William H. Turkett

Learn More
A Moving Target (MT) defense constantly changes a system's attack surface, in an attempt to limit the usefulness of the reconnaissance the attacker has collected. One approach to this defense strategy is to intermittently change a system's configuration. These changes must maintain functionality and security, while also being diverse. Finding suitable(More)
Osteoarthritis (OA) is characterized by remodeling and degradation of joint tissues. Microarray studies have led to a better understanding of the molecular changes that occur in tissues affected by conditions such as OA; however, such analyses are limited to the identification of a list of genes with altered transcript expression, usually at a single time(More)
To identify gene products that participate in auxin-dependent lateral root formation, a high temporal resolution, genome-wide transcript abundance analysis was performed with auxin-treated Arabidopsis thaliana roots. Data analysis identified 1246 transcripts that were consistently regulated by indole-3-acetic acid (IAA), partitioning into 60 clusters with(More)
Reconstructing networks from time series data is a difficult inverse problem. We apply two methods to this problem using co-temporal functions. Co-temporal functions capture mathematical invariants over time series data. Two modeling techniques for co-temporal networks, one based on algebraic techniques and the other on Bayesian inference, are compared and(More)
This work addresses the problem of in-the-dark traffic classification for TCP sessions, an important problem in network management. An innovative use of support vector machines (SVMs) with a spectrum representation of packet flows is demonstrated to provide a highly accurate, fast, and robust method for classifying common application protocols. The use of a(More)
This paper describes an architecture for enabling robust autonomous decision making and task execution. A key feature of the architecture is that agent behavior is constrained by sets of agent societal laws similar to Asimov's laws of robotics. In accordance with embedded philosophical principles, agents use decision theory in their negotiations to evaluate(More)
This paper describes a new program for attracting non-traditional students into computer science and retaining them through sustained peer and faculty mentoring. The program is centered on socially-inspired learning, - learning <i>in</i> and <i>for</i> a community. It consists of a STEM Incubator course, hands-on projects with real-world applications, a(More)
The advent and ubiquity of mass-market portable computational devices has opened up new opportunities for the development of assistive technologies for disabilities, especially within the domain of augmentative and alternative communications (AAC) devices. Word prediction can facilitate everyday communication on mobile devices by reducing the physical(More)
Multiple approaches for reverse-engineering biological networks from time-series data have been proposed in the computational biology literature. These approaches can be classified by their underlying mathematical algorithms, such as Bayesian or algebraic techniques, as well as by their time paradigm, which includes next-state and co-temporal modeling. The(More)