Levinson–Durbin algorithm. The procedure involves combination bisection and Newton’s method. Good starting values are also shown to be obtainable from

10.1137/0907009 article EN SIAM Journal on Scientific and Statistical Computing 1986-01-01

A new orthogonalization technique is presented for computing the<italic>QR</italic>factorization of a general<inline-formula content-type="math/mathml"><mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" alttext="n times p"><mml:semantics><mml:mrow><mml:mi>n</mml:mi><mml:mo>×<!-- × --></mml:mo><mml:mi>p</mml:mi></mml:mrow><mml:annotation encoding="application/x-tex">n \times p</mml:annotation></mml:semantics></mml:math></inline-formula>matrix full rank<inline-formula alttext="p...

10.1090/s0025-5718-1983-0679449-6 article EN Mathematics of Computation 1983-01-01
Coming Soon ...