Dan B. Phung

Learn More
We applied second-order blind identification (SOBI), an independent component analysis method, to MEG data collected during cognitive tasks. We explored SOBI's ability to help isolate underlying neuronal sources with relatively poor signal-to-noise ratios, allowing their identification and localization. We compare localization of the SOBI-separated(More)
Werecently demonstrated that second-order blind identification (SOBI), an independent component analysis (ICA) method, can separate the mixture of neuronal and noise signals in magnetoencephalographic (MEG) data into neuroanatomically and neurophysiologically meaningful components. When the neuronal signals had relatively higher trial-to-trial variability,(More)
The high cost of operating large computing installations has motivated a broad interest in reducing the need for human intervention by making systems self-managing. This paper explores the extent to which control theory can provide an architectural and analytic foundation for building self-managing systems, either from new components or layering on top of(More)
The high cost of operating large computing installations has motivated a broad interest in reducing the need for human intervention by making systems self-managing. This paper explores the extent to which control theory can provide an architectural and analytic foundation for building self-managing systems. Control theory provides a rich set of(More)
We have created ZapC, a novel system for transparent coordinated checkpoint-restart of distributed network applications on commodity clusters. ZapC provides a thin visualization layer on top of the operating system that decouples a distributed application from dependencies on the cluster nodes on which it is executing. This decoupling enables ZapC to(More)
Blind sour e separation (BSS) de omposes a multidimensional time series into a set of sour es, ea h with a one-dimensional time ourse and a xed spatial distribution. For EEG and MEG, the former orresponds to the simultaneously separated and temporally overlapping signals for ontinuous non-averaged data; the latter orresponds to the set of attenuations from(More)
As users interact with the world and their peers through their computers, it is becoming important to archive and later search the information that they have <i>viewed</i>. We present DejaView, a personal virtual computer recorder that provides a complete record of a desktop computing experience that a user can playback, browse, search, and revive(More)
As university-level distance learning programs become more and more popular, and software engineering courses incorporate eXtreme Programming (XP) into their curricula, certain challenges arise when teaching XP to students who are not physically co-located. In this paper, we present the results of a three-year study of such an online software engineering(More)
Most general-purpose work towards autonomic or self-managing systems has emphasized the front end of the feedback control loop, with some also concerned with controlling the back end enactment of runtime adaptations <b>u</b>t usually employing an effector technology peculiar to one type of target system. While completely generic "one size fits all" effector(More)
The increasing popularity of online courses has highlighted the need for collaborative learning tools for student groups. In addition, the introduction of lecture videos into the online curriculum has drawn attention to the disparity in the network resources available to students. We present an e-Learning architecture and adaptation model called AITV(More)