David Lorenzi

Learn More
Digital government is universally gaining acceptance as the public becomes more technologically advanced. The government must embrace new technology to minimize costs and maximize utility of services to the taxpayer. While administrative services have been easily ported to the digital world, there are still many important citizen-centric services that have(More)
Distributed data is ubiquitous in modern information driven applications. With multiple sources of data, the natural challenge is to determine how to collaborate effectively across proprietary organizational boundaries while maximizing the utility of collected information. Since using only local data gives suboptimal utility, techniques for(More)
Sleep-related problems are often documented in children with Autism Spectrum Disorders (ASD). This study examined physical activity as a variable that might influence sleep quality in children with ASD. Ten children, ages 9-16 years, were asked to wear accelerometer devices for 7 days in order to track objective measures of activity and sleep quality.(More)
Image classification, in general, is considered a hard problem, though it is necessary for many useful applications such as automatic target recognition. Indeed, no general methods exist that can work in varying scenarios and still achieve good performance across the board. In this paper, we actually identify a very interesting problem, where image(More)
In this paper, we investigate ways that social media platforms can enhance the responsiveness of branches of local government that deal primarily in performing tasks on the behalf of citizens or interacting with them. More specifically, we utilize the Twitter platform (on the web and capable smartphones) to provide a two way communications channel between a(More)
This paper explores the idea of government emergency response and disaster management through the lens of popular social media services. One of the traditional challenges to effective emergency response and disaster management is communication between the government and its constituents. As a consequence of this lack of communication, organization of work(More)
Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of all subject accesses to objects, and hence can be expensive. In this paper we show that for an unauthorized flow to exist in an access(More)