Aaron Hunter

ORCID: 0000-0003-4321-4677
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Logic, Reasoning, and Knowledge
  • Bayesian Modeling and Causal Inference
  • Multi-Agent Systems and Negotiation
  • Access Control and Trust
  • User Authentication and Security Systems
  • Semantic Web and Ontologies
  • Cryptography and Data Security
  • AI-based Problem Solving and Planning
  • Advanced Malware Detection Techniques
  • Advanced Authentication Protocols Security
  • Cinema and Media Studies
  • Privacy, Security, and Data Protection
  • Silicon and Solar Cell Technologies
  • Calibration and Measurement Techniques
  • Artistic and Creative Research
  • Network Security and Intrusion Detection
  • Digital and Cyber Forensics
  • Smart Grid Energy Management
  • Adversarial Robustness in Machine Learning
  • Art, Politics, and Modernism
  • Advancements in Photolithography Techniques
  • Bluetooth and Wireless Communication Technologies
  • Laser Material Processing Techniques
  • Photography and Visual Culture
  • Advanced Algebra and Logic

British Columbia Institute of Technology
2015-2024

Trinity College Dublin
2021

Queen's University Belfast
2012-2018

George Mason University
2016

Thompson Rivers University
2012

Applied Materials (United States)
2003-2011

Simon Fraser University
2002-2009

Belief revision is concerned with incorporating new information into a pre-existing set of beliefs. When the comes from another agent, we must first determine if that agent should be trusted. In this paper, define trust as pre-processing step before revision. We emphasize in an often restricted to particular domain expertise. demonstrate form can captured by associating state partition each then relativizing all reports revising. position resulting family trust-sensitive operators within...

10.1613/jair.5521 article EN cc-by Journal of Artificial Intelligence Research 2018-03-30

In action domains where agents may have erroneous beliefs, reasoning about the effects of actions involves belief change. this paper, we use a transition system approach to reason evolution an agent's beliefs as are executed. Some cause agent perform revision while others update, but interaction between and update can be non-elementary. We present set rationality properties describing introduce new class change operators for alternating sequences revisions updates. Our characterized in terms...

10.1613/jair.3132 article EN publisher-specific-oa Journal of Artificial Intelligence Research 2011-01-30

Autonomous Internet-of-Things (IoT) are comprised of moving objects such as drones and rovers that use self-control techniques to accomplish a mission while following path. However, losing control in systems usually by spoofing their sensors or hijacking with misleading commands can lead catastrophic safety consequences. In this paper, we close the gap authenticating behavior autonomous IoT during operation. particular, check object, e.g., drone, evaluating its time-series telemetry traces...

10.1109/uemcon47517.2019.8992931 article EN 2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) 2019-10-01

We address security vulnerabilities for a smart thermostat. As this kind of appliance is adopted in homes around the world, every user will be opening up new avenue cyber attack. Since these devices have known and they are being managed by non-technical users, we anticipate that thermostats likely to targetted unsophisticated attackers relying on publicly available exploits take advantage weakly protected devices. such, paper, role `script kiddy' assess thermostat using Internet resources...

10.1109/pst.2016.7906936 article EN 2016-12-01

Research Article| December 01 2016 Performance as Authorship: Sarah Michelle Gellar and Buffy Season 6 Aaron Hunter teaches film studies in the Department of Media Studies at Maynooth University. His book Authoring Hal Ashby: The Myth New Hollywood Auteur is forthcoming from Bloomsbury Academic (2016). Search for other works by this author on: This Site Google Journal Film Video (2016) 68 (3-4): 51–68. https://doi.org/10.5406/jfilmvideo.68.3-4.0051 Cite Icon Share Facebook Twitter LinkedIn...

10.5406/jfilmvideo.68.3-4.0051 article EN Journal of Film and Video 2016-10-06

The continued scaling of devices in accordance with Moore's law requires activation some implants such as the source-drain extensions, SDEs, little diffusion possible. New options thermal processing are described and compared. Thermal flux annealing is regime where power density high enough to cause local heating but not so eliminate heat transfer entirely. If energy delivered fast enough, i.e.: surface wafer can reach useful temperatures before bulk temperature rises appreciably. Limited...

10.1109/rtp.2004.1441892 article EN 2005-07-27

Laser annealing is one of the process solutions to enable ultra shallow junction (USJ) formation for 45 nm technology node. However, variations in front-side optical properties device wafers cause large temperature on wafer surface which, turn, activation dopants that form junction. As a result, pyrometry and closed loop control are critical establish uniformity repeatability laser annealing. Pyrometry results presented along with correlation between (dopant activation) pyrometer signal....

10.1109/rtp.2005.1613690 article EN 2006-04-06

Public announcements cause each agent in a group to modify their beliefs incorporate some new piece of information, while simultaneously being aware that all other agents are doing the same. Given set and epistemic goals, it is natural ask if there single announcement will make believe corresponding goal. This problem known be undecidable general modal setting, where presence nested can lead complex dynamics. In this paper, we consider not necessarily truthful public setting AGM belief...

10.24963/ijcai.2017/154 article EN 2017-07-28

Forensic examinations of a mobile phone that consider only the internal memory can miss potentially vital data is accessible from device, but not stored locally. In this paper, we look at forensic tool able to download on cloud, using credentials gleaned device extractions. Through experimention with variety devices and configurations, examine effectiveness software for its stated purpose. The results suggest are obtain information cloud in manner, under some relatively strong assumptions....

10.1109/pst.2016.7906927 article EN 2016-12-01

We address security and trust in the context of a commercial IP camera. take hands-on approach, as we not only define abstract vulnerabilities, but actually implement attacks on real then discuss nature root cause; propose formal model that can be used to vulnerabilities by explicitly constraining compositionality for relationships.

10.1109/cns.2017.8228676 article EN 2017-10-01

Applied materials rapid thermal processing (RTP) systems are unique in providing high resolution process data particularly wafer rotation angle and speed as a function of time. This work explores how this information can be used to predict on-wafer results using an advanced analysis package known WISR (wafer interdiction scrap reduction). is control platform for the collection, storage, visualization, parameters from production tools. One main features ability create virtual sensors. Virtual...

10.1109/asmc.2008.4529067 article EN ASMC proceedings 2008-05-01

10.5220/0005826805460551 article EN Proceedings of the 14th International Conference on Agents and Artificial Intelligence 2016-01-01

The different optical properties of implanted or patterned areas production semiconductor substrates result in local temperature differences. This variation within a wafer may cause unacceptable uniformity electrical data. RTP systems that use rotation and multipoint control are able to keep overall process even for variation. paper describes modification the multi-input, multi-output measurement system used an Applied Materials Centura adapt pattern. presented experimental data demonstrates...

10.1109/rtp.2002.1039441 article EN 2003-06-25
Coming Soon ...