throbber
GEORGE CYBENKO
`CURRICULUM VITAE
`(August 2015)
`
`Office
`8000 Cummings Hall
`Dartmouth College
`Hanover NH 03755-8000
`(603) 646-3843
`(603) 646-2277 (FAX)
`
`Home
`PO Box 1157
`Grantham NH 03753
`(603) 369-1133 (Cell)
`(603) 643-1401
`gvc@dartmouth.edu
`
`Personal
`US citizen; Spouse: Susan A. Spaar (married 35 years); Two adult children.
`
`Areas of Technical Expertise
`Computer security, signal processing, command and control, machine learning, high per-
`formance computing, computational behavioral analysis.
`
`Education
`1974 University of Toronto (Mathematics)
`B.Sc.
`1975 Princeton University (Mathematics)
`M.A.
`Ph.D. 1978 Princeton University (Electrical Engineering/
`Computer Science and Applied Mathematics: Advisor - Bede Liu )
`1996 Dartmouth College (Honorary)
`
`M.A.
`
`1988-1992
`
`Professional Employment
`1992-present Dorothy and Walter Gramm Professor of Engineering
`Thayer School of Engineering
`Dartmouth College, Hanover, NH
`2004-present Co-founder, Flowtraq Inc. (www.flowtraq.com)
`1996
`Kloosterman Distinguished Visiting Professor
`of Mathematics and Computer Science
`Leiden University, Netherlands
`Associate Director, Center for Supercomputing Research
`and Development
`Professor of Electrical and Computer Engineering
`Professor of Computer Science
`Research Professor, Coordinated Science Laboratory
`University of Illinois at Urbana-Champaign, Urbana IL
`Assistant and Associate Professor (Founding Chairman in 1985-1986)
`Department of Computer Science,
`Tufts University, Medford, MA
`Senior Scientist (Sabbatical Leave)
`
`1978-1988
`
`1986-1987
`
`1
`
`Columbia Ex 2034-1
`Symantec v Columbia
`IPR2015-00375
`
`

`
`1986-1988
`
`1984-1986
`
`1982-1983
`
`1981 Spring
`
`1980 Fall
`
`ALPHATECH Inc, Burlington, MA
`Visiting Scientist, Laboratory for Information and
`Decision Systems, MIT, Cambridge, MA
`Visiting Scientist, Statistics Center,
`MIT, Cambridge, MA 02139
`Program Director, Applied Mathematics
`Division of Mathematical and Computer Sciences
`National Science Foundation
`Washington, DC
`Visiting Scientist
`Department of Computer Science
`Stanford University
`Stanford, CA
`Visiting Scientist
`Laboratory for Information and Decision Systems
`MIT, Cambridge, MA
`
`Selected Professional Activities
`
`Experience on Boards and Panels
`US Air Force Scientific Advisory Board, 2012-2016
`Chief Scientist at-large, AFRL Software Protection Initiative, 2002-2010
`US Army Cyber Institute Advisory Board member, 2014-present
`Defense Science Board, 2008-2009
`Advisory Board, Singapore University of Technology and Design, 2013-present
`DARPA IPTO Senior Advisory Group, 2008-2010
`IDA Center for Computing Sciences, Program Review Committee, 2007-present
`DARPA ISAT Member, 2007-2010
`NSA R2 IAER Task Force member, 2002-2009
`DOD TARA panelist for information technology, 2001 and 2003
`IEEE Computer Society Board of Governors, 2002-2011
`IEEE Computer Society First Vice-President, 2008
`Computing Research Association Board of Directors. 2005-2009
`Board of Governors, International Neural Network Society, 1999-2001
`Advisory Board, Minnesota Supercomputer Institute, 1996-1999
`Advisory Board, Institute for Mathematics and its Applications,
`University of Minnesota, 1998-2000
`Advisory Committee, Lorentz Center, Leiden University, Netherlands,1998-2002
`External Review Board, Mathematical and Computer Sciences,
`Argonne National Laboratory, 1996-1999
`Awards and Professional Recognition
`Fellow of the IEEE (Signal Processing Society)
`
`2
`
`Columbia Ex 2034-2
`Symantec v Columbia
`IPR2015-00375
`
`

`
`Dartmouth Arts and Sciences Graduate Faculty Mentor Award 2004
`Best paper award, IEEE Workshop on Large Scale Computation, Prague, CZ,1993
`Leadership Experience
`Founding Chairman, Department of Computer Science, Tufts University 1985
`Associate Director, Center for Supercomputing Research and Development
`University of Illinois at Urbana-Champaign 1988-1992
`Founding Editor-in-Chief, IEEE Transactions on Computational Social Systems (2014)
`Founding Editor-in-Chief, IEEE Security and Privacy (2002-2006).
`Founding Editor-in-Chief (1994-2000), Editorial Board (1992-present)
`IEEE/AIP Computing in Science and Engineering
`Chair of IEEE Computer Society Task Force on Security and Privacy, 2001
`DARPA ISAT Study on Mobility and Security, 2000, Co-Chair
`DARPA ISAT Study on Games of National Importance, 2008, Co-Chair
`DARPA ISAT Workshop on Measuring Security, 2009, Co-Chair
`Editorial Experience
`Associate Editor, Applied Numerical Mathematics (1998-2008)
`Associate Editor, IEEE Transactions on Information Theory (1989-1992)
`Associate Editor, Mathematics of Control, Signals and Systems,
`1988-2000
`Associate Editor, IEEE Transactions on Dependable and Secure Computing, 2004-2009
`Co-Managing Editor, SIAM Journal on Matrix Theory and Analysis, 1990-1995
`Associate Editor, Neural Networks, 1991-2000
`Editor, IEEE Technical Committee on Supercomputer Applications Newsletter, 1990-1993
`Associate Editor, Advances in Computational Mathematics, 1992-1995
`
`Ph.D. Students Advised
`Student’s Name
`Vincent Berk
`Daniel Bilar
`Brian Brewington
`Wayne Chung
`Alva Couch
`Annarita Giani
`Ashifi Gogo1
`Robert Gray
`James Thomas House
`Alexy Khrabrov2
`Katsuhiro Moizumi
`Glenn Nofsinger
`David Robinson
`Sirpa Saarinen3
`
`Ph.D. Institution
`Universiteit Leiden
`Dartmouth College
`Dartmouth College
`Dartmouth College
`Tufts University
`Dartmouth College
`Dartmouth College
`Dartmouth College
`Dartmouth College
`Univ. of Pennsylvania
`Dartmouth College
`Dartmouth College
`Dartmouth College
`UIUC
`
`Year Employment
`2006
`FlowTraq Inc
`2003
`Siege Technologies
`2000 Google
`2006
`IDA
`1988 Tufts University
`2006 GE Research Labs
`2010
`Sproxil Inc
`1997
`BAE Systems
`2012 Undisclosed startup
`2011 Nitro Inc
`1998
`Furukawa Electric, Sendai Japan
`2006
`Bank of Hawaii
`2010
`J.P. Morgan
`1994 Wolfram Research
`
`3
`
`Columbia Ex 2034-3
`Symantec v Columbia
`IPR2015-00375
`
`

`
`Nils Sandell
`Yong Sheng
`Gabriel F. Stocco
`Patrick Sweeney
`David Twardowski
`Bryan Usevitch
`
`Dartmouth College
`Dartmouth College
`Dartmouth College
`Dartmouth College
`Dartmouth College
`UIUC
`
`Systems Technology Research
`2011
`Pinterest
`2006
`2014 Microsoft
`2014 US Air Force
`2011 Dimensional Fund Advisors
`1993 UT El Paso
`
`1 Co-advisor with E. Garmire
`2 Co-advisor with L. Ungar
`3 Deceased
`
`Postdoctoral Advising
`Advisee’s Name
`Institution
`Jose Casar
`Tufts
`Juan Santos
`Tufts
`Sam Ho
`UIUC
`Robert Gray
`Dartmouth
`Carlos Alberola
`Dartmouth
`Guofei Jiang
`Dartmouth
`Paul Thompson
`Dartmouth
`David Koconis
`Dartmouth
`Valentino Crespi
`Dartmouth
`Vivian Bernardo
`Dartmouth
`Robert Savell
`Dartmouth
`John Murphy
`Dartmouth
`David Sicilia
`Dartmouth
`
`Notable Masters Advisees
`Advisee’s Name
`Institution
`Steve Sullivan
`UIUC
`
`Aditya Bhasin
`
`Dartmouth
`
`Doug Madory
`
`Dartmouth
`
`Present Employment
`Univ. Polytech. Madrid
`Univ. Polytech. Madrid
`Unknown
`BAE Systems
`Univ. Valladolid, Spain
`NEC Research, Princeton
`Dartmouth
`Consultant and author
`Aptima Inc
`Univ. Sao Paulo, Brazil
`Consultant
`FlowTraq Inc
`J.P. Morgan
`
`Present Position and Comments
`Winner of 3 Academy Awards for
`Technical Achievement,
`presently at Microsoft
`CIO, Head of Technology & Operations,
`Global Wealth Management,
`Bank of America
`Director of Internet Analysis
`”The man who can see the Internet”
`(Washington Post 2014) Dyn Inc
`
`4
`
`Columbia Ex 2034-4
`Symantec v Columbia
`IPR2015-00375
`
`

`
`Publications
`
`0. Error Analysis of Some Signal Processing Algorithms, Ph.D. Thesis, Princeton Uni-
`versity, Department of Electrical Engineering and Computer Science and Applied Math-
`ematics, Princeton, NJ June 1978.
`
`1. Error analysis of Durbin’s, Levinson’s, and Trench’s algorithms, Proceedings of 1979
`International Conference on Acoustics, Speech and Signal Processing, Washington, DC
`1979, pp.498-501.
`
`2. Numerical stability of the Levinson-Durbin algorithm for Toeplitz systems of equa-
`tions, SIAM Journal on Scientific and Statistical Computing, 1, 1980, pp.203-220.
`
`3. Rounding errors and the non-optimality of lattice methods, Proceedings of 14th Annual
`Princeton Conference on Information and Decision Systems, Princeton, NJ, 1980.
`
`4. Error analyses of methods for Toeplitz systems and linear prediction, in Circuit Theory
`and Design (R. Boite and P. Dewilde, eds.), North-Holland, 1981, pp. 379-386.
`
`5. Locations of zeroes of predictor polynomials, IEEE Transactions on Automatic Con-
`trol, AC-27, 1982, pp. 235-238.
`
`6. Low rank Toeplitz approximations and moment problems, Circuits, Systems, and
`Signal Processing, 1, 1982, pp. 345-366.
`
`7. Estimating point spectra using the Lanczos algorithm, Proceedings of American Con-
`ference on Decision and Control, Orlando, FL, 1982, pp.46-51.
`
`8. Affine Minimax Problems and Semi-Infinite Programming, Tufts University Computer
`Science Technical Report, 1982.
`
`9. A general orthogonalization technique with applications to time series analysis and
`signal processing, Mathematics of Computation, 40, 1983, pp. 323-336.
`
`10. The theory of ideal spectra, Proceedings of 17th Annual Princeton-Johns Hopkins
`Conference on Information Systems and Sciences, 1983, pp. 78-82.
`
`11. Restrictions of normal operators, Pade approximations and autoregressive modelling,
`SIAM Journal on Mathematical Analysis, 15, 1984, pp.753-767.
`
`12. Fast approximation of dominant harmonics, SIAM Journal on Scientific and Statis-
`tical Computing, 5, 1984, pp. 317-331.
`
`13. On the eigenstructure of Toeplitz matrices, IEEE Transactions on Acoustics, Speech
`and Signal Processing, 32, 1984, pp.918-920.
`
`14. The numerical stability of lattice algorithms for least squares linear prediction prob-
`lems, BIT Vol. 24, pp.441-455, 1984.
`
`15. Computing Pisarenko frequency estimates, Proceedings of 18th Annual Princeton
`Conference on Information Systems and Sciences, March 1984, pp. 587-591.
`
`16. Fast structured singular value computations, Technical Report, Tufts University,
`Department of Computer Science 1984.
`
`5
`
`Columbia Ex 2034-5
`Symantec v Columbia
`IPR2015-00375
`
`

`
`17. Computing the minimal eigenvalue of Toeplitz matrices, (with C. Van Loan), SIAM
`Journal on Scientific and Statistical Computing, 7, 1986, pp. 123-131.
`
`18. Hypercube embedding is NP-complete, (with D.W. Krumme and N. Venkataraman),
`Hypercube ’86 (M.T. Heath, ed.) pp.148-157, SIAM, Philadelphia, 1986.
`
`19. The conditioning of eigenvector methods for beamforming problems, Proceedings of
`1986 Princeton Conference on Information Systems and Sciences, pp. 125-131, March
`1986.
`
`20. The sensitivity of beamforming problems, Proceedings of IEEE Workshop on Spec-
`trum Estimation, pp. 233-234, November 1986.
`
`21. The token broadcast problem, (with D.W. Krumme and N. Venkataraman) in Pro-
`ceedings of the International Conference on Parallel and Distributed Computing, Lake
`Charles, IL 1986.
`
`22. An interactive graphics system for displaying parallel program executions (with A.
`Couch and D. Krumme), in Proceedings of Workshop on Measurement and Performance
`Analysis of Parallel Computers, Argonne National Laboratory, 1986.
`
`23. Fixed hypercube embedding, (with D.W. Krumme and N. Venkataraman), Informa-
`tion Processing Letters, Vol. 25, pp. 35-39, April 1987.
`
`24. An explicit formula for Lanczos polynomials, Linear Algebra and Applications, Vol.
`88, pp.99-115, 1987.
`
`25. Fast Toeplitz orthogonalization using inner products, SIAM Journal on Scientific
`and Statistical Computing, Vol. 8, pp.734-740, September 1987.
`
`26. Hypercube implementations of tracking algorithms, (with T.G. Allen, J. Polito, C.
`Angelli), in Proceedings of JDL Workshop on Command and Control, Washington, DC,
`pp.145-153, 1987.
`
`27. Parallel algorithms for classification and clustering, (with T.G. Allen) , in Proceedings
`of SPIE Conference on Advanced Architectures and Algorithms for Signal Processing, San
`Diego, CA, pp. 126-132, August 1987.
`
`28. Practical parallel union-find algorithms for transitive closure and clustering, (with
`T.G. Allen and J. Polito) International Journal of Parallel Programming, Vol. 17, pp.403-
`423, 1988.
`
`29. Load balancing and partitioning for parallel signal processing and control algorithms,
`in Advanced Computer Concepts and Techniques in Control Engineering, (M.Denham and
`A. Laub, Editors) Springer, New York, pp. 391-409, 1988.
`
`30. An SVD analysis of resolution limits for harmonic retrieval problems (with J.R.Casar),
`in SVD and Signal Processing, (Ed F. Deprettere, editor) North-Holland, Amsterdam,
`pp.461-467, 1988.
`
`31. Debugging support for parallel programs (with D.W. Krumme and A.L. Couch) in
`Proceedings of the International Conference on Vector and Parallel Computing, Tromso,
`
`6
`
`Columbia Ex 2034-6
`Symantec v Columbia
`IPR2015-00375
`
`

`
`Norway, June 1988.
`
`32. Continuous valued neural networks: approximation theoretic results, in Proceedings
`of 1988 Interface of Statistics and Computer Science, Reston, VA , pp.174-184, 1988.
`
`33. Recent Trends in Signal Processing, SIAM News, September 1988, pp.18-19.
`
`34. Continuous neural networks with two hidden layers are sufficient, Tufts University,
`Department of Computer Science, Technical Report 1988 .
`
`35. The Perfect Club: A New Era in Benchmarking, SIAM News, September 1989 (with
`L. Pointer and M. Berry).
`
`36. Dynamic Load Balancing for Distributed Memory Multiprocessors, Journal on Par-
`allel and Distributed Computing , Vol. 7, pp.279-301, 1989.
`
`37. Approximation by superpositions of a sigmoidal function, Mathematics of Control,
`Signals and Systems, Vol. 2, pp.303-314, 1989.
`
`38. Heterogeneous processes on a homogeneous multiprocessor, (with D.W. Krum me, N.
`Venkataraman, and A. Couch) in Medium Scale Multiprocessors (Arthur Wouk, Editor),
`SIAM Publications, pp.97-108, 1989.
`
`39. Designing neural networks, in Proceedings of First International Conference on Ar-
`tificial Neural Networks, London, pp.1-3, addendum, 1989.
`
`40. Hyperbolic Householder algorithms for structured matrices (with M. Berry), SIAM
`Journal on Matrix Analysis and Applications,pp. 499-520, October 1990.
`
`41. Higher order wavelets and quadrature mirror filters, (with B. Usevitch) in Proceedings
`of 2nd International Workshop on SVD and Signal Processing, Kingston, RI, June 1990.
`
`42. Supercomputer performance analysis and the Perfect Benchmarks, (with L. Kipp, L.
`Pointer, D. Kuck) in Proceedings of 1990 International Conference on Supercomputing,
`pages 254–266, Amsterdam, 1990.
`
`43. Mathematical problems in neural computing, in Signal Processing, Scattering and
`Operator Theory, and Numerical Methods , pp.47-65 , Birkhauser, Boston, 1990.
`
`44. Complexity theory of neural networks and classification problems, Neural Networks,
`(ed. L. Almeida), Lecture Notes in Computer Science, Springer-Verlag, pp.26-45, 1990.
`
`45. Supercomputer performance trends and the Perfect Benchmarks, Supercomputing
`Review, April, 1991, pp. 53-60..
`
`46. VISTA: A system for remote visualization, (with A. Tuchman, D. Jablonowski), in
`Proceedings of SIAM Conference on Parallel Computing, Houston, March 1991.
`
`47. Neural networks, backpropagation and automatic differentiation, (with S. Saarinen
`and R. Bramley), in Automatic Differentiation, edited by A. Greiwank, SIAM Publica-
`tions 1991.
`
`48. Multidimensional binary partitions: distributed data structures for spatial parti-
`tioning, (with T.G. Allen), International Journal on Control , Vol. 54, pp. 1335-1352,
`
`7
`
`Columbia Ex 2034-7
`Symantec v Columbia
`IPR2015-00375
`
`

`
`1991.
`
`49. Scientific benchmark characterization, (with M. Berry, J. Larson) Parallel Computing,
`Vol. 17, pp. 1173-1194, 1991.
`
`50. Run-time visualization of program data, (with A. Tuchman and D. Jablonowski), in
`Proceedings of Visualization ’91, pages 255–261, San Diego, CX, October 1991.
`
`51. Parallel computing and the Perfect Benchmarks, (with S. Ho, J. Bruner, S. Sharma),
`Proceedings of 1991 International Symposium on Supercomputing, Kyushu, Japan. (Also
`available as University of Illinois Center for Supercomputing Research and Development
`Technical Report 1191., November 1991
`
`52. Gossiping in minimum time , (with D.W. Krumme and N. Venkataraman) SIAM
`Journal on Computing, Vol. 21, pp. 111-139, 1992.
`
`53. Revolution or Evolution? (with D.J. Kuck), IEEE Spectrum, Vol. 29, pp 39-41,
`September 1992.
`
`54. The numerical solution of neural network training algorithms, (with S. Saarinen and
`R. Bramley) SIAM J. on Scient. and Stat. Computing, Vol. 14, pp. 693-714, 1993.
`
`55. Adaptive memory systems (with S. Saarinen), Proceedings of SPIE, Orlando, 1993.
`
`56. Toeplitz Algorithms for Signal Processing, SIAM Short Course Lecture Notes, Seattle,
`1993.
`
`57. Review of Computation and Cognition, edited by C.W. Gear, SIAM Review, Vol. 35,
`pp.147-148, 1993.
`
`58. Supercomputer workload decomposition and analysis. (with Bradley, D., Gao, H.,
`Larson, J., Ahmad, F., Golab, J., and Straka, M).in Proc. ACM Intl. Conf. on Super-
`computing, pp. 458–467, 1991.
`
`59. An approximate k-nearest neighbor method,(with S. Saarinen), in Adaptive and
`Learning Systems II, Firooz A. Sadjadi, Editor, Proc. SPIE 1962, 120-127 (1993).
`
`60. On the unreasonable effectiveness of memory-based methods, in Proceedings of IEEE
`Workshop on Large Scale Computation, Prague, CZ, pp. 1-9, 1993. (Winner of best
`paper award)
`
`61. Signal Processing Models for Information Retrieval, in Proceedings of COST ’94
`Workshop on Emergent Techniques in Signal Processing and Communications, VIGO,
`Spain, pp. 34-45, 1994.
`
`62. Information Theoretic Principles of Agents, (with Robert Gray, Alexy Khrabrov and
`Yunxin Wu), in CIKM Workshop on Intelligent Information Agents, Third International
`Conference on Information and Knowledge Management (CIKM ’94), 1994, Gaithers-
`burg, Maryland, Editors, Yannis Labrou and Tim Finin.
`
`63. Information Agents as Organizers, (with Robert Gray, Alexy Khrabrov and Yunxin
`Wu), in CIKM Workshop on Intelligent Information Agents, Third International Con-
`ference on Information and Knowledge Management (CIKM ’94), 1994, Gaithersburg,
`
`8
`
`Columbia Ex 2034-8
`Symantec v Columbia
`IPR2015-00375
`
`

`
`Maryland, Editors, Yannis Labrou and Tim Finin.
`
`64. Perfect reconstruction filtering with unitary operators and projections, (with. M.
`Stewart), Linear Algebra and its Applications, Vol. 208, pp. 97-133, 1994.
`
`65. Just-in-Time Learning and Estimation. Pages 423–434 of: Bittanti S. & Picci G.
`(eds), Identification, Adaptation, Learning. The Science of Learning Models from data.
`NATO ASI Series. Springer, 1996.
`
`66. The future of information technology, in Optoelectronics for Data Communications,
`(edited by U. Osterberg and R. Lansky), Academic Press, pp. 311-320, 1995.
`
`67. Signal Processing in The National Information Infrastructure, (with R. Gray et al.),
`National Science Foundation Report, 1995.
`
`68. As Eniac turns 50: perspectives on computer science support for science and engi-
`neering (with Eigenmann, R.) IEEE Computational Science and Engineering, Volume:
`3, Issue: 2, Summer 1996 Pages:16 - 17.
`
`69. Q-Learning: A Tutorial and Extensions, (with Robert Gray and Katsuhiro Moizumi),
`in Proceedings of the Workshop on Mathematics of Artificial Neural Networks, Oxford
`University, July 1997, Kluwer Academic Publishers.
`
`70. Linear Algebra for Signal Processing, (edited with A. Bojanczyk), Springer-Verlag,
`New York, 1995.
`
`71. Pattern Recognition of 3D CAD Objects (with A. Bhasin and K. Cohen), Smart
`Engineering Systems Design, 1:1-13, 1997.
`
`72. Mathematical Models of Uncertainty in Agent Systems (with K. Moizumi),
`Japanese Journal of Mathematical Modeling, 1999.
`
`in
`
`73. Design in the Industrial Age vs. Design in the Information Age (with A. Bhasin), to
`appear in Report of the NSF Workshop on Design in 2000, edited by J. Tomlinson, 1997.
`
`74. Mobile agents: The new paradigm for distributed computing, (with Robert Gray,
`David Kotz, Saurab Nog, Daniela Rus and George Cybenko), in Proceedings of 1997
`Parallel and Distributed Architectures Symposium, Aizu, Japan, March 1997, pp. 8-24.
`
`75. Agent Tcl, in William Cockayne and Michael Zypa, editors, Itinerant Agents: Ex-
`planations and Examples with CDROM, Manning Publishing, 1996 (with R. Gray, D.
`Kotz and D. Rus).
`
`76. Neural Networks in Computational Science and Engineering, in IEEE Computational
`Science and Engineering, Spring 1996. Vol. 3. No. 1, pp. 36-42.
`
`77. The Shannon Machine, In Proceedings of the 9th Yale University Workshop on Adap-
`tive Control and Learning June, 1996 (with R. Gray, A. Bhasin, B. Brewington).
`
`78. Mobile agents in adaptive hierarchical Bayesian networks for global awareness Ross,
`K.N.; Chaney, R.D.; Cybenko, G.V.; Burroughs, D.J.; Willsky, A.S.;
`in 1998 IEEE
`International Conference on Systems, Man, and Cybernetics.
`,Volume: 3 , 11-14 Oct.
`1998 Pages:2207 - 2212 vol.3.
`
`9
`
`Columbia Ex 2034-9
`Symantec v Columbia
`IPR2015-00375
`
`

`
`79. Meetingplace, in IEEE Computational Science and Engineering, Spring 1996, Vol. 3,
`No. 1, Pp. 1.
`
`80. Scientific Standard for Scientific Computing (with H. Wijshoff), in IEEE Computa-
`tional Science and Engineering, Fall 1996, Vol. 3, No. 3, pp. 1.
`
`81. Dynamic programming: A discrete calculus of variations IEEE Comput. in Science
`and Engineering 4: (1) 92-97 JAN-MAR 1997.
`
`82. Knocking opportunity or opportunity knocking? IEEE Comput.
`Engineering 3: (4) 1-1 WIN 1996.
`
`in Science and
`
`83. A prototype eddy current instrument with image enhancement (with B. Brewington),
`in Proceedings of SPIE Conference on Aging Aircraft and NDI, Scottsdate, AZ, December
`1996.
`
`84. New magazine expands AIP’s Computers in Physics and IEEE Computational Sci-
`ence and Engineering, (with L.M. Holmes) Comput in Phys 12: (6) 516-517 NOV-DEC
`1998.
`
`85. Introducing computing in science and engineering, IEEE Comput.
`Engineering 5: (4) 1-2 OCT-DEC 1998.
`
`in Science and
`
`86. Merger mania in CSE, IEEE Comput. in Science and Engineering 5: (3) 1-1 JUL-
`SEP 1998.
`
`87. Network awareness and mobile agent systems, (with Caripe W, Moizumi K, et al.),
`IEEE Communications 36: (7) 44-49 JUL 1998.
`
`88. Knowledge as commodity, IEEE Comput.
`APR-JUN 1998.
`
`in Science and Engineering 5: (2) 1-1
`
`89. The CSE challenge in knowledge and distributed intelligence, IEEE Comput.
`Science and Engineering 5: (1) 1-1 JAN-MAR 1998.
`
`in
`
`90. Agent Tcl: Targeting the needs of mobile computers. (with David Kotz, Robert
`Gray, Saurab Nog, Daniela Rus, Sumit Chawla) IEEE Internet Computing, 1(4):58-67,
`July/August 1997.
`
`91. How is CSE doing?, IEEE Comput. in Science and Engineering 4: (4) 2-2 OCT-DEC
`1997.
`
`92. Multimedia in CSE education IEEE Comput. in Science and Engineering 4: (3) 1-1
`JUL-SEP 1997.
`
`93. Hardly the end of science IEEE Comput.
`APR-JUN 1997.
`
`in Science and Engineering 4: (2) 1-1
`
`94. Microelectromechanical machines and computation IEEE Comput.
`Engineering 4: (1) 10-10 JAN-MAR 1997.
`
`in Science and
`
`95. Mobile Agents for Mobile Computing (with R. Gray, D. Kotz and D. Rus), In Dejan
`Milojicic, Fred Douglis, and Rick Wheeler, editors,Mobility, Mobile Agents and Process
`Migration - An Edited Collection. Addison Wesley, 1998.
`
`10
`
`Columbia Ex 2034-10
`Symantec v Columbia
`IPR2015-00375
`
`

`
`96. The Foundations of Information Push and Pull (with B. Brewington), in Mathematics
`of Information, Springer, D. O’Leary editor, 1998.
`
`97. Horizons in scientific and distributed computing (with Beckmann, C.J.; McManus,
`D.D.), IEEE Computing in Science & Engineering, Volume: 1 , Issue: 1 , Jan.-Feb. 1999
`Pages:23 - 30.
`
`98. Minimax-based reinforcement learning with state aggregation (with Guofei Jiang;
`Cang-Pu Wu), Proceedings of the 37th IEEE Conference on Decision and Control, Vol-
`ume: 2 , 16-18 Dec. 1998 Pages:1236 - 1241 vol.2.
`
`99. Neuro-Dynamic Programming, Cybenko, G.; IEEE Computational Science and En-
`gineering, Volume: 5 , Issue: 2 , April-June 1998 Pages:101 - 102.
`
`100. Convergence Analysis of Discretization Procedure in Q-Learning, (with Guofei
`Jiang, Cangpu Wu), Proc. of the 14th IFAC Triennial World Congress, Vol.Q, pp.281-
`286, Beijing, July, 1999
`
`101. Tracking with text-based messages, (with Alberola C.), IEEE INTELL SYST APP.
`14: (4) 70-78 JUL-AUG 1999.
`
`102. The intellectual property lottery, IEEE Comput. in Science and Engineering, 1: (4)
`4-5 JUL-AUG 1999
`
`103. Computation in Communication (with Beckmann, C.) IEEE/AIP Computing in
`Science & Engineering, Volume: 1 , Issue: 1 , Jan.-Feb. 1999 Page 22.
`
`104. Mobile agents in distributed information retrieval (with Brian Brewington, Robert
`Gray, Katsuhiro Moizumi, David Kotz, and Daniela Rus). In Matthias Klusch, editor,
`Intelligent Information Agents, chapter 12. Springer-Verlag, 1999. ISBN 3-540-65112-8.
`
`105. D’Agents: Security in a multiple-language, mobile-agent system. (with Robert S.
`Gray, David Kotz, and Daniela Rus). In Giovanni Vigna, editor, Mobile Agent Security,
`Lecture Notes in Computer Science. Springer-Verlag, 1998.
`
`106. Keeping Up with the Changing Web, (with Brian E. Brewington), IEEE Computer,
`Vol. 33, No. 5, pp. 52–58, May 2000
`
`107. Matching Conflicts: Functional Validation of Agents. (with Guofei Jiang) In AAAI
`Annual Conference, Workshop on Agent Conflicts, pages 14-19, Orlando, Florida, July,
`1999. AAAI Press.
`
`108. Machine Learning in Grid Applications (with G. Jiang and D. Bilar), in Proceedings
`of Allerton Conference on Communications, Control and Computing, University of Illinois
`at Urbana-Champaign, September 1999.
`
`109. Modeling and Analysis of Active Messages in Volatile Networks (with C. Okino) in
`Proceedings of Allerton Conference on Communications, Control and Computing, Uni-
`versity of Illinois at Urbana-Champaign, September 1999.
`
`110. The death of disciplines, IEEE Comput.
`MAR-APR 2000
`
`in Science and Engineering 2: (2) 2-3
`
`11
`
`Columbia Ex 2034-11
`Symantec v Columbia
`IPR2015-00375
`
`

`
`111. Infrastructure immunology, IEEE Comput. in Science and Engineering 1: (6) 1-1
`NOV-DEC 1999
`
`112. How dynamic is the web? (with B. Brewington) . In Proceedings of the Ninth Inter-
`national World Wide Web Conference, May, 2000. http://www9.org/w9cdrom/index.html,
`pp. 257-276.
`
`113. The Infrastructure Web, (with G. Jiang), in Proceedings of Infrastructure Protection
`and Emergency Modeling Symposium, Washington, DC, April 2000.
`
`114. Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless
`Networks (with D. Kotz, G. Jiang, et al.), In Proceedings of the International Workshop
`on Modeling and Simulation of Wireless and Mobile Systems (MSWiM 2000, Boston,
`MA).
`
`115. Machine learning, IEEE Computing in Science & Engineering, Volume: 3, Issue: 3,
`May-June 2001, pp. 95-96.
`
`116. A fuzzy MHT algorithm applied to text-based information tracking (with Aja-
`Fernandez, S.; Alberola-Lopez, C.), IEEE Transactions on Fuzzy Systems ,Volume: 10 ,
`Issue: 3 , June 2002 Pages:360 - 374.
`
`117. Functional Validation in Grid Computing, (with Guofei Jiang), Journal of Au-
`tonomous Agent and Multi-Agent Systems, Volume 8, No.2, 2004.
`
`118. Developing a Distributed System for Infrastructure Protection (with Guofei Jiang),
`IEEE IT Professional, vol .4, pp.17-23, July/August,2000
`
`119. Mobile agents for distributed simulation (with L. Wilson, D. Burroughs), 1999
`High-Performance Computing Symposium, San Diego, CA, 1999.
`
`120. Tomorrow’s hardest problems (with Sullivan F.), IEEE Comput.
`Engineering 3 (3): 40-41 MAY-JUN 2001
`
`in Science and
`
`121. Reducing quantum computations to elementary unitary operations IEEE Comput.
`in Science and Engineering 3 (2): 27-32 MAR-APR 2001
`
`122. The new millennium challenge IEEE Comput.
`4-5 NOV-DEC 2000
`
`in Science and Engineering 2 (6):
`
`123. Who wants more? IEEE Comput. in Science and Engineering 2 (4): 3-3 JUL-AUG
`2000
`
`124. Infrastructure web: distributed monitoring and managing critical infrastructures,
`(with Guofei Jiang, Dennis McGrath), Proc. of SPIE conference on Enabling Technolo-
`gies for Law Enforcement and Security, Boston, Nov, 2000
`
`125. Law Enforcement Issues of File-Sharing Protocols, (with Vincent Berk), ISTS Tech-
`nical Report,Dartmouth College, January 2001.
`
`126. Analysis of distributed intrusion detection systems using Bayesian methods (with
`Burroughs, D.J.; Wilson, L.F.), in 21st IEEE International Performance, Computing,
`and Communications Conference, 2002. , 3-5 April 2002 Pages:329 - 334.
`
`12
`
`Columbia Ex 2034-12
`Symantec v Columbia
`IPR2015-00375
`
`

`
`127. Understanding Quantum Computing. Cybenko, G.; IEEE/AIP Computing in Sci-
`ence & Engineering ,Volume: 4 , Issue: 4 , July-Aug. 2002 Page 92.
`
`128. Decentralized control for coordinated flow of multi-agent systems Crespi, V.; Cy-
`benko, G.; Rus, D.; Santini, M.;Proceedings of the 2002 International Joint Conference
`on Neural Networks, Volume: 3 , 12-17 May 2002 Pages:2604 - 2609.
`
`129. The Traveling Agent Problem, (with Katsuhiro Moizumi), Mathematics of Control,
`Signals and Systems, 14 (2001), 213-232.
`
`130. D’Agents: Applications and Performance of a Mobile-Agent System (with Robert
`S. Gray, David Kotz, Ronald A. Peterson and Daniela Rus), Software– Practice and
`Experience, Vol 32, No. 6, May 2002.
`
`131. Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless
`Networks, (with David Kotz, Robert Gray, Guofei Jiang, Ronald Peterson, Martin Hof-
`mann, Daria Chacon, Kenneth Whitehead and Jim Hendler), ACM Mobile Networks and
`Applications Journal, vol.7, no.2, March, 2002
`
`132. The Long March, IEEE Security and Privacy, IEEE Computer supplement, April
`2002.
`
`133. A Simple Protocol for Infrastructure Monitoring and Management (with Guofei
`Jiang), IEEE 3rd Annual Workshop on Information Assurance, West Point, NY, June
`17-19, 2002.
`
`134. Cognitive Hacking (with Annarita Giani, Paul Thompson), Workshop on Security
`and Economics, Berkeley, CA, May 16-17, 2002.
`
`135. Privacy is the issue, IEEE Security & Privacy, Volume: 1 , Issue: 6 , Nov.-Dec.
`2003 Page 5.
`
`136. Query routing optimization in sensor communication networks (with Guofei Jiang),
`Proceedings of the 41st IEEE Conference on Decision and Control, Volume: 2 , 10-13
`Dec. 2002 Pages:1999 - 2004 vol.2.
`
`137. Cognitive hacking: A battle for the mind,(with Giani A, Thompson P), IEEE
`COMPUTER, 35 (8): 50–56, Aug 2002
`
`138. A fuzzy MHT algorithm applied to text-based information tracking (with Aja-
`Fernandez S, Alberola-Lopez C), IEEE T FUZZY SYST, 10 (3): 360-374 2002
`
`139. A Critical Need, IEEE Security and Privacy, 1 (1): 5 2003.
`
`140. Sapphire/Slammer Redux, IEEE Security and Privacy, 1 (2): 6, 2003.
`
`141. Cognitive Hacking: Technological And Legal Issues, (with Annarita Giani, Carey
`Heckman, Paul Thompson), LawTech Conference, November 2002, Cambridge MA.
`
`142. Semantic Agent Technologies for Tactical C4ISR, (with G. Jiang), SPIE Aerosense
`Symposium, Orlando FL, April 2003.
`
`143. Semantic depth and markup complexity (with Jiang, G., Hendler, J.A.), IEEE
`International Conference on Systems, Man and Cybernetics, Volume: 3 , 5-8 Oct. 2003
`
`13
`
`Columbia Ex 2034-13
`Symantec v Columbia
`IPR2015-00375
`
`

`
`Pages:2138 - 2143 vol.3.
`
`144. Dynamic Integration of Distributed Semantic Services, (with Jiang, G.; Chung, W.)
`International Conference on Integration of Knowledge Intensive Multi-Agent Systems,
`2003. , 30 Sept.-4 Oct. 2003 Pages:684 - 689.
`
`145. Process Query Systems for Surveillance and Awareness, (with Vincent Berk, Wayne
`Chung, Valentino Crespi, Robert Gray, Diego Hernando, Guofei Jiang, Han Li and Yong
`Sheng), Proceedings of the Systemics, Cybernetics and Informatics (SCI2003) , Orlando,
`Florida, July 2003.
`
`146. Tracking a moving object with a binary sensor network (with J. Aslam, Z. But-
`ler, F. Constantin, V. Crespi, D. Rus), Proceedings of the ACM SenSys’03 Conference,
`November 5–7, 2003, Los Angeles.
`
`147. Temporal and Spatial Distributed Event Correlation for Network Security, (with
`Guofei Jiang), Proceedings of the 2004 IEEE American Control Conference. Boston, MA
`June 30-July 2, 2004.
`
`148. An Overview of Process Query System, (with Vincent H. Berk, Valentino Crespi,
`Robert S. Gray and Guofei Jiang), Proceedings of SPIE Vol. 5403 Sensors, and Com-
`mand, Control, Communications, and Intelligence (C3I) Technologies for Homeland Se-
`curity and Homeland Defense III , Orlando, Florida, April 2004
`
`149. Decentralized Algorithms for Sensor Registration, (with Valentino Crespi), 2003
`IEEE International Joint Conference on Neural Networks (IJCNN2003), in Portland,
`Oregon, July 2003.
`
`150. Stochastic Distributed Algorithms for Target Surveillance, (with Luis Caffarelli,
`Valentino Crespi, Irene Gamba and Daniela Rus), in the Proceedings of the conference:
`Intelligent Systems and Design Applications (ISDA2003), Tulsa, Oklahoma, August,
`2003.
`
`151. Cognitive Hacking, (with P. Thompson, A. Giani), In Zelkowitz, Marvin (ed.)
`Advances in Computers, vol. 60, Academic Press, pp. 1-39, 2003.
`
`152. Semantic Interoperability and Information Fluidity, (with Guofei Jiang, and Jim
`Hendler), International Journal of Cooperative Information Systems, vol. 15, (1), pp.
`1-22, 2006.
`
`153. Efficient Computation of Entropy of Hidden Markov Models, (with Diego Hernando,
`Valentino Crespi), IEEE Transactions on Information

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket