William Casey

Learn More
Twitter contains a wealth of timely information, however staying on top of breaking events requires that an information analyst constantly scan many sources, leading to information overload. For example, a user might wish to be made aware whenever an infectious disease outbreak takes place, when a new smartphone is announced or when a distributed Denial of(More)
Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense. This material has been approved for public release and unlimited distribution except as restricted below. Internal use:* Permission to reproduce this material and(More)
In March of 2013, what started as a minor dispute between Spamhaus and Cyberbunker culminated in a distributed denial of service (DDoS) attack that was so massive, it was claimed to have slowed internet speeds around the globe. The attack clogged servers with dummy internet traffic at a rate of about 300 gigabits per second. By comparison , the largest(More)
—Moiré interferometry (MI) has proven to be a very useful tool for testing the reliability of many different electronic packages. Historically, MI has been used for monotonic thermo-mechanical loading or steady-state conditions induced strain measurements but never for fatigue testing. Interface failure of microelectronics devices is a significant concern(More)
We collaborate in a research program aimed at creating a rigorous framework, experimental infrastructure, and computational environment for understanding, experimenting with, manipulating, and modifying a diverse set of fundamental biological processes at multiple scales and spatio-temporal modes. The novelty of our research is based on an approach that (i)(More)
We address the problem of creating entire and complete maps of software code clones (copy features in data) in a corpus of binary artifacts of unknown provenance. We report on a practical methodology, which employs enhanced suffix data structures and partial orderings of clones to compute a compact representation of most interesting clones features in data.(More)
—Agents in a social-technological network can be thought of as strategically interacting with each other by continually observing their own local or hyperlocal information and communicating suitable signals to the receivers who can take appropriate actions. Such interactions have been modeled as information-asymmetric signaling games and studied in our(More)
We propose a game theoretic framework to study strategic interactions among Humans and Things, assumed to be interconnected by a social-technological network, such as Internet of Humans and Things. Often a pair of agents in the network interacts in order for an informed sender agent to signal an uninformed receiver agent to take an action so as to benefit(More)