Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Travis L. Bauer is active.

Publication


Featured researches published by Travis L. Bauer.


Proceedings of the Workshop on Multilingual Language Resources and Interoperability | 2006

Evaluation of the Bible as a Resource for Cross-Language Information Retrieval

Peter A. Chew; Steve Verzi; Travis L. Bauer; Jonathan T. McClain

An area of recent interest in cross-language information retrieval (CLIR) is the question of which parallel corpora might be best suited to tasks in CLIR, or even to what extent parallel corpora can be obtained or are necessary. One proposal, which in our opinion has been somewhat overlooked, is that the Bible holds a unique value as a multilingual corpus, being (among other things) widely available in a broad range of languages and having a high coverage of modern-day vocabulary. In this paper, we test empirically whether this claim is justified through a series of validation tests on various information retrieval tasks. Our results appear to indicate that our methodology may significantly outperform others recently proposed.


intelligence and security informatics | 2013

Dynamic information-theoretic measures for security informatics

Richard Colbaugh; Kristin Glass; Travis L. Bauer

Many important security informatics problems require consideration of dynamical phenomena for their solution; examples include predicting the behavior of individuals in social networks and distinguishing malicious and innocent computer network activities based on activity traces. While information theory offers powerful tools for analyzing dynamical processes, to date the application of information-theoretic methods in security domains has focused on static analyses (e.g., cryptography, natural language processing). This paper leverages information-theoretic concepts and measures to quantify the similarity of pairs of stochastic dynamical systems, and shows that this capability can be used to solve important problems which arise in security applications. We begin by presenting a concise review of the information theory required for our development, and then address two challenging tasks: 1.) characterizing the way influence propagates through social networks, and 2.) distinguishing malware from legitimate software based on the instruction sequences of the disassembled programs. In each application, case studies involving real-world datasets demonstrate that the proposed techniques outperform standard methods.


visual analytics science and technology | 2009

Working memory load as a novel tool for evaluating visual analytics

Courtney C. Dornburg; Laura E. Matzen; Travis L. Bauer; Laura A. McNamara

The current visual analytics literature highlights design and evaluation processes that are highly variable and situation dependent, which raises at least two broad challenges. First, lack of a standardized evaluation criterion leads to costly re-designs for each task and specific user community. Second, this inadequacy in criterion validation raises significant uncertainty regarding visualization outputs and their related decisions, which may be especially troubling in high consequence environments like those of the Intelligence Community. As an attempt to standardize the “apples and oranges” of the extant situation, we propose the creation of standardized evaluation tools using general principles of human cognition. Theoretically, visual analytics enables the user to see information in a way that should attenuate the users memory load and increase the users task-available cognitive resources. By using general cognitive abilities like available working memory resources as our dependent measures, we propose to develop standardized evaluative capabilities that can be generalized across contexts, tasks, and user communities.


intelligence and security informatics | 2013

Detecting collaboration from behavior

Travis L. Bauer; Daniel Garcia; Richard Colbaugh; Kristin Glass

This paper describes a method for inferring when a person might be coordinating with others based on their behavior. We show that, in Wikipedia, editing behavior is more random when coordinating with others. We analyzed this using both entropy and conditional entropy. These algorithms rely only on timestamped events associated with entities, making them broadly applicable to other domains. In this paper, we will discuss previous research on this topic, how we adapted that research to the problem ofWikipedia edit behavior, describe how we extended it, and discuss our results.


social informatics | 2017

Compression-Based Algorithms for Deception Detection

Christina L. Ting; Andrew N Fisher; Travis L. Bauer

In this work we extend compression-based algorithms for deception detection in text. In contrast to approaches that rely on theories for deception to identify feature sets, compression automatically identifies the most significant features. We consider two datasets that allow us to explore deception in opinion (content) and deception in identity (stylometry). Our first approach is to use unsupervised clustering based on a normalized compression distance (NCD) between documents. Our second approach is to use Prediction by Partial Matching (PPM) to train a classifier with conditional probabilities from labeled documents, followed by arithmetic coding (AC) to classify an unknown document based on which label gives the best compression. We find a significant dependence of the classifier on the relative volume of training data used to build the conditional probability distributions of the different labels. Methods are demonstrated to overcome the data size-dependence when analytics, not information transfer, is the goal. Our results indicate that deceptive text contains structure statistically distinct from truthful text, and that this structure can be automatically detected using compression-based algorithms.


advances in social networks analysis and mining | 2017

Temporal Anomaly Detection in Social Media

Jacek Skryzalin; Richard V. Field; Andrew N Fisher; Travis L. Bauer

In this work, we approach topic tracking and meme trending in social media with a temporal focus; rather than analyzing topics, we aim to identify time periods whose content differs significantly from normal. We detail two approaches. The first is an information-theoretic analysis of the distributions of terms emitted during each time period. In the second, we cluster the documents from each time period and analyze the tightness of each clustering. We also discuss a method of combining the scores created by each technique, and we provide ample empirical analysis of our methodology on various Twitter datasets.


Archive | 2017

Accessibility, Adaptability, and Extendibility: Dealing with the Small Data Problem

Travis L. Bauer; Daniel Garcia

An underserved niche exists for data mining tools in complex analytical environments. We propose three attributes of analytical tool development that facilitates rapid operationalization of new tools into complex, dynamic environments: accessibility, adaptability, and extendibility. Accessibility we define as the ability to load data into an analytical system quickly and seamlessly. Adaptability we define as the ability to apply a tool rapidly to new, unanticipated use cases. Extendibility we define as the ability to create new functionality “in the field” where it is being used and, if needed, harden that new functionality into a new, more permanent user interface. Distributed “big data” systems generally do not optimize for these attributes, creating an underserved niche for new analytical tools. In this paper we will define the problem, examine the three attributes, and describe the architecture of an example system called Citrus that we have built and use that is especially focused on these three attributes.


Archive | 2008

Yucca Mountain licensing support network archive assistant.

Daniel M. Dunlavy; Travis L. Bauer; Stephen J. Verzi; Justin Derrick Basilico; Wendy Shaneyfelt

This report describes the Licensing Support Network (LSN) Assistant--a set of tools for categorizing e-mail messages and documents, and investigating and correcting existing archives of categorized e-mail messages and documents. The two main tools in the LSN Assistant are the LSN Archive Assistant (LSNAA) tool for recategorizing manually labeled e-mail messages and documents and the LSN Realtime Assistant (LSNRA) tool for categorizing new e-mail messages and documents. This report focuses on the LSNAA tool. There are two main components of the LSNAA tool. The first is the Sandia Categorization Framework, which is responsible for providing categorizations for documents in an archive and storing them in an appropriate Categorization Database. The second is the actual user interface, which primarily interacts with the Categorization Database, providing a way for finding and correcting categorizations errors in the database. A procedure for applying the LSNAA tool and an example use case of the LSNAA tool applied to a set of e-mail messages are provided. Performance results of the categorization model designed for this example use case are presented.


Archive | 2007

Improving human effectiveness for extreme-scale problem solving : final report (assessing the effectiveness of electronic brainstorming in an industrial setting).

Courtney C. Dornburg; Susan Marie Stevens; Travis L. Bauer; George S. Davidson; James Chris Forsythe; Stacey Langfitt Hendrickson

An experiment was conducted comparing the effectiveness of individual versus group electronic brainstorming in order to address difficult, real world challenges. While industrial reliance on electronic communications has become ubiquitous, empirical and theoretical understanding of the bounds of its effectiveness have been limited. Previous research using short-term, laboratory experiments have engaged small groups of students in answering questions irrelevant to an industrial setting. The current experiment extends current findings beyond the laboratory to larger groups of real-world employees addressing organization-relevant challenges over the course of four days. Findings are twofold. First, the data demonstrate that (for this design) individuals perform at least as well as groups in producing quantity of electronic ideas, regardless of brainstorming duration. However, when judged with respect to quality along three dimensions (originality, feasibility, and effectiveness), the individuals significantly (p<0.05) out performed the group working together. The theoretical and applied (e.g., cost effectiveness) implications of this finding are discussed. Second, the current experiment yielded several viable solutions to the wickedly difficult problem that was posed.


Archive | 2009

Computation of term dominance in text documents

Travis L. Bauer; Zachary O. Benz; Stephen J. Verzi

Collaboration


Dive into the Travis L. Bauer's collaboration.

Top Co-Authors

Avatar

Richard Colbaugh

New Mexico State University

View shared research outputs
Top Co-Authors

Avatar

Kristin Glass

New Mexico Institute of Mining and Technology

View shared research outputs
Top Co-Authors

Avatar

Andrew N Fisher

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Courtney C. Dornburg

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Daniel Garcia

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Jonathan T. McClain

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Laura A. McNamara

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Laura E. Matzen

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Stephen J. Verzi

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Christina L. Ting

Sandia National Laboratories

View shared research outputs
Researchain Logo
Decentralizing Knowledge