William Casey

Learn More
Twitter contains a wealth of timely information, however staying on top of breaking events requires that an information analyst constantly scan many sources, leading to information overload. For example, a user might wish to be made aware whenever an infectious disease outbreak takes place, when a new smartphone is announced or when a distributed Denial of(More)
In March of 2013, what started as a minor dispute between Spamhaus and Cyberbunker culminated in a distributed denial of service (DDoS) attack that was so massive, it was claimed to have slowed internet speeds around the globe. The attack clogged servers with dummy internet traffic at a rate of about 300 gigabits per second. By comparison , the largest(More)
We describe a method to make physical maps of genomes using correlative hybridization patterns of probes to random pools of BACs. We derive thereby an estimated distance between probes, and then use this estimated distance to order probes. To test the method, we used BAC libraries from Schizzosaccharomyces pombe. We compared our data to the known sequence(More)
We address the problem of creating entire and complete maps of software code clones (copy features in data) in a corpus of binary artifacts of unknown provenance. We report on a practical methodology, which employs enhanced suffix data structures and partial orderings of clones to compute a compact representation of most interesting clones features in data.(More)
—Agents in a social-technological network can be thought of as strategically interacting with each other by continually observing their own local or hyperlocal information and communicating suitable signals to the receivers who can take appropriate actions. Such interactions have been modeled as information-asymmetric signaling games and studied in our(More)
We propose a game theoretic framework to study strategic interactions among Humans and Things, assumed to be interconnected by a social-technological network, such as Internet of Humans and Things. Often a pair of agents in the network interacts in order for an informed sender agent to signal an uninformed receiver agent to take an action so as to benefit(More)