Tomonori Honda

Learn More
  • Michael S Epstein, Joel K Mani Burdick, Doug Chandy, Macmynowski, Stephen Waydo, Sawyer Fuller +30 others
  • 2007
All Rights Reserved iii Acknowledgements I wish to extend my most sincere thanks to my advisor, Prof. Richard M. Murray. Over the course of my graduate studies Richard has been a constant source of inspiration with his passion and approach to research. Whenever I felt frustrated from a lack of motivation or progress I could count on a meeting with Richard(More)
User-centered approaches to design can guide teams towards an understanding of users and aid teams in better posing design problems. This paper investigates the role of user-centered design approaches in design process and outcome within the context of design team projects. The value of interaction with users is examined at several stages throughout the(More)
During the formative stage of the design cycle, teams engage in a variety of tasks to arrive at a design, including selecting among design alternatives. A key notion in design alternative selection is that of "preference" in which a designer assigns priorities to a set of design choices. This paper presents a preliminary approach for extracting a projection(More)
When a computer system is hacked, analyzing the root-cause (for example entry-point of penetration) is a diagnostic process. An audit trail, as defined in the National Information Assurance Glossary, is a security-relevant chronological (set of) record(s), and/or destination and source of records that provide evidence of the sequence of activities that have(More)
One of the challenges in accurately applying metrics for life cycle assessment lies in accounting for both irreducible and inherent uncertainties in how a design will perform under real world conditions. This paper presents a preliminary study that compares two strategies, one simulation-based and one set-based, for propagating uncertainty in a system.(More)
As engineering systems grow in complexity, the teams that design them require increasingly disparate expertise and must operate in a distributed fashion. At the same time, the teams that design subsystems need to compete and compromise with each other for a limited set of resources. Thus, it becomes crucial to establish a system-level understanding of the(More)
The goal of this work is to bridge the gap between business decision making and real-time factory data. Beyond real-time data collection, we aim to provide analysis capability to obtain insights from the data and converting the learnings into action-able recommendations. We focus on analyzing device health conditions and propose a data fusion method that(More)
Detection of fraud, waste, and abuse (FWA) is an important yet difficult problem. In this paper, we describe a system to detect suspicious activities in large healthcare claims datasets. Each healthcare dataset is viewed as a heterogeneous network of patients, doctors, pharmacies, and other entities. These networks can be large, with millions of patients,(More)
Behavioral models are at the core of Fault-Detection and Isolation (FDI) and Model-Based Diagnosis (MBD) methods. In some practical applications , however, building and validating such models may not always be possible, or only partially validated models can be obtained. In this paper we present a diagnosis solution when only a partially validated model is(More)