James A. Pita. Page 1 of 5 EDUCATION RESEARCH EXPERIENCE

Similar documents
ZACHARY J. OSTER CURRICULUM VITAE

Hongyan Ma. University of California, Los Angeles

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

University of Southern California Hayward R. Alker Postdoctoral Fellow, Center for International Studies,

Top US Tech Talent for the Top China Tech Company

2017- Part-Time Professor Department of Political Science, Concordia University, Montréal, Canada

Why Do They Fail? An Experimental Assessment of the Role of Reputation and Effort in the Public s Response to Foreign Policy Failures.

Xinyu Tang. Education. Research Interests. Honors and Awards. Professional Experience

Susanna M Donaldson Curriculum Vitae

Development of an IT Curriculum. Dr. Jochen Koubek Humboldt-Universität zu Berlin Technische Universität Berlin 2008

FRANKLIN D. CHAMBERS,

Massachusetts Institute of Technology Tel: Massachusetts Avenue Room 32-D558 MA 02139

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X

Mathematics 112 Phone: (580) Southeastern Oklahoma State University Web: Durant, OK USA

Ph.D. Computer Engineering and Information Science. Case Western Reserve University. Cleveland, OH, 1986

Seminar - Organic Computing

Thomas W.M. Vossen. EDUCATION University of Maryland at College Park, College Park, MD December 2002 Doctor of Philosophy, Business and Management

MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE

Curriculum Vitae FARES FRAIJ, Ph.D. Lecturer

Nearing Completion of Prototype 1: Discovery

Emmanuel Opara, D.B.A. Associate Professor Accounting & Finance & MIS College of Business

Resume. Christine Ann Loucks Telephone: (208) (work)

Wenguang Sun CAREER Award. National Science Foundation

GRADUATE STUDENT HANDBOOK Master of Science Programs in Biostatistics

California State University, Los Angeles TRIO Upward Bound & Upward Bound Math/Science

Citrine Informatics. The Latest from Citrine. Citrine Informatics. The data analytics platform for the physical world

We are strong in research and particularly noted in software engineering, information security and privacy, and humane gaming.

Integrating E-learning Environments with Computational Intelligence Assessment Agents

Undergraduate Program Guide. Bachelor of Science. Computer Science DEPARTMENT OF COMPUTER SCIENCE and ENGINEERING

High-level Reinforcement Learning in Strategy Games

Roadmap to College: Highly Selective Schools

Telekooperation Seminar

Charity Cayton 3921A Granada Dr, Winterville, NC Phone: (336) ,

Bellevue University Bellevue, NE

Stephanie Ann Siler. PERSONAL INFORMATION Senior Research Scientist; Department of Psychology, Carnegie Mellon University

New Jersey Institute of Technology Newark College of Engineering

Guide to the Program in Comparative Culture Records, University of California, Irvine AS.014

Jacqueline C. Kowtko, Patti J. Price Speech Research Program, SRI International, Menlo Park, CA 94025

Python Machine Learning

Sorority Life At The Capstone

Oregon NASA Space Grant

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

Department of Economics Phone: (617) Boston University Fax: (617) Bay State Road

Time, talent, treasure FRATERNITY VALUE: PHILANTHROPIC SERVICE TO OTHERS SUGGESTED FACILITATOR: VICE PRESIDENT OF PHILANTHROPY

Predicting Students Performance with SimStudent: Learning Cognitive Skills from Observation

Business Analytics and Information Tech COURSE NUMBER: 33:136:494 COURSE TITLE: Data Mining and Business Intelligence

26 th Annual Conference and Exposition January 28, 2017 The City Centre Sheraton Hotel Indianapolis, Indiana

Laboratorio di Intelligenza Artificiale e Robotica

IAT 888: Metacreation Machines endowed with creative behavior. Philippe Pasquier Office 565 (floor 14)

FEIRONG YUAN, PH.D. Updated: April 15, 2016

Albert (Yan) Wang. Flow-induced Trading Pressure and Corporate Investment (with Xiaoxia Lou), Forthcoming at

CSL465/603 - Machine Learning

IRB#: x ID# i036148

Knowledge-Based - Systems

Curriculum Vitae James J. Cummings

Laboratorio di Intelligenza Artificiale e Robotica

Positive turning points for girls in mathematics classrooms: Do they stand the test of time?

David Erwin Ritter Associate Professor of Accounting MBA Coordinator Texas A&M University Central Texas

The College of Law Mission Statement

3. Improving Weather and Emergency Management Messaging: The Tulsa Weather Message Experiment. Arizona State University

TOKEN-BASED APPROACH FOR SCALABLE TEAM COORDINATION. by Yang Xu PhD of Information Sciences

Data Fusion Models in WSNs: Comparison and Analysis

LIM College New York, NY

Sung-Wook Kwon. Texas Tech University Phone: Box Fax: Lubbock, TX 79409

St. John Fisher College Rochester, NY

A Neural Network GUI Tested on Text-To-Phoneme Mapping

HIGHER EDUCATION IN POLAND

AN EXAMPLE OF THE GOMORY CUTTING PLANE ALGORITHM. max z = 3x 1 + 4x 2. 3x 1 x x x x N 2

Radius STEM Readiness TM

Margaret Parnell Hogan. Focus Areas. Overview

The Strong Minimalist Thesis and Bounded Optimality

Computer Science Self-Study Report for APC Review Fall 2007

EDELINA M. BURCIAGA 3151 Social Science Plaza Irvine, CA

A Study of Pre-Algebra Learning in the Context of a Computer Game-Making Course

African American Fraternities And Sororities: The Legacy And The Vision

Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for

Len Lundstrum, Ph.D., FRM

Academic Internships: Crafting, Recruiting, Supervising

Building a Vibrant Alumni Network

Guide to the University of Chicago, Phi Alpha Delta Law Fraternity Records

COMPUTER SCIENCE GRADUATE STUDIES Course Descriptions by Research Area

2017 Florence, Italty Conference Abstract

NANCY L. STOKEY. Visiting Professor of Economics, Department of Economics, University of Chicago,

Agent-Based Software Engineering

EXPERT SYSTEMS IN PRODUCTION MANAGEMENT. Daniel E. O'LEARY School of Business University of Southern California Los Angeles, California

CURRICULUM VITAE. Jose A. Torres

An Introduction to Simio for Beginners

Bachelor of Software Engineering: Emerging sustainable partnership with industry in ODL

An OO Framework for building Intelligence and Learning properties in Software Agents

A cognitive perspective on pair programming

Execution Plan for Software Engineering Education in Taiwan

Rule Learning With Negation: Issues Regarding Effectiveness

WHY GRADUATE SCHOOL? Turning Today s Technical Talent Into Tomorrow s Technology Leaders

Executive Summary. Osan High School

COMPUTER SCIENCE GRADUATE STUDIES Course Descriptions by Methodology

Strategic Plan Update, Physics Department May 2010

A Lesson Study Project: Connecting Theory and Practice Through the Development of an Exemplar Video for Algebra I Teachers and Students

UCEAS: User-centred Evaluations of Adaptive Systems

The Importance of Narrative as an Affective Instructional Strategy

Implementing a tool to Support KAOS-Beta Process Model Using EPF

Transcription:

Page 1 of 5 James A. Pita University of Southern California Phone: (307) 371-2139 Powell Hall of Engineering (PHE) 101 Fax: (213) 740-7285 3737 Watt Way Email: jpita@usc.edu Los Angeles, CA 90089-0781 http://teamcore.usc.edu/pita EDUCATION University of Southern California, Los Angeles, CA 90089 Ph.D Computer Science in progress (ABD), GPA 3.84/4.0 Teamcore, advised by Milind Tambe Committee: Milind Tambe (Chair) Jonathan Gratch, Richard John, Sarit Kraus, Stacy Marsella, Nicholas Weller Michigan State University, East Lansing, MI 48823 BS Computer Science, GPA 3.97/4.0 Graduated with High Honors RESEARCH EXPERIENCE Fall 2007 to Present Fall 2005 to 2007 Fall 2003 to 2005 Summer 2002 Research Assistant, Computer Science Department, TEAMCORE University of Southern California Viterbi School of Engineering, Los Angeles, CA 90089 Supervisor: Milind Tambe (213) 740-6447 Pioneering the first generation of operational game-theoretic systems for counterterrorism, which represent the first and only deployed game theoretic systems for unpredictability in security scheduling to improve security for key organizations Lead developer on the ARMOR (deployed since 2007) and GUARDS (currently under evaluation) security systems for Los Angeles International Airport and the Transportation Security Administration Developing new game-theoretic models and mixed integer linear programming solution algorithms for security domains Developing new behavioral algorithms for human adversaries in security domains Research Assistant, Computer Science Department, The Digital Evolution Laboratory Michigan State University Engineering College, East Lansing, MI 48825 Supervisor: Charles Ofria (517) 355-8389 Assisted in model and algorithm development for reconstruction of the most central bifurcation of a phylogeny Lead developer on software to both reconstruct and display phylogeny bifurcations Professorial Assistant, Computer Science Department Michigan State University Department of Computer Science, East Lansing, MI 48825 Supervisor: Sakti Pramanik (517) 353-3177 Applied critical thinking and problem solving skills in researching a new database genomic sequence searching algorithm for bioinformatics Research Assistant, Microbiology Department University of Wyoming Department of Microbiology, Laramie, WY 82072 Supervisor: Randy Lewis (435) 797-9291 Applied biological principles and worked on the creation and insertion of a working plasmid vector for the development of synthetic spider silk Assisted and cooperated with a research team in the gathering of data regarding synthetically created spider silk

Page 2 of 5 EMPLOYMENT Summer 2007 Summer 2005 Fall 2004 to 2006 Software Engineer, MATRIX: The Center for the Humane Arts, Letters, and Social Science Michigan State University, 409 Natural Sciences Building, East Lansing, MI 48824 Main Office: (517) 355-9300 Developed and maintained web sites for Humane Arts, Letters, and Social Sciences Developed and maintained Sequel databases for online data collection Enhanced existing web code Software Engineer, Intrado 1600 Dry Creek Rd, Longmont, CO 80503 Main Office: (720) 494-5800 Enhanced existing project code on secondary distribution system for Amber Alerts Created automated build environments for multiple projects Refactored code and created automated unit test for quality assurance Academic Assistant, Guided Learning Center, Diversity Programs Office Michigan State University Engineering College, East Lansing, MI 48825 Supervisor: Teresa Vandersloot (517) 353-5455 Provided tutoring to students in Computer Science and Physics Tailored teaching to different learning styles Debugged different styles of C++ code HONORS AND AWARDS Research: Best Paper Awards and Finalists 2011 Best paper, AAMAS 2011 Innovative Applications track Our paper from the International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011) won the innovative applications best paper award. The paper is entitled GUARDS Game Theoretic Security Allocation on a National Scale. 2011 RIST Prize, Military Operations Research Society Our abstract and subsequent presentation won the RIST prize. The abstract is entitled Software Assistants for Patrol Planning at LAX, Federal Air Marshals Service, and Transportation Security Administration. 2010 Finalist, EURO Operations Research Conference Excellence in Practice Award EEPA 2010 Our paper from the journal Interfaces selected to be a finalist for the EEPA 2010 award. The paper is entitled Software Assistants for Randomized Patrol Planning for The LAX Airport Police and The Federal Air Marshals Service. 2010 Student Merit Award, Security and Defense, Society for Risk Analysis (SRA) meeting I won the student merit award for our abstract at the SRA annual meeting. The abstract is entitled Research allocation decisions against adaptive adversaries. 2008 Finalist for Best paper, AAMAS 2008 Industry track Our paper from the International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008) a finalist for the industry track best paper ward. The paper is entitled Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport.

Page 3 of 5 Research: Major Awards 2009 Commendation, City of Los Angeles, Los Angeles World Airports Police Department As a lead member of a team of researchers from CREATE (Center for Risk and Economic Analysis of Terrorism Events) that developed ARMOR, Assistant for Randomized Monitoring Over Routes. The commendation states To merit this commendation you have performed an exceptional service to the Airport police Division, the Los Angeles World Airports and the city of Los Angeles. Your outstanding service facilitates the critical link between the laboratory and the operational world. Thank you for your outstanding contributions to the security of our nation. 2009 Certificate of Recognition, DHS University Programs Received by CREATE The DHS Office of University Programs recognizes CREATE for the outstanding contributions to the security of our nation that the Assistant for Randomized Monitoring over Routes (ARMOR) has made to the police operations at the Los Angeles World Airports. Other Honors and Awards 2009 Homeland Security Fellowship Awarded by the Center for Risk and Economic Analysis of Terrorism Events (CREATE) renewable for three years 2007 Annenberg Graduate Fellowshop Awarded by the University of Southern California Annenberg School for Communication & Journalism renewable for four years 2007 Michigan State University Distinguished Academic Achievement Award Awarded by the Michigan State University Department of Computer Science and Engineering in 2005, 2006, and 2007 2007 Michigan State University Distinguished Service Award Awarded by the Michigan State University Department of Computer Science and Engineering in 2006 and 2007 2006 Michigan State University Homecoming Court Elected to represent the student body of Michigan State University on Homecoming Court at the Homecoming game in 2006 2003 Hispanic National Merit Scholarship Awarded by Michigan State University for being named a Hispanic National Merit Scholar based on my PSAT scores PUBLICATIONS Rigorously Refereed Journal Articles and Magazine Articles 1. Robust Solutions to Stackelberg Games: Addressing Bounded Rationality and Limited Observations in Human Cognition (J. Pita, M. Jain, F. Ordóñez, M. Tambe, and S. Kraus). Artificial Intelligence Journal, 174(15):1142-1171, 2010 2. Software Assistants for Randomized Patrol Planning for The LAX Airport Police and The Federal Air Marshals Service (M. Jain, J. Tsai, J. Pita, C. Kiekintveld, S. Rathi, F. Ordóñez, M. Tambe) Interfaces, 40(4):267-290, 2010 (FINALIST, Euro Excellence in Practice Award EEPA 2010) 3. Using Game Theory for Los Angeles Airport Security (J. Pita, M. Jain, F. Ordóñez, C. Portway, M. Tambe, C. Western, P. Paruchuri, and S. Kraus). AI Magazine, 30(1):43-57, 2009

Page 4 of 5 Rigorously Refereed Conferences: Full Papers 1. A Robust Approach to Addressing Human Adversaries in Security Games (J. Pita, R. John, R. Maheswaran, M. Tambe, and S. Kraus). Twentieth European Conference on Artificial Intelligence, August 2012 2. Game Theory and Human Behavior: Challenges in Security and Sustainability (R. Yang, M. Tambe, M. Jain, J. Kwak, J. Pita, and Z. Yin). Second International Conference on Algorithmic Decision Theory, October 2011 (Invited Paper) 3. GUARDS Innovative Application of Game Theory for National Airport Security (J. Pita, M. Tambe, C. Kiekintveld, S. Cullen, and E. Steigerwald). Twenty-second International Joint Conference on Artificial Intelligence, July 2011 (Best Paper Track) 4. GUARDS Game Theoretic Security Allocation on a National Scale (J. Pita, M. Tambe, C. Kiekintveld, S. Cullen, and E. Steigerwald). Tenth International Conference on Autonomous Agents and Multi-Agent Systems, May 2011 [Best Paper - Innovative Applications Track] 5. Effective Solutions for Real-World Stackelberg Games: When Agents Must Deal with Human Uncertainties (J. Pita, M. Jain, F. Ordóñez, M. Tambe, S. Kraus, and R. Magori-Cohen). Eighth International Conference on Autonomous Agents and Multi-Agent Systems, May 2009 6. Computing Optimal Randomized Resource Allocations for Massive Security Game (C. Kiekintveld, M. Jain, J. Tsai, J. Pita, F. Ordóñez, and M. Tambe). Eighth International Conference on Autonomous Agents and Multi-Agent Systems, May 2009 7. Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport (J. Pita, M. Jain, J. Marecki, C. Western, C. Portway, M. Tambe, F. Ordóñez, P. Paruchuri, and S. Kraus). Industry Track of the Seventh International Conference on Autonomous Agents and Multi-Agent Systems, May 2008 (Nominated for Best Industry Paper) 8. TRUE STORY: Dynamically Generated, Contextually Linked Quests in Persistent Systems (J. Pita, B. Magerko, and S. Brodie). Future Play, 2007 Rigorously Reviewed Conferences: Short Papers 1. A Robust Approach to Addressing Human Adversaries in Security Games (J. Pita, R. John, R. Maheswaran, M. Tabme, R. Yang, and S. Kraus). Eleventh International Conference on Autonomous Agents and Multi- Agent Systems, June 2012 2. Real-World Security Games: Toward Addressing Human Decision-Making Uncertainty (J. Pita). Tenth International Conference on Autonomous Agents and Multi-Agent Systems, May 2011 Book Chapters 1. ARMOR Software: A Game Theoretic Approach for Airport Security (J. Pita, M. Jain, F. Ordóñez, C. Portway, M. Tambe, C. Western, P. Paruchuri, and S. Kraus). In Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned, University Press, 2011 (Reprinted Version of Original Paper) 2. GUARDS Game Theoretic Security Allocation on a National Scale (J. Pita, M. Tambe, C. Kiekintveld, S. Cullen, and E. Steigerwald). In Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned, University Press, 2011 (Reprinted Version of Original Paper) 3. Computing Optimal Randomizd Resource Allocations for Massive Security Games (C. Kiekintveld, M. Jain, J. Tsai, J. Pita, F. Ordóñez, and M. Tambe). In "Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned," University Press, 2011 (Reprinted Version of Original Paper) 4. Effective Solutions for Real-World Stackelberg Games: When Agents Must Deal with Human Uncertainties (J. Pita, M. Jain, F. Ordóñez, M. Tambe, S. Kraus, and R. Magori-Cohen). In Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned, University Press, 2011 (Reprinted Version of Original Paper) 5. ARMOR Software: A Game Theoretic Approach for Airport Security (J. Pita, M. Jain, F. Ordóñez, C. Portway, M. Tambe, C. Western, P. Paruchuri, and S. Kraus). In Protecting Airline Passengers in the Age of Terrorism, Praeger Publishers, 2009 (Reprinted Version of Original Paper)

Page 5 of 5 Refereed Magazine, Workshop, and Other Publications 1. A Robust Solution Concept for Human Bounded Rationality in Security Games (J. Pita, R. John, R. Maheswaran, M. Tambe, and S. Kraus). AAMAS Workshop on Human-Agent Interaction Design and Models (HAIDM), 2012 2. Resource Allocation for Heterogeneous Security Activities Against Diverse Threats (J. Pita, C. Kiekintveld, and M. Tambe). INFORMS Computing Society Conference, 2011 3. Toward Addressing Human Behavior with Observational Uncertainty in Security Games (J. Pita, R. Yang, M. Tambe, and R. John). AAAI Workshop on Applied Adversarial Reasoning and Risk Modeling (AARM), 2011 4. GUARDS and PROTECT: Next Generation Applications of Security Games (B. An, J. Pita, E. Shieh, M. Tambe, C. Kiekintveld, and J. Marecki). SIGecom Exchanges, 10(1), 2011 5. Randomizing Security Activities with Attacker Circumvention Strategies (J. Pita, C. Kiekintveld, M. Tambe, and M. Scott). AAMAS Workshop on Optimization in Multi-Agent Systems (OPTMAS), 2010 6. Resource Allocation Decisions Against Adaptive Adversaries (J. Pita, C. Kiekintveld, and M. Tambe). Society for Risk Analysis Annual Meeting, 2010 [Student Merit Award, Security and Defense Group] 7. Lessons Learned from Deployed Game Theoretic Security Applications (J. Pita, M. Tambe, M. Jain, J. Tsai, and F. Ordóñez) Society for Risk Analysis Annual Meeting, 2010 8. Security Applications: Lessons of Real-World Deployment (J. Pita, H. Bellamane, M. Jain, C. Kiekintveld, J. Tsai, F. Ordóñez, and M. Tambe). SIGecom Exchanges, 8(2), December 2009 9. Bayesian Stackelberg Games and their Application for Security at Los Angeles International Airport (M. Jain, J.Pita, M. Tambe, F. Ordóñez, P. Paruchuri, and S. Kraus). SIGecom Exchanges, 7(2), June 2008 10. ARMOR Security for Los Angeles International Airport (J. Pita, M. Jain, F. Ordóñez, C. Portway, M. Tambe, C. Western, P. Paruchuri, and S. Kraus). AAAI Intelligent Systems Demonstrations, 2008 11. Robust Solutions in Stackelberg Games: Addressing Boundedly Rational Human Preference Models (M. Jain, F. Ordóñez, J. Pita, C. Portway, M. Tambe, C. Western, P. Paruchuri, S. Kraus). AAAI 4 th Multidisciplinary Workshop on Advances in Preference Handling, 2008 Poster Presentations 1. Game Theoretic Approaches for Randomization in Security Resource Allocation (J. Pita, C. Kiekintveld, M. Jain, and M. Tambe). DIMACS/CCICADA Workshop on Adversarial Decision Making, 2010 2. A Game Theoretic Approach for Randomization in Security: A Report from the Trenches (M. Tambe, C. Kiekintveld, M. Taylor, J. Pita, and F. Ordóñez). Society for Risk Analysis Annual Meeting, 2009 3. Dealing with Human Uncertainties in Stackelberg Games (J. Pita and M. Tambe). The Third Annual Department of Homeland Security University Network Summit, 2009 4. Infrastructure Security via Randomization: A Game Theoretic Model and its Application at the Los Angeles International Airport (J. Pita, M. Jain, J. Marecki, F. Ordóñez, C. Portway, M. Tambe, C. Western, P. Paruchuri, and S. Kraus). IEEE International Conference on Technologies for Homeland Security, 2008 PROFESSIONAL SERVICE AND AFFILIATIONS 2005 to Present Tau Beta Pi National Engineering Honor Society, TBP 2003 to Present Phi Iota Alpha Fraternity Inc., PIA; [Secretary 2003, President 2005] 2004 to 2007 Society of Hispanic Professional Engineers, SHPE; [President 2005-2006] 2003 to 2007 Honor s Students Actively Recruiting, H-STAR; [Leadership Team 2005-2006] 2003 to 2007 Association for Computing Machinery, ACM; [President 2006] 2004 to 2005 Independent Greek Council, IGC; [Treasurer 2004-2005] SKILLS C++, C, Java, Python, PHP, linear programming, XML, HTML, TCP/IP networking and socket programming, UNIX/Linux, Sequel, Tomcat, Oracle, LaTeX, and Microsoft Office Tools