├── 00-schema-examples.json
├── 00-software-schema.json
├── 01-DARPA-BTO.json
├── 01-DARPA-DSO.json
├── 01-DARPA-I2O.json
├── 01-DARPA-TTO.json
├── AA-image.png
├── AA-program.json
├── AA-pubs.json
├── AA-software.json
├── ADAMS-program.json
├── ADAMS-pubs.json
├── APAC-image.jpg
├── APAC-program.json
├── APAC-pubs.json
├── APAC-software.json
├── AVM-program.json
├── AVM-software.json
├── BET-program.json
├── BET-pubs.json
├── BOLT-image.png
├── BOLT-program.json
├── BOLT-pubs.json
├── BOLT-software.json
├── Biochronicity-image.jpg
├── Biochronicity-program.json
├── Biochronicity-pubs.json
├── CFT-program.json
├── CFT-software.json
├── CINDER-program.json
├── CINDER-software.json
├── CRASH-image.jpg
├── CRASH-program.json
├── CRASH-pubs.json
├── CRASH-software.json
├── CSFV-image.jpg
├── CSFV-program.json
├── CSFV-pubs.json
├── CYBERGENOME-program.json
├── CYBERGENOME-pubs.json
├── CYBERGENOME-software.json
├── DCAPS-image.jpg
├── DCAPS-program.json
├── DCAPS-pubs.json
├── DCAPS-software.json
├── DEFT-image.jpg
├── DEFT-program.json
├── DEFT-pubs.json
├── DEFT-software.json
├── ENGAGE-program.json
├── ENGAGE-pubs.json
├── ENGAGE-software.json
├── F6-image.jpg
├── FLASHLIGHT-program.json
├── FLASHLIGHT-software.json
├── GRAPHS-program.json
├── GRAPHS-pubs.json
├── GRAPHS-software.json
├── HACMS-program.json
├── HACMS-pubs.json
├── HACMS-software.json
├── ICAS-program.json
├── MADCAT-program.json
├── MADCAT-pubs.json
├── MEMEX-data.json
├── MEMEX-image.jpg
├── MEMEX-program.json
├── MEMEX-pubs.json
├── MEMEX-software.json
├── MRC-program.json
├── MRC-pubs.json
├── MRC-software.json
├── MUSE-data.json
├── MUSE-image.jpg
├── MUSE-program.json
├── MUSE-pubs.json
├── MUSE-software.json
├── PLANX-program.json
├── PLANX-software.json
├── PPAML-image.jpg
├── PPAML-program.json
├── PPAML-pubs.json
├── PPAML-software.json
├── PROCEED-program.json
├── PROCEED-pubs.json
├── RATS-program.json
├── RATS-pubs.json
├── README.md
├── RP-program.json
├── RP-pubs.json
├── Revolutionizing-Prosthetics-image.jpg
├── SAFER-program.json
├── SAFER-pubs.json
├── SAFER-software.json
├── SMISC-program.json
├── SMISC-pubs.json
├── SystemF6-program.json
├── SystemF6-pubs.json
├── SystemF6-software.json
├── XDATA-data.json
├── XDATA-examples.json
├── XDATA-image.png
├── XDATA-program.json
├── XDATA-pubs.json
├── XDATA-software.json
├── active_content.json
├── active_content_deployed.json
└── license-content.json
/00-schema-examples.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "Type":"Office",
4 | "Schema":[
5 | {
6 | "DARPA Office": "BTO",
7 | "DARPA Long Name": "Biological Technologies Office",
8 | "DARPA Office Description": "The Biology, Technology & Complexity office focuses on...",
9 | "DARPA Office Color": "D35C00",
10 | "DARPA Link" : "http://www.darpa.mil/Our_Work/BTO/"
11 | }
12 | ]
13 | },
14 | {
15 | "Type":"Program",
16 | "Schema":[
17 | {
18 | "DARPA Office":"",
19 | "DARPA Program Name":"XDATA",
20 | "Long Name":"XDATA",
21 | "Program Teams":[
22 | ""
23 | ],
24 | "Link":"http://www.darpa.mil/Our_Work/I2O/Programs/XDATA.aspx",
25 | "Display Software Columns":[
26 | "Team",
27 | "Project",
28 | "Description",
29 | "Instructional Material",
30 | "Category",
31 | "Code",
32 | "Stats",
33 | "License"
34 | ],
35 | "Display Pubs Columns":[
36 | "Team",
37 | "Title",
38 | "Link"
39 | ],
40 | "Display Data Columns":[
41 | "Industry",
42 | "Name",
43 | "Description",
44 | "Total Rows",
45 | "Total Columns"
46 |
47 | ],
48 | "Display Example Columns":[
49 | "Name",
50 | "Team",
51 | "Description",
52 | "Instructional Material",
53 | "Link"
54 | ],
55 | "Description":"XDATA is developing an open source software library for big data to help overcome the challenges of effectively scaling to modern data volume and characteristics. The program is developing the tools and techniques to process and analyze large sets of imperfect, incomplete data. Its programs and publications focus on the areas of analytics, visualization, and infrastructure to efficiently fuse, analyze and disseminate these large volumes of data.",
56 | "Program Manager Link":"http://www.darpa.mil/Our_Work/I2O/Personnel/Dr_Christopher_White.aspx",
57 | "Program Manager":"Dr. Christopher White",
58 | "Program Manager Email":"christopher.white@darpa.mil",
59 | "Image":"XDATA-image.png"
60 | }
61 | ]
62 | },
63 | {
64 | "Type":"Software",
65 | "Schema":[
66 | {
67 | "DARPA Program":"XDATA",
68 | "Program Teams":[
69 | "Harvard",
70 | "Kitware, Inc."
71 | ],
72 | "Contributors":[
73 | "Johannes Kepler University Linz"
74 | ],
75 | "Sub-contractors":[
76 | ""
77 | ],
78 | "Software":"LineUp Web",
79 | "Internal Link":"https://xd-wiki.xdata.data-tactics-corp.com:8443/display/VIS/Visual+Design+Environment-Kitware+Home",
80 | "External Link":"http://lineup.caleydo.org",
81 | "Public Code Repo":"2014-06",
82 | "Instructional Material":"2014-07",
83 | "Stats":"",
84 | "Description":"LineUpWeb is the web version of the novel and scalable visualization technique. This interactive technique supports the ranking of items based on multiple heterogeneous attributes with different scales and semantics. It enables users to interactively combine attributes and flexibly refine parameters to explore the effect of changes in the attribute combination.",
85 | "Internal Code Repo":"tools\\visualizations\\kitware\\xdata-apps",
86 | "License":[
87 | "BSD"
88 | ],
89 | "Languages":[
90 | ""
91 | ],
92 | "Platform Requirements":[
93 | ""
94 | ],
95 | "Dependent modules":[
96 | ""
97 | ],
98 | "Dependent module URLs":[
99 | ""
100 | ],
101 | "Component modules":[
102 | ""
103 | ],
104 | "Component module URLs":[
105 | ""
106 | ],
107 | "Industry":[
108 | ""
109 | ],
110 | "Functionality":[
111 | ""
112 | ],
113 | "Categories":[
114 | "Visualization"
115 | ],
116 | "New Date":"Date approved to go live in yyyymmdd format",
117 | "Update Date":"Date updated with new information in yyyymmdd format"
118 | }
119 | ]
120 | },
121 | {
122 | "Type":"Publication",
123 | "Schema":[
124 | {
125 | "DARPA Program":"XDATA",
126 | "Program Teams":[
127 | "Boeing/Pitt"
128 | ],
129 | "Title":"Impact of Precision of Bayesian Network Parameters on Accuracy of Medical Diagnostic Systems",
130 | "Authors":[
131 | "A. Onisko",
132 | "M. J. Druzdzel"
133 | ],
134 | "Link":"http://www.ncbi.nlm.nih.gov/pubmed/23466438",
135 | "Categories":[
136 | "Applications and Expert Systems",
137 | "Model Validation and Analysis"
138 | ],
139 | "Subcategories":[
140 | ""
141 | ],
142 | "ACM 1998 classification code":[
143 | "I.2.1",
144 | "I.6.4"
145 | ],
146 | "New Date":"Date approved to go live in yyyymmdd format",
147 | "Update Date":"Date updated with new information in yyyymmdd format"
148 | }
149 | ]
150 | },
151 | {
152 | "Type":"Data",
153 | "Schema":[
154 | {
155 | "DARPA Program":"XDATA",
156 | "Data Set Name":"Boeing/Pitt",
157 | "Description":"Impact of Precision of Bayesian Network Parameters on Accuracy of Medical Diagnostic Systems",
158 | "Number of Rows":"whole number",
159 | "Number of Columns":"whole number",
160 | "Industry":[
161 | "Applications and Expert Systems",
162 | "Model Validation and Analysis"
163 | ],
164 | "New Date":"Date approved to go live in yyyymmdd format",
165 | "Update Date":"Date updated with new information in yyyymmdd format"
166 | }
167 | ]
168 | },
169 | {
170 | "Type":"Example",
171 | "Schema":[
172 | {
173 | "Application Name":"Fake Application",
174 | "Teams":[
175 | "Boeing",
176 | "L-3"
177 | ],
178 | "Description":"A fake example",
179 | "Instructional Material":"http://www.example.com/demo",
180 | "Link":"http://www.example.com",
181 | "New Date":"Date approved to go live in yyyymmdd format",
182 | "Update Date":"Date updated with new information in yyyymmdd format"
183 | }
184 | ]
185 | }
186 | ]
187 |
--------------------------------------------------------------------------------
/00-software-schema.json:
--------------------------------------------------------------------------------
1 | {
2 | "type":"object",
3 | "id": "DARPA Open Catalog Software",
4 | "properties":{
5 | "Categories": {
6 | "type":"array",
7 | "id": "http://jsonschema.net/Categories",
8 | "required":false,
9 | "items":
10 | {
11 | "type":"string",
12 | "required":false
13 | }
14 |
15 |
16 | },
17 | "DARPA Program": {
18 | "type":"string",
19 | "required":true
20 | },
21 | "Description": {
22 | "type":"string",
23 | "required":true
24 | },
25 | "External Link": {
26 | "type":"string",
27 | "required":false
28 | },
29 | "Instructional Material": {
30 | "type":"string",
31 | "required":false
32 | },
33 | "Internal Code Repo": {
34 | "type":"string",
35 | "required":false
36 | },
37 | "Internal Link": {
38 | "type":"string",
39 | "required":false
40 | },
41 | "Languages": {
42 | "type":"array",
43 | "required":false,
44 | "items":
45 | {
46 | "type":"string",
47 | "required":false
48 | }
49 |
50 |
51 | },
52 | "License": {
53 | "type":"string",
54 | "required":false
55 | },
56 | "Program Teams": {
57 | "type":"array",
58 | "required":false,
59 | "items":
60 | {
61 | "type":"string",
62 | "required":false
63 | }
64 |
65 |
66 | },
67 | "Public Code Repo": {
68 | "type":"string",
69 | "required":false
70 | },
71 | "Software": {
72 | "type":"string",
73 | "required":true
74 | }
75 | }
76 | }
77 |
78 |
--------------------------------------------------------------------------------
/01-DARPA-BTO.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office": "BTO",
3 | "DARPA Long Name": "Biological Technologies Office",
4 | "DARPA Office Description": "The Biology, Technology & Complexity office focuses on...",
5 | "DARPA Office Color": "D35C00",
6 | "DARPA Link" : "http://www.darpa.mil/about-us/offices/bto"
7 | }
8 |
--------------------------------------------------------------------------------
/01-DARPA-DSO.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office": "DSO",
3 | "DARPA Long Name": "Defense Sciences Office",
4 | "DARPA Office Description": "The Discovery, Modeling, Design & Assembly office focuses on...",
5 | "DARPA Office Color": "EBAF00",
6 | "DARPA Link" : "http://www.darpa.mil/about-us/offices/dso"
7 | }
8 |
--------------------------------------------------------------------------------
/01-DARPA-I2O.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office": "I2O",
3 | "DARPA Long Name": "Information Innovation Office",
4 | "DARPA Office Description": "The Information, Innovation & Cyber office focuses on...",
5 | "DARPA Office Color": "4C9509",
6 | "DARPA Link" : "http://www.darpa.mil/about-us/offices/i2o"
7 | }
8 |
--------------------------------------------------------------------------------
/01-DARPA-TTO.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office": "TTO",
3 | "DARPA Long Name": "Tactical Technology Office",
4 | "DARPA Office Description": "TTO will rapidly develop new prototype military capabilities that create an asymmetric technological advantage and provide U.S. forces with decisive superiority and the ability to overwhelm our opponents.",
5 | "DARPA Office Color": "55399A",
6 | "DARPA Link" : "http://www.darpa.mil/about-us/offices/tto"
7 | }
8 |
--------------------------------------------------------------------------------
/AA-image.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/AA-image.png
--------------------------------------------------------------------------------
/AA-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"AA",
4 | "Long Name":"Active Authentication (AA)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/active-authentication",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The Active Authentication (AA) program seeks to develop novel ways of validating the identity of computer users by focusing on the unique aspects of individuals through software-based biometrics. Biometrics are defined as the characteristics used to recognize individuals based on one or more intrinsic physical or behavioral traits. This program is focused on behavioral biometrics.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-angelos-keromytis",
26 | "Program Manager":"Dr. Angelos Keromytis",
27 | "Program Manager Email":"angelos.keromytis@darpa.mil",
28 | "Image":"AA-image.png"
29 | }
--------------------------------------------------------------------------------
/AA-software.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program":"AA",
4 | "Program Teams":[
5 | "Allure Security Technology, Inc."
6 | ],
7 | "Contributors":[
8 | ""
9 | ],
10 | "Sub-contractors":[
11 | ""
12 | ],
13 | "Software":"RUU Active Authentication Sensor for Windows",
14 | "Internal Link":"",
15 | "External Link":"",
16 | "Public Code Repo":"anna.weeks@us.af.mil",
17 | "Instructional Material":"",
18 | "Description":"Software for collecting user OS interactions, generating a discriminative user model, and taking appropriate masquerader mitigation measures for the Windows platform.",
19 | "License":[
20 | "GPR"
21 | ],
22 | "Languages":[
23 | ""
24 | ],
25 | "Platform Requirements":[
26 | ""
27 | ],
28 | "Dependent modules":[
29 | ""
30 | ],
31 | "Dependent module URLs":[
32 | ""
33 | ],
34 | "Component modules":[
35 | ""
36 | ],
37 | "Component module URLs":[
38 | ""
39 | ],
40 | "Industry":[
41 | ""
42 | ],
43 | "Functionality":[
44 | ""
45 | ],
46 | "Categories":[
47 | "Identity Management"
48 | ],
49 | "New Date":"",
50 | "Update Date":""
51 | },
52 | {
53 | "DARPA Program":"AA",
54 | "Program Teams":[
55 | "Allure Security Technology, Inc."
56 | ],
57 | "Contributors":[
58 | ""
59 | ],
60 | "Sub-contractors":[
61 | ""
62 | ],
63 | "Software":"Decoy Document Distributor Tool for Windows",
64 | "Internal Link":"",
65 | "External Link":"",
66 | "Public Code Repo":"anna.weeks@us.af.mil",
67 | "Instructional Material":"",
68 | "Description":"Software for distributing deceptive content to Windows computers to serve as tripwires to aid in sensor authentication decisions.",
69 | "License":[
70 | "GPR"
71 | ],
72 | "Languages":[
73 | ""
74 | ],
75 | "Platform Requirements":[
76 | ""
77 | ],
78 | "Dependent modules":[
79 | ""
80 | ],
81 | "Dependent module URLs":[
82 | ""
83 | ],
84 | "Component modules":[
85 | ""
86 | ],
87 | "Component module URLs":[
88 | ""
89 | ],
90 | "Industry":[
91 | ""
92 | ],
93 | "Functionality":[
94 | ""
95 | ],
96 | "Categories":[
97 | "Identity Management"
98 | ],
99 | "New Date":"",
100 | "Update Date":""
101 | },
102 | {
103 | "DARPA Program":"AA",
104 | "Program Teams":[
105 | "Allure Security Technology, Inc."
106 | ],
107 | "Contributors":[
108 | ""
109 | ],
110 | "Sub-contractors":[
111 | ""
112 | ],
113 | "Software":"RUU Active Authentication Sensor for Mac",
114 | "Internal Link":"",
115 | "External Link":"",
116 | "Public Code Repo":"anna.weeks@us.af.mil",
117 | "Instructional Material":"",
118 | "Description":"Software for collecting user OS interactions, generating a discriminative user model, and taking appropriate masquerader mitigation measures for Mac devices.",
119 | "License":[
120 | "GPR"
121 | ],
122 | "Languages":[
123 | ""
124 | ],
125 | "Platform Requirements":[
126 | ""
127 | ],
128 | "Dependent modules":[
129 | ""
130 | ],
131 | "Dependent module URLs":[
132 | ""
133 | ],
134 | "Component modules":[
135 | ""
136 | ],
137 | "Component module URLs":[
138 | ""
139 | ],
140 | "Industry":[
141 | ""
142 | ],
143 | "Functionality":[
144 | ""
145 | ],
146 | "Categories":[
147 | "Identity Management"
148 | ],
149 | "New Date":"",
150 | "Update Date":""
151 | },
152 | {
153 | "DARPA Program":"AA",
154 | "Program Teams":[
155 | "Allure Security Technology, Inc."
156 | ],
157 | "Contributors":[
158 | ""
159 | ],
160 | "Sub-contractors":[
161 | ""
162 | ],
163 | "Software":"Decoy Document Distributor Tool for Mac",
164 | "Internal Link":"",
165 | "External Link":"",
166 | "Public Code Repo":"anna.weeks@us.af.mil",
167 | "Instructional Material":"",
168 | "Description":"Software for distributing deceptive content to Mac machines to serve as tripwires to aid in sensor authentication decisions.",
169 | "License":[
170 | "GPR"
171 | ],
172 | "Languages":[
173 | ""
174 | ],
175 | "Platform Requirements":[
176 | ""
177 | ],
178 | "Dependent modules":[
179 | ""
180 | ],
181 | "Dependent module URLs":[
182 | ""
183 | ],
184 | "Component modules":[
185 | ""
186 | ],
187 | "Component module URLs":[
188 | ""
189 | ],
190 | "Industry":[
191 | ""
192 | ],
193 | "Functionality":[
194 | ""
195 | ],
196 | "Categories":[
197 | "Identity Management"
198 | ],
199 | "New Date":"",
200 | "Update Date":""
201 | },
202 | {
203 | "DARPA Program":"AA",
204 | "Program Teams":[
205 | "BehavioSec"
206 | ],
207 | "Contributors":[
208 | ""
209 | ],
210 | "Sub-contractors":[
211 | ""
212 | ],
213 | "Software":"Data-Collector-Software",
214 | "Internal Link":"",
215 | "External Link":"",
216 | "Public Code Repo":"anna.weeks@us.af.mil",
217 | "Instructional Material":"",
218 | "Description":"Behavioral data gatherer for Microsoft Windows desktop computers.",
219 | "License":[
220 | "GPR"
221 | ],
222 | "Languages":[
223 | ""
224 | ],
225 | "Platform Requirements":[
226 | ""
227 | ],
228 | "Dependent modules":[
229 | ""
230 | ],
231 | "Dependent module URLs":[
232 | ""
233 | ],
234 | "Component modules":[
235 | ""
236 | ],
237 | "Component module URLs":[
238 | ""
239 | ],
240 | "Industry":[
241 | ""
242 | ],
243 | "Functionality":[
244 | ""
245 | ],
246 | "Categories":[
247 | "Identity Management"
248 | ],
249 | "New Date":"",
250 | "Update Date":""
251 | },
252 | {
253 | "DARPA Program":"AA",
254 | "Program Teams":[
255 | "New York Institute of Technology"
256 | ],
257 | "Contributors":[
258 | ""
259 | ],
260 | "Sub-contractors":[
261 | ""
262 | ],
263 | "Software":"Keystroke, Pausality, and Linguistic Feature Extractors for Typing Data",
264 | "Internal Link":"",
265 | "External Link":"",
266 | "Public Code Repo":"anna.weeks@us.af.mil",
267 | "Instructional Material":"",
268 | "Description":"The software implements feature extractor modules for typing data used in AA Phase 1 effort. The code is useful only when Louisiana Tech's typing data is available. Because Louisiana Tech has the ownership of the data, we cannot provide the data.",
269 | "License":[
270 | "GPR"
271 | ],
272 | "Languages":[
273 | ""
274 | ],
275 | "Platform Requirements":[
276 | ""
277 | ],
278 | "Dependent modules":[
279 | ""
280 | ],
281 | "Dependent module URLs":[
282 | ""
283 | ],
284 | "Component modules":[
285 | ""
286 | ],
287 | "Component module URLs":[
288 | ""
289 | ],
290 | "Industry":[
291 | ""
292 | ],
293 | "Functionality":[
294 | ""
295 | ],
296 | "Categories":[
297 | "Identity Management"
298 | ],
299 | "New Date":"",
300 | "Update Date":""
301 | },
302 | {
303 | "DARPA Program":"AA",
304 | "Program Teams":[
305 | "University of Maryland"
306 | ],
307 | "Contributors":[
308 | ""
309 | ],
310 | "Sub-contractors":[
311 | ""
312 | ],
313 | "Software":"Screen Web Interface Visual Analysis Software",
314 | "Internal Link":"",
315 | "External Link":"http://www.vizweb.org/",
316 | "Public Code Repo":"https://bitbucket.org/rmardiko/vizweb.git",
317 | "Instructional Material":"",
318 | "Description":"This is software for computing visual features from screen shots. (Java)",
319 | "License":[
320 | "MIT"
321 | ],
322 | "Languages":[
323 | "Java"
324 | ],
325 | "Platform Requirements":[
326 | ""
327 | ],
328 | "Dependent modules":[
329 | ""
330 | ],
331 | "Dependent module URLs":[
332 | ""
333 | ],
334 | "Component modules":[
335 | ""
336 | ],
337 | "Component module URLs":[
338 | ""
339 | ],
340 | "Industry":[
341 | ""
342 | ],
343 | "Functionality":[
344 | ""
345 | ],
346 | "Categories":[
347 | "Identity Management"
348 | ],
349 | "New Date":"",
350 | "Update Date":""
351 | }
352 | ]
--------------------------------------------------------------------------------
/ADAMS-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"ADAMS",
4 | "Long Name":"Anomaly Detection at Multiple Scales (ADAMS)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/anomaly-detection-at-multiple-scales",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The Anomaly Detection at Multiple Scales (ADAMS) program seeks to create, adapt and apply technology to anomaly characterization and detection in massive data sets. Anomalies in data cue the collection of additional, actionable information in a wide variety of real world contexts.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-angelos-keromytis",
26 | "Program Manager":"Dr. Angelos Keromytis",
27 | "Program Manager Email":"angelos.keromytis@darpa.mil",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/APAC-image.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/APAC-image.jpg
--------------------------------------------------------------------------------
/APAC-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"APAC",
4 | "Long Name":"Automated Program Analysis for Cybersecurity (APAC)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/automated-program-analysis-for-cybersecurity",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The Automated Program Analysis for Cybersecurity (APAC) program aims to address the challenge of timely and robust security validation of mobile apps by first defining security properties to be measured against and then developing automated tools to perform the measuring. APAC draws heavily from the field of formal-methods program analysis (theorem proving, logic and machine proofing) to keep malicious code out of DoD Android-based application marketplaces. APAC seeks to apply recent research breakthroughs in this field in an attempt to scale DoD's program analysis capability to a level never before achieved with an automated solution.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/mr-timothy-fraser",
26 | "Program Manager":"Mr. Timothy Fraser",
27 | "Program Manager Email":"timothy.fraser@darpa.mil",
28 | "Image":"APAC-image.jpg"
29 | }
--------------------------------------------------------------------------------
/APAC-pubs.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program":"APAC",
4 | "Program Teams":[
5 | "University of Washington"
6 | ],
7 | "Title":"JavaUI: Effects for Controlling UI Object Access",
8 | "Authors":[
9 | "Colin S. Gordon",
10 | "Werner Dietl",
11 | "Michael D. Ernst",
12 | "Dan Grossman"
13 | ],
14 | "Link":"http://homes.cs.washington.edu/~mernst/pubs/gui-thread-ecoop2013.pdf",
15 | "Categories":[
16 | ""
17 | ],
18 | "Subcategories":[
19 | ""
20 | ],
21 | "ACM 1998 classification code":[
22 | ""
23 | ],
24 | "New Date":"",
25 | "Update Date":""
26 | },
27 | {
28 | "DARPA Program":"APAC",
29 | "Program Teams":[
30 | "University of Washington"
31 | ],
32 | "Title":"Rely-Guarantee References for Refinement Types Over Aliased Mutable Data",
33 | "Authors":[
34 | "Colin S. Gordon",
35 | "Michael D. Ernst",
36 | "Dan Grossman"
37 | ],
38 | "Link":"http://homes.cs.washington.edu/~mernst/pubs/rely-guarantee-ref-pldi2013.pdf",
39 | "Categories":[
40 | ""
41 | ],
42 | "Subcategories":[
43 | ""
44 | ],
45 | "ACM 1998 classification code":[
46 | ""
47 | ],
48 | "New Date":"",
49 | "Update Date":""
50 | },
51 | {
52 | "DARPA Program":"APAC",
53 | "Program Teams":[
54 | "University of Washington"
55 | ],
56 | "Title":"ReIm & ReImInfer: Checking and Inference of Reference Immutability and Method Purity",
57 | "Authors":[
58 | "Wei Huang",
59 | "Ana Milanova",
60 | "Werner Dietl",
61 | "Michael D. Ernst"
62 | ],
63 | "Link":"http://homes.cs.washington.edu/~mernst/pubs/infer-refimmutability-oopsla2012.pdf",
64 | "Categories":[
65 | ""
66 | ],
67 | "Subcategories":[
68 | ""
69 | ],
70 | "ACM 1998 classification code":[
71 | ""
72 | ],
73 | "New Date":"",
74 | "Update Date":""
75 | },
76 | {
77 | "DARPA Program":"APAC",
78 | "Program Teams":[
79 | "BAE Systems"
80 | ],
81 | "Title":"Automated Execution Control and Dynamic Behavior Monitoring for Android Applications",
82 | "Authors":[
83 | "Mike Ter Louw",
84 | "Marc Krull",
85 | "Tavaris Thomas",
86 | "Rebecca Cathey",
87 | "Greg Frazier",
88 | "Mike Weber"
89 | ],
90 | "Link":"http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6735749&url=http%3A%2F%2Fieeexplore.ieee.org%2Fstamp%2Fstamp.jsp%3Ftp%3D%26arnumber%3D6735749",
91 | "Categories":[
92 | ""
93 | ],
94 | "Subcategories":[
95 | ""
96 | ],
97 | "ACM 1998 classification code":[
98 | ""
99 | ],
100 | "New Date":"",
101 | "Update Date":""
102 | },
103 | {
104 | "DARPA Program":"APAC",
105 | "Program Teams":[
106 | "BAE Systems"
107 | ],
108 | "Title":"Behavior Analysis via Execution Path Clusters",
109 | "Authors":[
110 | "Rebecca Cathey",
111 | "Gregory Frazier",
112 | "Michael Weber "
113 | ],
114 | "Link":"http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6735750&url=http%3A%2F%2Fieeexplore.ieee.org%2Fstamp%2Fstamp.jsp%3Farnumber%3D6735750",
115 | "Categories":[
116 | ""
117 | ],
118 | "Subcategories":[
119 | ""
120 | ],
121 | "ACM 1998 classification code":[
122 | ""
123 | ],
124 | "New Date":"",
125 | "Update Date":""
126 | },
127 | {
128 | "DARPA Program":"APAC",
129 | "Program Teams":[
130 | "MIT",
131 | "Kestrel Institute",
132 | "GITI"
133 | ],
134 | "Title":"Contextual Policy Enforcement in Android Applications with Permission Event Graphs",
135 | "Authors":[
136 | "Kevin Zhijie Chen",
137 | "Noah M. Johnson",
138 | "Vijay D'Silva",
139 | "Shuaifu Dai",
140 | "Kyle MacNamara",
141 | "Tom Magrino",
142 | "Edward XueJun Wu",
143 | "Martin Rinard",
144 | "Dawn Xiaodong Song"
145 | ],
146 | "Link":"http://www.internetsociety.org/sites/default/files/06_4_0.pdf",
147 | "Categories":[
148 | ""
149 | ],
150 | "Subcategories":[
151 | ""
152 | ],
153 | "ACM 1998 classification code":[
154 | ""
155 | ],
156 | "New Date":"",
157 | "Update Date":""
158 | }
159 | ]
--------------------------------------------------------------------------------
/APAC-software.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program":"APAC",
4 | "Program Teams":[
5 | "MIT",
6 | "Kestrel Institute",
7 | "GITI"
8 | ],
9 | "Contributors":[
10 | ""
11 | ],
12 | "Sub-contractors":[
13 | ""
14 | ],
15 | "Software":"DroidSafe",
16 | "Internal Link":"",
17 | "External Link":"",
18 | "Public Code Repo":"https://github.com/mgordon/droidsafe.git",
19 | "Instructional Material":"",
20 | "Description":"The DroidSafe static analysis tool produces a security summary of Android applications to help trusted parties rapidly understand sensitive behaviors of a untrusted application. The core analysis is flow, object, event, and value sensitive. The results are presented in a graphic user interface tied to source code for inspection. (Java/Python)",
21 | "License":[
22 | "LGPL"
23 | ],
24 | "Languages":[
25 | "Java",
26 | "Python"
27 | ],
28 | "Platform Requirements":[
29 | ""
30 | ],
31 | "Dependent modules":[
32 | ""
33 | ],
34 | "Dependent module URLs":[
35 | ""
36 | ],
37 | "Component modules":[
38 | ""
39 | ],
40 | "Component module URLs":[
41 | ""
42 | ],
43 | "Industry":[
44 | ""
45 | ],
46 | "Functionality":[
47 | ""
48 | ],
49 | "Categories":[
50 | "Infrastructure"
51 | ],
52 | "New Date":"",
53 | "Update Date":""
54 | },
55 | {
56 | "DARPA Program":"APAC",
57 | "Program Teams":[
58 | "BAE Systems"
59 | ],
60 | "Contributors":[
61 | ""
62 | ],
63 | "Sub-contractors":[
64 | ""
65 | ],
66 | "Software":"Droid Reasoning, Analysis, and Protection Engine (DRAPE)",
67 | "Internal Link":"",
68 | "External Link":"",
69 | "Public Code Repo":"Not Ready for Release",
70 | "Instructional Material":"",
71 | "Description":"DRAPE brings together concolic execution, taint analysis and execution path clustering to analyze Android applications. DRAPE will elicit stealthy malware that is triggered under specific conditions, and will provide the analyst with a characterization of those conditions. (Java)",
72 | "Internal Code Repo":"",
73 | "License":[
74 | ""
75 | ],
76 | "Languages":[
77 | "Java"
78 | ],
79 | "Platform Requirements":[
80 | ""
81 | ],
82 | "Dependent modules":[
83 | ""
84 | ],
85 | "Dependent module URLs":[
86 | ""
87 | ],
88 | "Component modules":[
89 | ""
90 | ],
91 | "Component module URLs":[
92 | ""
93 | ],
94 | "Industry":[
95 | ""
96 | ],
97 | "Functionality":[
98 | ""
99 | ],
100 | "Categories":[
101 | "Software",
102 | "Dynamic Analysis",
103 | "Android",
104 | "Malware"
105 | ],
106 | "New Date":"",
107 | "Update Date":""
108 | },
109 | {
110 | "DARPA Program":"APAC",
111 | "Program Teams":[
112 | "University of Washington"
113 | ],
114 | "Contributors":[
115 | ""
116 | ],
117 | "Sub-contractors":[
118 | ""
119 | ],
120 | "Software":"Checker Framework",
121 | "Internal Link":"",
122 | "External Link":"http://types.cs.washington.edu/checker-framework",
123 | "Public Code Repo":"https://code.google.com/p/checker-framework/",
124 | "Instructional Material":"",
125 | "Description":"The Checker Framework enhances Java's type system to make it more powerful and useful. This lets software developers detect and prevent errors in their Java programs. (Java)",
126 | "Internal Code Repo":"",
127 | "License":[
128 | "GPLv2"
129 | ],
130 | "Languages":[
131 | "Java"
132 | ],
133 | "Platform Requirements":[
134 | ""
135 | ],
136 | "Dependent modules":[
137 | ""
138 | ],
139 | "Dependent module URLs":[
140 | ""
141 | ],
142 | "Component modules":[
143 | ""
144 | ],
145 | "Component module URLs":[
146 | ""
147 | ],
148 | "Industry":[
149 | ""
150 | ],
151 | "Functionality":[
152 | ""
153 | ],
154 | "Categories":[
155 | "Static analysis"
156 | ],
157 | "New Date":"",
158 | "Update Date":""
159 | },
160 | {
161 | "DARPA Program":"APAC",
162 | "Program Teams":[
163 | "University of Washington"
164 | ],
165 | "Contributors":[
166 | ""
167 | ],
168 | "Sub-contractors":[
169 | ""
170 | ],
171 | "Software":"Type annotations compiler",
172 | "Internal Link":"",
173 | "External Link":"http://types.cs.washington.edu/jsr308",
174 | "Public Code Repo":"https://code.google.com/p/jsr308-langtools/",
175 | "Instructional Material":"",
176 | "Description":"Java 8 will include support for type annotations. The Type Annotations compiler (also called the JSR 308 compiler) is fully backward-compatible. You can use it in place of javac (for Java 8) without any change in behavior, except that you will be permitted to write annotations in comments. This lets you write type annotations, but keep your code compilable by Java 4/5/6/7 compilers. (Java)",
177 | "Internal Code Repo":"",
178 | "License":[
179 | "GPLv2"
180 | ],
181 | "Languages":[
182 | "Java"
183 | ],
184 | "Platform Requirements":[
185 | ""
186 | ],
187 | "Dependent modules":[
188 | ""
189 | ],
190 | "Dependent module URLs":[
191 | ""
192 | ],
193 | "Component modules":[
194 | ""
195 | ],
196 | "Component module URLs":[
197 | ""
198 | ],
199 | "Industry":[
200 | ""
201 | ],
202 | "Functionality":[
203 | ""
204 | ],
205 | "Categories":[
206 | "Static analysis",
207 | "Compilers"
208 | ],
209 | "New Date":"",
210 | "Update Date":""
211 | },
212 | {
213 | "DARPA Program":"APAC",
214 | "Program Teams":[
215 | "University of Washington"
216 | ],
217 | "Contributors":[
218 | ""
219 | ],
220 | "Sub-contractors":[
221 | ""
222 | ],
223 | "Software":"Annotation File Utilities",
224 | "Internal Link":"",
225 | "External Link":"http://types.cs.washington.edu/annotation-file-utilities/",
226 | "Public Code Repo":"https://code.google.com/p/annotation-tools/",
227 | "Instructional Material":"",
228 | "Description":"Tools for reading annotations from, and inserting type annotations in, Java source and class files. (Java)",
229 | "Internal Code Repo":"",
230 | "License":[
231 | "MIT"
232 | ],
233 | "Languages":[
234 | "Java"
235 | ],
236 | "Platform Requirements":[
237 | ""
238 | ],
239 | "Dependent modules":[
240 | ""
241 | ],
242 | "Dependent module URLs":[
243 | ""
244 | ],
245 | "Component modules":[
246 | ""
247 | ],
248 | "Component module URLs":[
249 | ""
250 | ],
251 | "Industry":[
252 | ""
253 | ],
254 | "Functionality":[
255 | ""
256 | ],
257 | "Categories":[
258 | "Java Annotation Tool"
259 | ],
260 | "New Date":"",
261 | "Update Date":""
262 | },
263 | {
264 | "DARPA Program":"APAC",
265 | "Program Teams":[
266 | "University of Washington"
267 | ],
268 | "Contributors":[
269 | ""
270 | ],
271 | "Sub-contractors":[
272 | ""
273 | ],
274 | "Software":"SPARTA Toolset",
275 | "Internal Link":"",
276 | "External Link":"http://types.cs.washington.edu/sparta/",
277 | "Public Code Repo":"http://types.cs.washington.edu/sparta/release/",
278 | "Instructional Material":"",
279 | "Description":"SPARTA aims to detect certain types of malware in Android applications, or to verify that the app contains no such malware. SPARTA's verification approach is type-checking: the developer states a security property, annotates the source code with type qualifiers that express that security property, then runs a pluggable type-checker to verify that the type qualifiers are right (and thus that the program satisfies the security property). (Java)",
280 | "Internal Code Repo":"",
281 | "License":[
282 | "GPLv2"
283 | ],
284 | "Languages":[
285 | "Java"
286 | ],
287 | "Platform Requirements":[
288 | ""
289 | ],
290 | "Dependent modules":[
291 | ""
292 | ],
293 | "Dependent module URLs":[
294 | ""
295 | ],
296 | "Component modules":[
297 | ""
298 | ],
299 | "Component module URLs":[
300 | ""
301 | ],
302 | "Industry":[
303 | ""
304 | ],
305 | "Functionality":[
306 | ""
307 | ],
308 | "Categories":[
309 | "Static analysis",
310 | "Android",
311 | "Security"
312 | ],
313 | "New Date":"",
314 | "Update Date":""
315 | }
316 | ]
--------------------------------------------------------------------------------
/AVM-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"TTO",
3 | "DARPA Program Name":"AVM",
4 | "Long Name":"Adaptive Vehicle Make (AVM)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/adaptive-vehicle-make",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The Defense Advanced Research Projects Agency's (DARPA) Adaptive Vehicle Make (AVM) portfolio of programs had a goal of compressing the development timelines for new complex cyber-physical systems by at least five-fold. With AVM, DARPA pursued the development of several elements of enabling infrastructure aimed at radically transforming the systems engineering / design / verification (META), manufacturing (iFAB), and collaborative innovation (VehicleFORGE) elements of the overall \"make\" process for modern defense systems. Each of these infrastructure capabilities was largely generic and applicable to any cyber-physical or cyber-electro-mechanical system. This approach was highly dependent on the generation of high-fidelity component, context and manufacturing process models. In order to exercise these capabilities in the context of a relevant military system, AVM also included FANG--the Fast, Adaptable, Next-Generation Ground Vehicle--a design and development effort for a new amphibious infantry fighting vehicle (IFV) that was implemented for the purpose of demonstrating the efficacy of AVM tools and processes. The AVM portfolio began a transition to the Digital Manufacturing and Design Innovation Institute in 2014.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-kevin-massey",
26 | "Program Manager":"Dr. Kevin Massey",
27 | "Program Manager Email":"kevin.massey@darpa.mil",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/AVM-software.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program": "AVM",
4 | "Program Teams": [
5 | "Pennsylvania State University Applied Research Laboratory"
6 | ],
7 | "Contributors": [
8 | "MLI"
9 | ],
10 | "Sub-contractors": [
11 | ""
12 | ],
13 | "Software": "iFAB Mfg Tools",
14 | "Internal Link": "",
15 | "External Link": "http://dmdii.uilabs.org/the-institute/resources/avm-materials/",
16 | "Public Code Repo": "http://cps-vo.org/node/5834/browser",
17 | "Instructional Material": "",
18 | "Stats": "",
19 | "Description": "iFAB Foundry is a collection of open-source software tools developed by the Pennsylvania State University's Applied Research Laboratory. These tools include:
Analysis Server - The manufacturability analysis engine for rapidly assessing whether a given design is manufacturable and estimating a cost and lead time.
Web Portal - Website for managing and viewing the status of jobs submitted to the analysis server. Also contains the API for receiving and processing submissions from MAAT.
Hull Design Assist Tool (HuDAT) - A CREO plugin for building the armor and internal structure for a ground vehicle.
Manufacturing Analysis Augmentation Tool (MAAT) - A CREO plugin or standalone Java executable for augmenting a CAD model with manufacturing information, such as material, coatings, and tolerances.
NC Code Generation - A MasterCAM plugin for automatically generating NC code for a given CAD model.",
20 | "Internal Code Repo": "",
21 | "License": [
22 | "Open Source"
23 | ],
24 | "Languages": [
25 | "Java"
26 | ],
27 | "Platform Requirements": [
28 | "See ReadMe or Installation Notes for specific software"
29 | ],
30 | "Dependent modules": [
31 | ""
32 | ],
33 | "Dependent module URLs": [
34 | ""
35 | ],
36 | "Component modules": [
37 | ""
38 | ],
39 | "Component module URLs": [
40 | ""
41 | ],
42 | "Industry": [
43 | ""
44 | ],
45 | "Functionality": [
46 | ""
47 | ],
48 | "Categories": [
49 | ""
50 | ],
51 | "New Date": "20150604",
52 | "Update Date": ""
53 | },
54 | {
55 | "DARPA Program": "AVM",
56 | "Program Teams": [
57 | "Vanderbilt University"
58 | ],
59 | "Contributors": [
60 | "CyDesign",
61 | "Dassault",
62 | "Palo Alto Research Center"
63 | ],
64 | "Sub-contractors": [
65 | ""
66 | ],
67 | "Software": "META/CyPhy Tools",
68 | "Internal Link": "",
69 | "External Link": "http://dmdii.uilabs.org/the-institute/resources/avm-materials/",
70 | "Public Code Repo": "http://cps-vo.org/node/5834/browser",
71 | "Instructional Material": "",
72 | "Stats": "",
73 | "Description": "Model-based System Design, Analysis, and Verification Technologies: The CyPhy tool suite (developed under the META program) made numerous advances in model-based system design with a focus on compressing the development lifecycle for complex defense systems. At the core of the tool suite is a generic modeling environment (GME) that can represent, transform, and integrate the numerous types of models and analysis used in the design and development of complex defense systems. This modeling environment enables the CyPhy tool suite to accomplish compositional design, trade space analysis and virtual performance testing in an extendable framework that can integrate tools ranging from robust commercial and open-source numerical simulations to cutting-edge research prototypes. CyPhy has been under evaluation since January 2013 through multiple design exercises. During these design events, teams worked to design drivetrain, suspension, propulsion, chassis, and structural elements and associated subsystems for an amphibious IFV. DARPA has built a Mobility and Chassis Automotive Test Rig (ATR), designed with the tools) in the iFAB Foundry to complete the 'end-to-end' design/develop/build/test process flow. Insights gleaned from this effort are being used to inform further CyPhy development efforts to integrate new design methodologies, consider more difficult physics domains, and validate virtual design, modeling, and simulation tools.",
74 | "Internal Code Repo": "",
75 | "License": [
76 | "Open Source"
77 | ],
78 | "Languages": [
79 | "C/C++",
80 | "C#",
81 | "Python"
82 | ],
83 | "Platform Requirements": [
84 | "See ReadMe or Installation Notes for specific software"
85 | ],
86 | "Dependent modules": [
87 | ""
88 | ],
89 | "Dependent module URLs": [
90 | ""
91 | ],
92 | "Component modules": [
93 | ""
94 | ],
95 | "Component module URLs": [
96 | ""
97 | ],
98 | "Industry": [
99 | ""
100 | ],
101 | "Functionality": [
102 | ""
103 | ],
104 | "Categories": [
105 | ""
106 | ],
107 | "New Date": "20150604",
108 | "Update Date": ""
109 | },
110 | {
111 | "DARPA Program": "AVM",
112 | "Program Teams": [
113 | "Ricardo"
114 | ],
115 | "Contributors": [
116 | "SouthWest Research Institute",
117 | "Palo Alto Research Center"
118 | ],
119 | "Sub-contractors": [
120 | ""
121 | ],
122 | "Software": "Model Libraries",
123 | "Internal Link": "",
124 | "External Link": "http://dmdii.uilabs.org/the-institute/resources/avm-materials/",
125 | "Public Code Repo": "http://cps-vo.org/node/5834/browser",
126 | "Instructional Material": "",
127 | "Stats": "",
128 | "Description": "AVM Component Models are the fundamental building blocks for systems designed using the AVM tools suite. AVM Component Set 2.5 contains 1,018 models based on Component Specification version 2.5. The components represent a variety of a physical components, or parts, used in large vehicles, such as the infantry fighting vehicles that were the subject of the AVM program.",
129 | "Internal Code Repo": "",
130 | "License": [
131 | "Open Source"
132 | ],
133 | "Languages": [
134 | "C/C++",
135 | "Fortran",
136 | "Python"
137 | ],
138 | "Platform Requirements": [
139 | "See ReadMe or Installation Notes for specific software"
140 | ],
141 | "Dependent modules": [
142 | ""
143 | ],
144 | "Dependent module URLs": [
145 | ""
146 | ],
147 | "Component modules": [
148 | ""
149 | ],
150 | "Component module URLs": [
151 | ""
152 | ],
153 | "Industry": [
154 | ""
155 | ],
156 | "Functionality": [
157 | ""
158 | ],
159 | "Categories": [
160 | ""
161 | ],
162 | "New Date": "20150604",
163 | "Update Date": ""
164 | },
165 | {
166 | "DARPA Program": "AVM",
167 | "Program Teams": [
168 | "Vanderbilt University"
169 | ],
170 | "Contributors": [
171 | "Electrotank",
172 | "GE Global Research",
173 | "Georgia Tech Research Institute",
174 | "University of Pennsylvania"
175 | ],
176 | "Sub-contractors": [
177 | ""
178 | ],
179 | "Software": "VehicleFORGE Tools",
180 | "Internal Link": "",
181 | "External Link": "http://dmdii.uilabs.org/the-institute/resources/avm-materials/",
182 | "Public Code Repo": "http://cps-vo.org/node/5834/browser",
183 | "Instructional Material": "",
184 | "Stats": "",
185 | "Description": "VehicleFORGE is a collaboration platform that supports cyber-physical system design projects in communities that collectively create and share design components. It adapts and extends the software forge concept as a means of bundling and provisioning tools that support distributed synchronous and asynchronous collaborative work via the web.",
186 | "Internal Code Repo": "",
187 | "License": [
188 | "Open Source"
189 | ],
190 | "Languages": [
191 | "Javascript",
192 | "Python"
193 | ],
194 | "Platform Requirements": [
195 | "See ReadMe or Installation Notes for specific software"
196 | ],
197 | "Dependent modules": [
198 | ""
199 | ],
200 | "Dependent module URLs": [
201 | ""
202 | ],
203 | "Component modules": [
204 | ""
205 | ],
206 | "Component module URLs": [
207 | ""
208 | ],
209 | "Industry": [
210 | ""
211 | ],
212 | "Functionality": [
213 | ""
214 | ],
215 | "Categories": [
216 | ""
217 | ],
218 | "New Date": "20150604",
219 | "Update Date": ""
220 | }
221 | ]
--------------------------------------------------------------------------------
/BET-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"BET",
4 | "Long Name":"Binary Executable Transforms (BET)",
5 | "Program Teams":"",
6 | "Link":"",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The objective of the Binary Executable Transforms (BET) program is to produce revolutionary technologies for analyzing executable binaries to identify and extract executable components. Executable components are defined as a fully encapsulated set of subroutines, data structures, objects and global variables that accomplish a particular function, along with metadata documenting the component's arguments and any system libraries used. Specifically, BET performers are conducting innovative research in: • Automatically analyzing binaries and identifying functional components. • Automatically slicing and extracting identified functionality into reusable components with well-defined inputs and outputs. • Combining static and dynamic binary analysis to improve understanding of binary executables. • Exploring formal verification methods to prove functional component properties. • Developing intermediate representation language to support program slicing. • Developing technologies to enable exploration and research for the BET program.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-john-everett",
26 | "Program Manager":"Dr. John Everett",
27 | "Program Manager Email":"john.everett@darpa.mil",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/BOLT-image.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/BOLT-image.png
--------------------------------------------------------------------------------
/BOLT-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"BOLT",
4 | "Long Name":"Broad Operational Language Translation (BOLT)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/broad-operational-language-translation",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The Broad Operational Language Translation (BOLT) program is aimed at enabling communication with non-English-speaking populations and identifying important information in foreign-language sources by: 1) allowing English-speakers to understand foreign-language sources of all genres, including chat, messaging and informal conversation; 2) providing English-speakers the ability to quickly identify targeted information in foreign-language sources using natural-language queries; and 3) enabling multi-turn communication in text and speech with non-English speakers. If successful, BOLT would deliver all capabilities free from domain or genre limitations.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-boyan-onyshkevych",
26 | "Program Manager":"Dr. Boyan Onyshkevych",
27 | "Program Manager Email":"boyan.onyshkevych@darpa.mil",
28 | "Image":"BOLT-image.png"
29 | }
--------------------------------------------------------------------------------
/Biochronicity-image.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/Biochronicity-image.jpg
--------------------------------------------------------------------------------
/Biochronicity-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"BTO",
3 | "DARPA Program Name":"Biochronicity",
4 | "Long Name":"Biochronicity",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/biochronicity",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"Time is important to multiple biological processes, including circadian-regulated gene expression related to metabolic, cell cycle, and immune system functions. The overarching goals of BioChronicity are the integration of math, physics, and biology to: (1) understand time-dependent gene expression, (2) generate predictive models of complex biological systems, and (3) regulate molecular clocks to modulate clinical outcomes.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-jim-gimlett",
26 | "Program Manager":"Dr. Jim Gimlett",
27 | "Program Manager Email":"james.gimlett@darpa.mil",
28 | "Image":"Biochronicity-image.jpg"
29 | }
--------------------------------------------------------------------------------
/Biochronicity-pubs.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program": "Biochronicity",
4 | "Program Teams": [
5 | "University of Chicago",
6 | "Northwestern University"
7 | ],
8 | "Title": "Improved Statistical Methods Enable Greater Sensitivity in Rhythm Detection for Genome-Wide Data",
9 | "Authors": [
10 | "Alan L. Hutchison",
11 | "Mark Maienschein-Cline",
12 | "Andrew H. Chiang",
13 | "S. M. Ali Tabei",
14 | "Herman Gudjonson",
15 | "Neil Bahroos",
16 | "Ravi Allada",
17 | "Aaron R. Dinner"
18 | ],
19 | "Link": "http://www.ploscompbiol.org/article/fetchObject.action?uri=info:doi/10.1371/journal.pcbi.1004094&representation=PDF",
20 | "Categories": [
21 | "Probability and Statistics"
22 | ],
23 | "Subcategories": [
24 | ""
25 | ],
26 | "ACM 1998 classification code": [
27 | "J.2",
28 | "J.3"
29 | ],
30 | "New Date": "20150406",
31 | "Update Date": ""
32 | },
33 | {
34 | "DARPA Program": "Biochronicity",
35 | "Program Teams": [
36 | "NorthWestern subcontractor from University of Michigan"
37 | ],
38 | "Title": "Functional Organization of the Human 4D Nucleome",
39 | "Authors": [
40 | "Haiming Chen",
41 | "Jie Chen",
42 | "Lindsey A. Muir",
43 | "Scott Ronquist",
44 | "Walter Meixner",
45 | "Mats Ljungman",
46 | "Thomas Ried",
47 | "Stephen Smale",
48 | "Indika Rajapakse"
49 | ],
50 | "Link": "http://www.pnas.org/content/112/26/8002.full",
51 | "Categories": [
52 | "Software Architectures",
53 | "Methodology and Techniques"
54 | ],
55 | "Subcategories": [
56 | "Data abstraction",
57 | "Graphics data structures and data types",
58 | "Ergonomics"
59 | ],
60 | "ACM 1998 classification code": [
61 | "D.2.11",
62 | "I.3.6"
63 | ],
64 | "New Date": "20151001",
65 | "Update Date": ""
66 | },
67 | {
68 | "DARPA Program": "Biochronicity",
69 | "Program Teams": [
70 | "Duke University"
71 | ],
72 | "Title": "On the Efficacy of State Space Reconstruction Methods in Determining Causality",
73 | "Authors": [
74 | "Bree Cummins",
75 | "Tomas Gedeon",
76 | "Kelly Spendlove"
77 | ],
78 | "Link": "http://epubs.siam.org/doi/abs/10.1137/130946344",
79 | "Categories": [
80 | "Learning"
81 | ],
82 | "Subcategories": [
83 | "Time series analysis"
84 | ],
85 | "ACM 1998 classification code": [
86 | ""
87 | ],
88 | "New Date": "20150429",
89 | "Update Date": ""
90 | },
91 | {
92 | "DARPA Program": "Biochronicity",
93 | "Program Teams": [
94 | "Duke University"
95 | ],
96 | "Title": "Predicting High-Codimension Critical Transitions in Dynamical Systems Using Active Learning",
97 | "Authors": [
98 | "Kelly Spendlove",
99 | "Jesse Berwald",
100 | "Tomas Gedeon"
101 | ],
102 | "Link": "http://www.math.montana.edu/~gedeon/clanky/ativelearningCriticalTran.pdf",
103 | "Categories": [
104 | "Learning"
105 | ],
106 | "Subcategories": [
107 | "Prediction of crictical transitions"
108 | ],
109 | "ACM 1998 classification code": [
110 | ""
111 | ],
112 | "New Date": "20150429",
113 | "Update Date": ""
114 | }
115 | ]
--------------------------------------------------------------------------------
/CFT-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"CFT",
4 | "Long Name":"Cyber Fast Track (CFT)",
5 | "Program Teams":"",
6 | "Link":"",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The Cyber Fast Track (CFT) program sought revolutionary advances in cyber science, devices, and systems through low-cost, quick-turnaround projects. To achieve this, CFT engaged a novel performer base many of whom were new to government contracting. From August 2011 to April 2013 the program attracted 550 proposal submissions, of which 90 percent were from performers that had never previously worked with the government, and awarded 135 contracts. ",
25 | "Program Manager Link":"",
26 | "Program Manager":"Mr. Richard Guidorizzi",
27 | "Program Manager Email":"richard.guidorizzi@darpa.mil"
28 | }
--------------------------------------------------------------------------------
/CINDER-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"",
3 | "DARPA Program Name":"CINDER",
4 | "Long Name":"Cyber Insider (CINDER)",
5 | "Program Teams":"",
6 | "Link":"",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"",
25 | "Program Manager Link":"",
26 | "Program Manager":"",
27 | "Program Manager Email":"",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/CINDER-software.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program": "CINDER",
4 | "Program Teams": [
5 | "KoreLogic, Inc."
6 | ],
7 | "Contributors": [
8 | ""
9 | ],
10 | "Sub-contractors": [
11 | ""
12 | ],
13 | "Software": "Giles",
14 | "Internal Link": "",
15 | "External Link": "https://git.korelogic.com/giles.git/",
16 | "Public Code Repo": "https://github.com/KoreLogicSecurity/giles",
17 | "Instructional Material": "",
18 | "Stats": "giles",
19 | "Description": "Giles is a compiler that takes a description of a production rule system and generates a schema for a SQL database. Databases created with these schemas are standalone production rule systems/event correlation engines in database form, allowing for ease of use and embedding within larger projects. (Python)",
20 | "Internal Code Repo": "",
21 | "License": [
22 | "GPLv3"
23 | ],
24 | "Languages": [
25 | "Python"
26 | ],
27 | "Platform Requirements": [
28 | "Python version 3.4"
29 | ],
30 | "Dependent modules": [
31 | ""
32 | ],
33 | "Dependent module URLs": [
34 | ""
35 | ],
36 | "Component modules": [
37 | ""
38 | ],
39 | "Component module URLs": [
40 | ""
41 | ],
42 | "Industry": [
43 | ""
44 | ],
45 | "Functionality": [
46 | "Production Rule Systems",
47 | "Artificial Intelligence",
48 | "Pattern Matching",
49 | "Databases",
50 | "Event Correlation"
51 | ],
52 | "Categories": [
53 | "Analytics"
54 | ],
55 | "New Date": "20150406",
56 | "Update Date": ""
57 | }
58 | ]
--------------------------------------------------------------------------------
/CRASH-image.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/CRASH-image.jpg
--------------------------------------------------------------------------------
/CRASH-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"CRASH",
4 | "Long Name":"Clean-slate design of Resilient, Adaptive, Secure Hosts (CRASH)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/clean-slate-design-of-resilient-adaptive-secure-hosts",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The Clean-Slate Design of Resilient, Adaptive, Secure Hosts (CRASH) program is focused on the design of new computer systems that are highly resistant to cyberattack, can adapt after a successful attack to continue rendering useful services, learn from previous attacks how to guard against and cope with future attacks, and can repair themselves after attacks have succeeded. This program addresses computer architectures from processors and instruction sets, includes operating systems and programming languages, and extends up to application level tools.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-stuart-wagner",
26 | "Program Manager":"Dr. Stuart Wagner",
27 | "Program Manager Email":"Stuart.Wagner@darpa.mil",
28 | "Image":"CRASH-image.jpg"
29 | }
--------------------------------------------------------------------------------
/CSFV-image.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/CSFV-image.jpg
--------------------------------------------------------------------------------
/CSFV-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"CSFV",
4 | "Long Name":"Crowd Sourced Formal Verification (CSFV)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/crowd-sourced-formal-verification",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"Crowd Sourced Formal Verification (CSFV) is a DARPA program that aims to investigate whether large numbers of non-experts can perform formal verification faster and more cost-effectively than conventional processes. The goal is to transform verification into a more accessible task by creating fun, intuitive games that reflect formal verification problems. Playing the games would effectively help software verification tools complete corresponding formal verification proofs.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-michael-hsieh",
26 | "Program Manager":"Dr. Michael Hsieh",
27 | "Program Manager Email":"michael.hsieh@darpa.mil",
28 | "Image":"CSFV-image.jpg"
29 | }
--------------------------------------------------------------------------------
/CSFV-pubs.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program":"CSFV",
4 | "Program Teams":[
5 | "University of Illinois - Chicago"
6 | ],
7 | "Title":"Witnessing Program Transformations",
8 | "Link":"Not Yet Published",
9 | "Categories":"",
10 | "Subcategories":"",
11 | "ACM 1998 classification code":"",
12 | "New Date":"",
13 | "Update Date":""
14 | },
15 | {
16 | "DARPA Program":"CSFV",
17 | "Program Teams":[
18 | "University of Illinois - Chicago"
19 | ],
20 | "Title":"A Witnessing Compiler: A Proof of Concept",
21 | "Link":"Not Yet Published",
22 | "Categories":"",
23 | "Subcategories":"",
24 | "ACM 1998 classification code":"",
25 | "New Date":"",
26 | "Update Date":""
27 | },
28 | {
29 | "DARPA Program":"CSFV",
30 | "Program Teams":[
31 | "University of Washington"
32 | ],
33 | "Title":"Verification games: Making verification fun",
34 | "Link":"http://homes.cs.washington.edu/~mernst/pubs/verigames-ftfjp2012-abstract.html",
35 | "Categories":"",
36 | "Subcategories":"",
37 | "ACM 1998 classification code":"",
38 | "New Date":"",
39 | "Update Date":""
40 | },
41 | {
42 | "DARPA Program":"CSFV",
43 | "Program Teams":[
44 | "University of Washington"
45 | ],
46 | "Title":"Inference and checking of object ownership",
47 | "Link":"http://homes.cs.washington.edu/~mernst/pubs/infer-ownership-ecoop2012-abstract.html",
48 | "Categories":"",
49 | "Subcategories":"",
50 | "ACM 1998 classification code":"",
51 | "New Date":"",
52 | "Update Date":""
53 | },
54 | {
55 | "DARPA Program":"CSFV",
56 | "Program Teams":[
57 | "University of Washington"
58 | ],
59 | "Title":"Reducing the barriers to writing verified specifications",
60 | "Link":"http://homes.cs.washington.edu/~mernst/pubs/veriweb-oopsla2012-abstract.html",
61 | "Categories":"",
62 | "Subcategories":"",
63 | "ACM 1998 classification code":"",
64 | "New Date":"",
65 | "Update Date":""
66 | },
67 | {
68 | "DARPA Program":"CSFV",
69 | "Program Teams":[
70 | "University of Washington"
71 | ],
72 | "Title":"ReIm & ReImInfer: Checking and inference of reference immutability and method purity",
73 | "Link":"http://homes.cs.washington.edu/~mernst/pubs/infer-refimmutability-oopsla2012-abstract.html",
74 | "Categories":"",
75 | "Subcategories":"",
76 | "ACM 1998 classification code":"",
77 | "New Date":"",
78 | "Update Date":""
79 | },
80 | {
81 | "DARPA Program":"CSFV",
82 | "Program Teams":[
83 | "University of Washington"
84 | ],
85 | "Title":"Rely-guarantee references for refinement types over aliased mutable data",
86 | "Link":"http://homes.cs.washington.edu/~mernst/pubs/rely-guarantee-ref-pldi2013-abstract.html",
87 | "Categories":"",
88 | "Subcategories":"",
89 | "ACM 1998 classification code":"",
90 | "New Date":"",
91 | "Update Date":""
92 | },
93 | {
94 | "DARPA Program":"CSFV",
95 | "Program Teams":[
96 | "University of Washington"
97 | ],
98 | "Title":"JavaUI: Effects for controlling UI object access",
99 | "Link":"http://homes.cs.washington.edu/~mernst/pubs/gui-thread-ecoop2013-abstract.html",
100 | "Categories":"",
101 | "Subcategories":"",
102 | "ACM 1998 classification code":"",
103 | "New Date":"",
104 | "Update Date":""
105 | }
106 | ]
--------------------------------------------------------------------------------
/CYBERGENOME-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"Cyber Defense (CyberGenome)",
4 | "Long Name":"Cyber Defense (CyberGenome)",
5 | "Program Teams":"",
6 | "Link":"",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The Cyber Defense Program is developing the core computing and networking technologies required to protect DoD's information, information infrastructure, and mission-critical information systems. This includes new cyber-forensic techniques to automate the discovery, identification, and characterization of malware variants and thereby accelerate the development of effective responses.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/mr-timothy-fraser",
26 | "Program Manager":"Mr. Timothy Fraser",
27 | "Program Manager Email":"timothy.fraser@darpa.mil",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/CYBERGENOME-pubs.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program":"CyberGenome",
4 | "Program Teams":[
5 | "Invincea Labs",
6 | "George Mason University"
7 | ],
8 | "Title":"Visualization of Shared System Call Sequence Relationships in Large Malware Corpora",
9 | "Link":"http://www.cse.ohio-state.edu/~raghu/teaching/CSE5544/Visweek2012/vizsec/33-Saxe.pdf",
10 | "Categories":[
11 | ""
12 | ],
13 | "Subcategories":[
14 | ""
15 | ],
16 | "ACM 1998 classification code":[
17 | ""
18 | ],
19 | "New Date":"",
20 | "Update Date":""
21 | },
22 | {
23 | "DARPA Program":"CyberGenome",
24 | "Program Teams":[
25 | "Invincea Labs",
26 | "George Mason University"
27 | ],
28 | "Title":"Mining Web Technical Discussions to Identify Malware Capabilities",
29 | "Link":"http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6679853&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6679853",
30 | "Categories":[
31 | ""
32 | ],
33 | "Subcategories":[
34 | ""
35 | ],
36 | "ACM 1998 classification code":[
37 | ""
38 | ],
39 | "New Date":"",
40 | "Update Date":""
41 | },
42 | {
43 | "DARPA Program":"CyberGenome",
44 | "Program Teams":[
45 | "Invincea Labs",
46 | "George Mason University"
47 | ],
48 | "Title":"Malware Similarity Identification Using Call Graph Based System Call Subsequence Features",
49 | "Link":"http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6679854&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6679854",
50 | "Categories":[
51 | ""
52 | ],
53 | "Subcategories":[
54 | ""
55 | ],
56 | "ACM 1998 classification code":[
57 | ""
58 | ],
59 | "New Date":"",
60 | "Update Date":""
61 | },
62 | {
63 | "DARPA Program":"CyberGenome",
64 | "Program Teams":[
65 | "Lockheed Martin-Advanced Technology Laboratories",
66 | "Carnegie Mellon University"
67 | ],
68 | "Title":"ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions",
69 | "Link":"http://users.ece.cmu.edu/~jiyongj/papers/oakland12.pdf",
70 | "Categories":[
71 | ""
72 | ],
73 | "Subcategories":[
74 | ""
75 | ],
76 | "ACM 1998 classification code":[
77 | ""
78 | ],
79 | "New Date":"",
80 | "Update Date":""
81 | },
82 | {
83 | "DARPA Program":"CyberGenome",
84 | "Program Teams":[
85 | "Lockheed Martin-Advanced Technology Laboratories",
86 | "Carnegie Mellon University"
87 | ],
88 | "Title":"BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis",
89 | "Link":"http://www.ece.cmu.edu/~jiyongj/papers/ccs11.pdf",
90 | "Categories":[
91 | ""
92 | ],
93 | "Subcategories":[
94 | ""
95 | ],
96 | "ACM 1998 classification code":[
97 | ""
98 | ],
99 | "New Date":"",
100 | "Update Date":""
101 | },
102 | {
103 | "DARPA Program":"CyberGenome",
104 | "Program Teams":[
105 | "Lockheed Martin-Advanced Technology Laboratories",
106 | "Carnegie Mellon University"
107 | ],
108 | "Title":"Towards Automatic Software Lineage Inference",
109 | "Link":"http://users.ece.cmu.edu/~jiyongj/papers/usenixsec13.pdf",
110 | "Categories":[
111 | ""
112 | ],
113 | "Subcategories":[
114 | ""
115 | ],
116 | "ACM 1998 classification code":[
117 | ""
118 | ],
119 | "New Date":"",
120 | "Update Date":""
121 | },
122 | {
123 | "DARPA Program":"CyberGenome",
124 | "Program Teams":[
125 | "Raytheon BBN",
126 | "Raytheon SI Government Solutions"
127 | ],
128 | "Title":"Inferring Accurate Histories of Malware Evolution from Structural Evidence",
129 | "Link":"https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS13/paper/view/5884/6082",
130 | "Categories":[
131 | ""
132 | ],
133 | "Subcategories":[
134 | ""
135 | ],
136 | "ACM 1998 classification code":[
137 | ""
138 | ],
139 | "New Date":"",
140 | "Update Date":""
141 | },
142 | {
143 | "DARPA Program":"CyberGenome",
144 | "Program Teams":[
145 | "BAE Systems",
146 | "Apogee Research",
147 | "University of North Florida",
148 | "University of Michigan"
149 | ],
150 | "Title":"On Trusting Introductions from a Reputable Source: A Utility-Maximizing Probabilistic Approach",
151 | "Link":"http://www.unf.edu/~n00819483/docs/globalSIP2013_final.pdf",
152 | "Categories":[
153 | ""
154 | ],
155 | "Subcategories":[
156 | ""
157 | ],
158 | "ACM 1998 classification code":[
159 | ""
160 | ],
161 | "New Date":"",
162 | "Update Date":""
163 | },
164 | {
165 | "DARPA Program":"CyberGenome",
166 | "Program Teams":[
167 | "BAE Systems",
168 | "Apogee Research",
169 | "University of North Florida",
170 | "University of Michigan"
171 | ],
172 | "Title":"On Optimal Decisions in an Introduction-Based Reputation Protocol",
173 | "Link":"http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6638202&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6638202",
174 | "Categories":[
175 | ""
176 | ],
177 | "Subcategories":[
178 | ""
179 | ],
180 | "ACM 1998 classification code":[
181 | ""
182 | ],
183 | "New Date":"",
184 | "Update Date":""
185 | },
186 | {
187 | "DARPA Program":"CyberGenome",
188 | "Program Teams":[
189 | "BAE Systems",
190 | "Apogee Research",
191 | "University of North Florida",
192 | "University of Michigan"
193 | ],
194 | "Title":"Analyzing Incentives for Protocol Compliance in Complex Domains: A Case Study of Introduction-Based Routing",
195 | "Link":"http://weis2013.econinfosec.org/papers/WellmanKimDuongWEIS2013.pdf",
196 | "Categories":[
197 | ""
198 | ],
199 | "Subcategories":[
200 | ""
201 | ],
202 | "ACM 1998 classification code":[
203 | ""
204 | ],
205 | "New Date":"",
206 | "Update Date":""
207 | },
208 | {
209 | "DARPA Program":"CyberGenome",
210 | "Program Teams":[
211 | "BAE Systems",
212 | "Apogee Research",
213 | "University of North Florida",
214 | "University of Michigan"
215 | ],
216 | "Title":"A Stochastic Model for Reputation Management in Introduction-Based Trust Systems",
217 | "Link":"http://stoch-nets-2012.lids.mit.edu/posters/Kreidl.pdf",
218 | "Categories":[
219 | ""
220 | ],
221 | "Subcategories":[
222 | ""
223 | ],
224 | "ACM 1998 classification code":[
225 | ""
226 | ],
227 | "New Date":"",
228 | "Update Date":""
229 | },
230 | {
231 | "DARPA Program":"CyberGenome",
232 | "Program Teams":[
233 | "BAE Systems",
234 | "Apogee Research",
235 | "University of North Florida",
236 | "University of Michigan"
237 | ],
238 | "Title":"Incentivizing Responsible Networking via Introduction-Based Routing",
239 | "Link":"http://dl.acm.org/citation.cfm?id=2022274",
240 | "Categories":[
241 | ""
242 | ],
243 | "Subcategories":[
244 | ""
245 | ],
246 | "ACM 1998 classification code":[
247 | ""
248 | ],
249 | "New Date":"",
250 | "Update Date":""
251 | }
252 | ]
--------------------------------------------------------------------------------
/CYBERGENOME-software.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program":"CyberGenome",
4 | "Program Teams":[
5 | "BAE Systems",
6 | "Apogee Research",
7 | "University of North Florida",
8 | "University of Michigan"
9 | ],
10 | "Software":"Introduction-Based Routing",
11 | "Internal Link":"",
12 | "External Link":"http://sourceforge.net/projects/introbasedrouting/",
13 | "Public Code Repo":"http://sourceforge.net/projects/introbasedrouting/",
14 | "Description":"Introduction-Based Routing (IBR) is a method for dynamically opening and closing point-to-point virtual private networks (connections) to create a dynamic yet trustworthy network. Connections are created via introduction. The IBR Proxy Server software packet implements IBR. (Java)",
15 | "Internal Code Repo":"",
16 | "License":[
17 | "GPLv2"
18 | ],
19 | "Languages":[
20 | "Java"
21 | ],
22 | "Categories":[
23 | "Networking",
24 | "Reputation Management"
25 | ],
26 | "New Date":"",
27 | "Update Date":""
28 | }
29 | ]
--------------------------------------------------------------------------------
/DCAPS-image.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/DCAPS-image.jpg
--------------------------------------------------------------------------------
/DCAPS-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"DCAPS",
4 | "Long Name":"Detection and Computational Analysis of Psychological Signals (DCAPS)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/detection-and-computational-analysis-of-psychological-signals",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The Detection and Computational Analysis of Psychological Signals (DCAPS) program aims to develop novel analytical tools to assess psychological status of warfighters in the hopes of improving psychological health awareness and enabling them to seek timely help. DCAPS tools will be developed to analyze patterns in everyday behaviors to detect subtle changes associated with post-traumatic stress disorder, depression and suicidal ideation. In particular, DCAPS hopes to advance the state-of-the-art in extraction and analysis of 'honest signals' from a wide variety of sensory data inherent in daily social interactions. DCAPS is not aimed at providing an exact diagnosis, but at providing a general metric of psychological health.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/mr-wade-shen",
26 | "Program Manager":"Mr. Wade Shen",
27 | "Program Manager Email":"wade.shen@darpa.mil",
28 | "Image":"DCAPS-image.jpg"
29 | }
--------------------------------------------------------------------------------
/DCAPS-software.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program":"DCAPS",
4 | "Program Teams":[
5 | "Cogito Health"
6 | ],
7 | "Contributors":[
8 | ""
9 | ],
10 | "Software":"VetGuard",
11 | "Internal Link":"",
12 | "External Link":"http://www.cogitocorp.com/research-showcase/",
13 | "Public Code Repo":"daniel.ragsdale@darpa.mil",
14 | "Description":"VetGuard is part of a mobile-enabled \"stepped-care\" platform that provides three major technical components: Cogito dialog (shows voice interactions between two interactants, off-the-shelf), Cogito central (datasets of large human interactions, finding targets of interventions, commercially available in 2 months), and Cogito companion, which includes VetGuard (TRL6). (C++/Java/Python)",
15 | "Internal Code Repo":"",
16 | "License":[
17 | "GPR"
18 | ],
19 | "Languages":[
20 | "C++",
21 | "Java",
22 | "Python"
23 | ],
24 | "Categories":[
25 | "PTSD",
26 | "depression",
27 | "indicators",
28 | "health informatics"
29 | ],
30 | "New Date":"",
31 | "Update Date":""
32 | },
33 | {
34 | "DARPA Program":"DCAPS",
35 | "Program Teams":[
36 | "Poulin Holdings"
37 | ],
38 | "Contributors":[
39 | ""
40 | ],
41 | "Software":"Durkheim System",
42 | "Internal Link":"",
43 | "External Link":"",
44 | "Public Code Repo":"daniel.ragsdale@darpa.mil",
45 | "Description":"Durkheim is a medically-validated suicidality classifier with a system infrastructure designed to support clinicians, patients, and potential patients. The system provides real-time monitoring of mobile and social information for risks associated with suicidality and suicide ideation. (C++/Java/PHP/HTML)",
46 | "Internal Code Repo":"",
47 | "License":[
48 | "UGPR"
49 | ],
50 | "Languages":[
51 | "C++",
52 | "Java",
53 | "PHP",
54 | "HTML"
55 | ],
56 | "Categories":[
57 | "PTSD",
58 | "depression",
59 | "indicators",
60 | "health informatics"
61 | ],
62 | "New Date":"",
63 | "Update Date":""
64 | },
65 | {
66 | "DARPA Program":"DCAPS",
67 | "Program Teams":[
68 | "BBN",
69 | "Raytheon"
70 | ],
71 | "Contributors":[
72 | ""
73 | ],
74 | "Software":"MINAT",
75 | "Internal Link":"",
76 | "External Link":"",
77 | "Public Code Repo":"daniel.ragsdale@darpa.mil",
78 | "Description":"Medical Informatics and Analytics Toolkit (MINAT) was created to: 1) Code distress indicators (includes 75 element codebook), 2) Apply to multi-genre, multi-modal communication, 3) Show evidence for decisions, and 4) Triage for suicidal/homicidal ideation run as a deployable web service.",
79 | "Internal Code Repo":"",
80 | "License":[
81 | "UGPR"
82 | ],
83 | "Languages":[
84 | ""
85 | ],
86 | "Categories":[
87 | "PTSD",
88 | "depression",
89 | "indicators",
90 | "health informatics"
91 | ],
92 | "New Date":"",
93 | "Update Date":""
94 | },
95 | {
96 | "DARPA Program":"DCAPS",
97 | "Program Teams":[
98 | "BBN",
99 | "Intific",
100 | "ABM"
101 | ],
102 | "Contributors":[
103 | ""
104 | ],
105 | "Software":"NeuroAnalysis",
106 | "Internal Link":"",
107 | "External Link":"",
108 | "Public Code Repo":"daniel.ragsdale@darpa.mil",
109 | "Description":"The NeuroAnalysis system is designed as a low-cost, configurable tool for multi-modal stimuli presentation and synchronized biometric data collection. (C++/C#/ActionScript/Lua/Python)",
110 | "Internal Code Repo":"",
111 | "License":[
112 | "GPR"
113 | ],
114 | "Languages":[
115 | "C++",
116 | "C#",
117 | "ActionScript",
118 | "Lua",
119 | "Python"
120 | ],
121 | "Categories":[
122 | "PTSD",
123 | "depression",
124 | "indicators",
125 | "health informatics"
126 | ],
127 | "New Date":"",
128 | "Update Date":""
129 | },
130 | {
131 | "DARPA Program":"DCAPS",
132 | "Program Teams":[
133 | "USC",
134 | "ICT"
135 | ],
136 | "Contributors":[
137 | ""
138 | ],
139 | "Software":"SimSensei",
140 | "Internal Link":"",
141 | "External Link":"http://ict.usc.edu/prototypes/simsensei/",
142 | "Public Code Repo":"daniel.ragsdale@darpa.mil",
143 | "Description":"SimSensei seeks to enable a new generation of clinical decision support tools and interactive virtual agent-based healthcare dissemination/delivery systems that are able to recognize and identify psychological distress from multimodal signals. SimSensei uses user-state which can also be used to create long-term patient profiles that help assess change over time.",
144 | "Internal Code Repo":"",
145 | "License":[
146 | "GPR"
147 | ],
148 | "Languages":[
149 | ""
150 | ],
151 | "Categories":[
152 | "PTSD",
153 | "depression",
154 | "indicators",
155 | "health informatics"
156 | ],
157 | "New Date":"",
158 | "Update Date":""
159 | }
160 | ]
--------------------------------------------------------------------------------
/DEFT-image.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/DEFT-image.jpg
--------------------------------------------------------------------------------
/DEFT-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"DEFT",
4 | "Long Name":"Deep Exploration and Filtering of Text (DEFT)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/deep-exploration-and-filtering-of-text",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"Automated, deep natural-language processing (NLP) technology may hold a solution for more efficiently processing text information and enabling understanding connections in text that might not be readily apparent to humans. DARPA created the Deep Exploration and Filtering of Text (DEFT) program to harness the power of NLP. Sophisticated artificial intelligence of this nature has the potential to enable defense analysts to efficiently investigate orders of magnitude more documents, which would enable discovery of implicitly expressed, actionable information within those documents.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-boyan-onyshkevych",
26 | "Program Manager":"Mr. Boyan Onyshkevych",
27 | "Program Manager Email":"boyan.onyshkevych@darpa.mil",
28 | "Image":"DEFT-image.jpg"
29 | }
--------------------------------------------------------------------------------
/ENGAGE-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"ENGAGE",
4 | "Long Name":"ENGAGE",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/engage",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"DARPA created the ENGAGE program to enable the development of education and training systems that are better, faster, continuously optimized, and massively scalable. ENGAGE is exploring software- and data-intensive education and training methods that harness the power of large user populations to optimize instruction.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/mr-wade-shen",
26 | "Program Manager":"Mr. Wade Shen",
27 | "Program Manager Email":"wade.shen@darpa.mil",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/ENGAGE-pubs.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program":"ENGAGE",
4 | "Program Teams":[
5 | "CMU Entertainment Technology Center"
6 | ],
7 | "Title":"Beanstalk: A Unity Game Addressing Balance Principles, Socio-Emotional Learning and Scientific Inquiry",
8 | "Link":"http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6659126",
9 | "Categories":[
10 | ""
11 | ],
12 | "Subcategories":[
13 | ""
14 | ],
15 | "ACM 1998 classification code":[
16 | ""
17 | ],
18 | "New Date":"",
19 | "Update Date":""
20 | },
21 | {
22 | "DARPA Program":"ENGAGE",
23 | "Program Teams":[
24 | "CMU Entertainment Technology Center"
25 | ],
26 | "Title":"Helios: An HTML5 Game Teaching Proportional Reasoning To Child Players",
27 | "Link":"http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6632614",
28 | "Categories":[
29 | ""
30 | ],
31 | "Subcategories":[
32 | ""
33 | ],
34 | "ACM 1998 classification code":[
35 | ""
36 | ],
37 | "New Date":"",
38 | "Update Date":""
39 | },
40 | {
41 | "DARPA Program":"ENGAGE",
42 | "Program Teams":[
43 | "CMU Entertainment Technology Center"
44 | ],
45 | "Title":"Supporting Social-Emotional Development in Collaborative Inquiry Games for K-3 Science Learning",
46 | "Link":"Not Yet Published",
47 | "Categories":[
48 | ""
49 | ],
50 | "Subcategories":[
51 | ""
52 | ],
53 | "ACM 1998 classification code":[
54 | ""
55 | ],
56 | "New Date":"",
57 | "Update Date":""
58 | },
59 | {
60 | "DARPA Program":"ENGAGE",
61 | "Program Teams":[
62 | "CMU Entertainment Technology Center"
63 | ],
64 | "Title":"Rumble Blocks: Teaching Science Concepts to Young Children Through a Unity Game",
65 | "Link":"http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6314570",
66 | "Categories":[
67 | ""
68 | ],
69 | "Subcategories":[
70 | ""
71 | ],
72 | "ACM 1998 classification code":[
73 | ""
74 | ],
75 | "New Date":"",
76 | "Update Date":""
77 | },
78 | {
79 | "DARPA Program":"ENGAGE",
80 | "Program Teams":[
81 | "University of Washington"
82 | ],
83 | "Title":"A Mixed-Initiative Tool for Designing Level Progressions in Games",
84 | "Link":"http://www.ericbutler.net/media/papers/uist2013_progression.pdf",
85 | "Categories":[
86 | ""
87 | ],
88 | "Subcategories":[
89 | ""
90 | ],
91 | "ACM 1998 classification code":[
92 | ""
93 | ],
94 | "New Date":"",
95 | "Update Date":""
96 | },
97 | {
98 | "DARPA Program":"ENGAGE",
99 | "Program Teams":[
100 | "University of Washington"
101 | ],
102 | "Title":"The Effects of Age on Player Behavior in Educational Games",
103 | "Link":"http://homes.cs.washington.edu/~eorourke/papers/age_behavior_fdg.pdf",
104 | "Categories":[
105 | ""
106 | ],
107 | "Subcategories":[
108 | ""
109 | ],
110 | "ACM 1998 classification code":[
111 | ""
112 | ],
113 | "New Date":"",
114 | "Update Date":""
115 | },
116 | {
117 | "DARPA Program":"ENGAGE",
118 | "Program Teams":[
119 | "University of Washington"
120 | ],
121 | "Title":"Quantifying over Play: Constraining Undesirable Solutions in Puzzle Design, Foundations of Digital Games",
122 | "Link":"http://adamsmith.as/papers/fdg2013_shortcuts.pdf",
123 | "Categories":[
124 | ""
125 | ],
126 | "Subcategories":[
127 | ""
128 | ],
129 | "ACM 1998 classification code":[
130 | ""
131 | ],
132 | "New Date":"",
133 | "Update Date":""
134 | },
135 | {
136 | "DARPA Program":"ENGAGE",
137 | "Program Teams":[
138 | "University of Washington"
139 | ],
140 | "Title":"Automatic Redesign of Local Playspace Properties",
141 | "Link":"http://homes.cs.washington.edu/~awb/data/Bauer_FDG_2013.pdf",
142 | "Categories":[
143 | ""
144 | ],
145 | "Subcategories":[
146 | ""
147 | ],
148 | "ACM 1998 classification code":[
149 | ""
150 | ],
151 | "New Date":"",
152 | "Update Date":""
153 | },
154 | {
155 | "DARPA Program":"ENGAGE",
156 | "Program Teams":[
157 | "University of Washington"
158 | ],
159 | "Title":"Predicting Player Moves in an Educational Game: A Hybrid Approach",
160 | "Link":"http://www.ericbutler.net/media/papers/edm2013_heuristics.pdf",
161 | "Categories":[
162 | ""
163 | ],
164 | "Subcategories":[
165 | ""
166 | ],
167 | "ACM 1998 classification code":[
168 | ""
169 | ],
170 | "New Date":"",
171 | "Update Date":""
172 | },
173 | {
174 | "DARPA Program":"ENGAGE",
175 | "Program Teams":[
176 | "University of Washington"
177 | ],
178 | "Title":"A Trace-based Framework for Analyzing and Synthesizing Educational Progressions",
179 | "Link":"http://dub.washington.edu/pubs/340",
180 | "Categories":[
181 | ""
182 | ],
183 | "Subcategories":[
184 | ""
185 | ],
186 | "ACM 1998 classification code":[
187 | ""
188 | ],
189 | "New Date":"",
190 | "Update Date":""
191 | },
192 | {
193 | "DARPA Program":"ENGAGE",
194 | "Program Teams":[
195 | "CMU Robotics Academy"
196 | ],
197 | "Title":"Designing Educative Guides: Reconceptualizing Teacher's Role in Teacherless Cognitive Tutor-based Robotics Instruction.",
198 | "Link":"http://www.education.rec.ri.cmu.edu/content/educators/research/files/AERA%202012%20Paper_King,%20Stein,%20Schunn.pdf",
199 | "Categories":[
200 | ""
201 | ],
202 | "Subcategories":[
203 | ""
204 | ],
205 | "ACM 1998 classification code":[
206 | ""
207 | ],
208 | "New Date":"",
209 | "Update Date":""
210 | },
211 | {
212 | "DARPA Program":"ENGAGE",
213 | "Program Teams":[
214 | "CMU Robotics Academy"
215 | ],
216 | "Title":"Resources for robot competition success: Assessing math use in grade-school-level engineering design",
217 | "Link":"Not Yet Published",
218 | "Categories":[
219 | ""
220 | ],
221 | "Subcategories":[
222 | ""
223 | ],
224 | "ACM 1998 classification code":[
225 | ""
226 | ],
227 | "New Date":"",
228 | "Update Date":""
229 | },
230 | {
231 | "DARPA Program":"ENGAGE",
232 | "Program Teams":[
233 | "CMU Robotics Academy"
234 | ],
235 | "Title":"Calculational versus mechanistic mathematics in propelling the development of physical knowledge",
236 | "Link":"http://www.education.rec.ri.cmu.edu/content/educators/research/files/SilkSchunn2011a-JPS.pdf",
237 | "Categories":[
238 | ""
239 | ],
240 | "Subcategories":[
241 | ""
242 | ],
243 | "ACM 1998 classification code":[
244 | ""
245 | ],
246 | "New Date":"",
247 | "Update Date":""
248 | },
249 | {
250 | "DARPA Program":"ENGAGE",
251 | "Program Teams":[
252 | "CMU Robotics Academy"
253 | ],
254 | "Title":"Resources for learning robots: Facilitating the incorporation of mathematical models in students' engineering design strategies",
255 | "Link":"http://www.education.rec.ri.cmu.edu/content/educators/research/files/SilkSchunn2011a-AERA.pdf",
256 | "Categories":[
257 | ""
258 | ],
259 | "Subcategories":[
260 | ""
261 | ],
262 | "ACM 1998 classification code":[
263 | ""
264 | ],
265 | "New Date":"",
266 | "Update Date":""
267 | }
268 | ]
--------------------------------------------------------------------------------
/ENGAGE-software.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program":"ENGAGE",
4 | "Program Teams":[
5 | "CMU Entertainment Technology Center"
6 | ],
7 | "Contributors":[
8 | ""
9 | ],
10 | "Sub-contractors":[
11 | ""
12 | ],
13 | "Software":"RumbleBlocks, Beanstalk, PuppyBot Rescue",
14 | "Internal Link":"",
15 | "External Link":"http://www.etc.cmu.edu/projects/sci-fri/",
16 | "Public Code Repo":"daniel.ragsdale@darpa.mil",
17 | "Instructional Material":"",
18 | "Description":"SCI-FRI (Science Friction) is a project working towards inspiring young minds to pursue science and engineering as a career. Initiated by DARPA, this is a multi-year project working in conjunction with many different institutions and organizations, such as the Sesame Workshop and Carnegie Mellon's Human Computer Interaction Institute. The end-product will be a series of multi-platform games that apply adaptive, in-game analytics for Pre-K-3rd graders that inspires interest and teaches basic concepts in the field of science. (C#/HTML5/CSS/JavaScript/CreateJS Suite/Flash/Unity3D/3DS Max)",
19 | "License":[
20 | "UGPR"
21 | ],
22 | "Languages":[
23 | "C#",
24 | "HTML5",
25 | "CSS",
26 | "JavaScript",
27 | "CreateJS Suite",
28 | "Flash",
29 | "Unity3D",
30 | "3DS Max"
31 | ],
32 | "Platform Requirements":[
33 | ""
34 | ],
35 | "Dependent modules":[
36 | ""
37 | ],
38 | "Dependent module URLs":[
39 | ""
40 | ],
41 | "Component modules":[
42 | ""
43 | ],
44 | "Component module URLs":[
45 | ""
46 | ],
47 | "Industry":[
48 | ""
49 | ],
50 | "Functionality":[
51 | ""
52 | ],
53 | "Categories":[
54 | "Large-scale analytics",
55 | "learning assessments",
56 | "adaptive learning technologies",
57 | "optimum learning pathways"
58 | ],
59 | "New Date":"",
60 | "Update Date":""
61 | },
62 | {
63 | "DARPA Program":"ENGAGE",
64 | "Program Teams":[
65 | "University of Washington"
66 | ],
67 | "Contributors":[
68 | ""
69 | ],
70 | "Sub-contractors":[
71 | ""
72 | ],
73 | "Software":"TreeFrog Treasure, Refraction, Creature Capture, DragonBox Adaptive",
74 | "Internal Link":"",
75 | "External Link":"http://centerforgamescience.org/games/",
76 | "Public Code Repo":"daniel.ragsdale@darpa.mil",
77 | "Instructional Material":"",
78 | "Description":"The games create by the Center for Game Science at the University of Washington are highly adaptive games that also perform gameplay analytics across all game players. Thus, the games continuously optimize and are massively scalable. (ActionScript3/Java/GWT - Java/PHP)",
79 | "License":[
80 | "UGPR"
81 | ],
82 | "Languages":[
83 | "ActionScript3",
84 | "Java",
85 | "GWT - Java",
86 | "PHP"
87 | ],
88 | "Platform Requirements":[
89 | ""
90 | ],
91 | "Dependent modules":[
92 | ""
93 | ],
94 | "Dependent module URLs":[
95 | ""
96 | ],
97 | "Component modules":[
98 | ""
99 | ],
100 | "Component module URLs":[
101 | ""
102 | ],
103 | "Industry":[
104 | ""
105 | ],
106 | "Functionality":[
107 | ""
108 | ],
109 | "Categories":[
110 | "Large-scale analytics",
111 | "learning assessments",
112 | "adaptive learning technologies",
113 | "optimum learning pathways"
114 | ],
115 | "New Date":"",
116 | "Update Date":""
117 | },
118 | {
119 | "DARPA Program":"ENGAGE",
120 | "Program Teams":[
121 | "CMU Robotics Academy"
122 | ],
123 | "Contributors":[
124 | ""
125 | ],
126 | "Sub-contractors":[
127 | ""
128 | ],
129 | "Software":"Computer Science Student Network",
130 | "Internal Link":"",
131 | "External Link":"http://cs2n.org/",
132 | "Public Code Repo":"daniel.ragsdale@darpa.mil",
133 | "Instructional Material":"",
134 | "Description":"CS2N, or Computer Science Student Network, is a virtual center for computer science activities, robotics programming competitions, and computer science courses. CS2N provides step-by-step lessons to make programming easy for students by also providing access to virtual robots. (Unity/Maya/Ruby on Rails/Java/PHP/HTML5)",
135 | "License":[
136 | "UGPR"
137 | ],
138 | "Languages":[
139 | "Unity",
140 | "Maya",
141 | "Ruby on Rails",
142 | "Java",
143 | "PHP",
144 | "HTML5"
145 | ],
146 | "Platform Requirements":[
147 | ""
148 | ],
149 | "Dependent modules":[
150 | ""
151 | ],
152 | "Dependent module URLs":[
153 | ""
154 | ],
155 | "Component modules":[
156 | ""
157 | ],
158 | "Component module URLs":[
159 | ""
160 | ],
161 | "Industry":[
162 | ""
163 | ],
164 | "Functionality":[
165 | ""
166 | ],
167 | "Categories":[
168 | "Large-scale analytics",
169 | "learning assessments",
170 | "adaptive learning technologies",
171 | "optimum learning pathways"
172 | ],
173 | "New Date":"",
174 | "Update Date":""
175 | },
176 | {
177 | "DARPA Program":"ENGAGE",
178 | "Program Teams":[
179 | "Intific"
180 | ],
181 | "Contributors":[
182 | ""
183 | ],
184 | "Sub-contractors":[
185 | ""
186 | ],
187 | "Software":"SpaceForce",
188 | "Internal Link":"http://www.intific.com/index.php/products/education/our-space",
189 | "External Link":"http://www.brainpopjr.com/games/spaceforce/",
190 | "Public Code Repo":"daniel.ragsdale@darpa.mil",
191 | "Instructional Material":"",
192 | "Description":"The goal of RoboBall SpaceForce is gameplay that results in measurable metrics that demonstrate games provide an innovative approach to STEM learning and student emotional resilience. RoboBall SpaceForce runs in OurSpace, a portal built to host RoboBall SpaceForce, its data and an HTML5 level editor. Players can login & register with a unique ID to save game progress. (C++/C#/ActionScript/Lua/Python)",
193 | "License":[
194 | "GPR"
195 | ],
196 | "Languages":[
197 | "C++",
198 | "C#",
199 | "ActionScript",
200 | "Lua",
201 | "Python"
202 | ],
203 | "Platform Requirements":[
204 | ""
205 | ],
206 | "Dependent modules":[
207 | ""
208 | ],
209 | "Dependent module URLs":[
210 | ""
211 | ],
212 | "Component modules":[
213 | ""
214 | ],
215 | "Component module URLs":[
216 | ""
217 | ],
218 | "Industry":[
219 | ""
220 | ],
221 | "Functionality":[
222 | ""
223 | ],
224 | "Categories":[
225 | "Large-scale analytics",
226 | "learning assessments",
227 | "adaptive learning technologies",
228 | "optimum learning pathways"
229 | ],
230 | "New Date":"",
231 | "Update Date":""
232 | },
233 | {
234 | "DARPA Program":"ENGAGE",
235 | "Program Teams":[
236 | "UCLA CRESST"
237 | ],
238 | "Contributors":[
239 | ""
240 | ],
241 | "Sub-contractors":[
242 | ""
243 | ],
244 | "Software":"Go Vector Go, Team Vector",
245 | "Internal Link":"",
246 | "External Link":"http://engage.cse.ucla.edu/",
247 | "Public Code Repo":"daniel.ragsdale@darpa.mil",
248 | "Instructional Material":"",
249 | "Description":"CRESST games are designed to help young children (in grades K-3) learn advanced physics and promote scientific reasoning and socio-emotional skills. The games promote improved understanding of the physics concepts force and motion, with emphasis on force magnitude & direction, friction, mass, gravity, and slope. These games also promote improved understanding of key social and emotional skills, such as anti-bullying and empathy. (C++/C#/ActionScript/Lua/Python)",
250 | "License":[
251 | "GPR"
252 | ],
253 | "Languages":[
254 | "C++",
255 | "C#",
256 | "ActionScript",
257 | "Lua",
258 | "Python"
259 | ],
260 | "Platform Requirements":[
261 | ""
262 | ],
263 | "Dependent modules":[
264 | ""
265 | ],
266 | "Dependent module URLs":[
267 | ""
268 | ],
269 | "Component modules":[
270 | ""
271 | ],
272 | "Component module URLs":[
273 | ""
274 | ],
275 | "Industry":[
276 | ""
277 | ],
278 | "Functionality":[
279 | ""
280 | ],
281 | "Categories":[
282 | "Large-scale analytics",
283 | "learning assessments",
284 | "adaptive learning technologies",
285 | "optimum learning pathways"
286 | ],
287 | "New Date":"",
288 | "Update Date":""
289 | }
290 | ]
--------------------------------------------------------------------------------
/F6-image.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/F6-image.jpg
--------------------------------------------------------------------------------
/FLASHLIGHT-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"FLASHLIGHT",
4 | "Long Name":"FLASHLIGHT",
5 | "Program Teams":"",
6 | "Link":"",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The FLASHLIGHT program seeks to prevent data exfiltration and information leakage through the use of a hardened audit and inspection capability that attests to the integrity and legitimacy of data leaving a network enclave.",
25 | "Program Manager Link":"",
26 | "Program Manager":"Richard Guidorizzi",
27 | "Program Manager Email":"richard.guidorizzi@darpa.mil"
28 | }
--------------------------------------------------------------------------------
/GRAPHS-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"DSO",
3 | "DARPA Program Name":"GRAPHS",
4 | "Long Name":"GRAPHS",
5 | "Program Teams":[
6 | "Sandia National Laboratories",
7 | "Hewlett Packard",
8 | "Stanford University",
9 | "University of Notre Dame",
10 | "Illinois Institute of Technology",
11 | "Santa Fe Institute",
12 | "University of Pennsylvania",
13 | "Temple University",
14 | "Johns Hopkins University",
15 | "Boston University",
16 | "Harvard",
17 | "UC Santa Barbara",
18 | "Pennsylvania State University",
19 | "Massachusetts Institute of Technology",
20 | "University of Maryland",
21 | "University of Minnesota",
22 | "University of Colorado",
23 | "University of Michigan",
24 | "University of Southern California",
25 | "Lehigh University",
26 | "Carnegie Mellon University",
27 | "Alfred Renyi Institute of Mathematics",
28 | "Rensselaer Polytechnic Institute",
29 | "University of Houston",
30 | "University of South Carolina",
31 | "UC San Diego",
32 | "Oak Ridge National Laboratories"
33 | ],
34 | "Link":"http://www.darpa.mil/program/graphs",
35 | "Display Software Columns":[
36 | "Team",
37 | "Project",
38 | "Description",
39 | "Instructional Material",
40 | "Category",
41 | "Code",
42 | "Stats",
43 | "License"
44 | ],
45 | "Display Pubs Columns":[
46 | "Team",
47 | "Title",
48 | "Link"
49 | ],
50 | "Display Data Columns":[
51 | ""
52 | ],
53 | "Display Examples Columns":"",
54 | "Description":"GRAPHS is developing scalable algorithms and statistical methods for the analysis and modelling of very large and dynamically evolving networks, with the intent of developing predictive methods for anomalous and exceptional events in networks. A major focus of the program has been quantitative and structural aspects of large networks and the attending models. The program is divided into a few thrusts, with performers working in sampling techniques for graphs, geometric embeddings into hyperbolic spaces, Gaussian Conditional Random Fields, meso-level network behaviors, and link prediction.",
55 | "Program Manager Link":"http://www.darpa.mil/staff/dr-reza-ghanadan",
56 | "Program Manager":"Dr. Reza Ghanadan",
57 | "Program Manager Email":"reza.ghanadan@darpa.mil",
58 | "Image":""
59 | }
--------------------------------------------------------------------------------
/GRAPHS-software.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program": "GRAPHS",
4 | "Program Teams": [
5 | "SIMPLEX MINER"
6 | ],
7 | "Contributors": [
8 | "Stanford University"
9 | ],
10 | "Sub-contractors": [
11 | ""
12 | ],
13 | "Software": "SnapVX",
14 | "Internal Link": "",
15 | "External Link": "http://snap.stanford.edu/snapvx/",
16 | "Public Code Repo": "https://github.com/snap-stanford/snapvx",
17 | "Instructional Material": "",
18 | "Stats": "",
19 | "Description": "SnapVX is a Python-based convex optimization solver for problems defined on graphs. It provides a fast and scalable solution with guaranteed global convergence. SnapVX combines the graph capabilities of Snap.py with the convex solver from CVXPY. (Python)",
20 | "Internal Code Repo": "",
21 | "License": [
22 | "BSD"
23 | ],
24 | "Languages": [
25 | "Python"
26 | ],
27 | "Platform Requirements": [
28 | ""
29 | ],
30 | "Dependent modules": [
31 | ""
32 | ],
33 | "Dependent module URLs": [
34 | ""
35 | ],
36 | "Component modules": [
37 | ""
38 | ],
39 | "Component module URLs": [
40 | ""
41 | ],
42 | "Industry": [
43 | ""
44 | ],
45 | "Functionality": [
46 | "Convex optimization"
47 | ],
48 | "Categories": [
49 | "Analytics"
50 | ],
51 | "New Date": "20160323",
52 | "Update Date": ""
53 | }
54 | ]
--------------------------------------------------------------------------------
/HACMS-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"HACMS",
4 | "Long Name":"High-Assurance Cyber Military Systems (HACMS)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/high-assurance-cyber-military-systems",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The High-Assurance Cyber Military Systems (HACMS) program goal is to create technology for the construction of high-assurance cyber-physical systems, where high assurance is defined to mean functionally correct and satisfying appropriate safety and security properties. Key technologies include interactive software synthesis systems, verification tools, and specification languages.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-john-launchbury",
26 | "Program Manager":"Dr. John Launchbury",
27 | "Program Manager Email":"john.launchbury@darpa.mil",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/ICAS-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"ICAS",
4 | "Long Name":"Integrated Cyber Analysis System (ICAS)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/integrated-cyber-analysis-system",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"Systems developed on the Integrated Cyber Analysis System (ICAS) program will make host and network forensic information available to enterprise IT security. ICAS automatically integrates structured and unstructured sources of network data into a federated database to enable reasoning about cyber threats, and provides cyber defenders with a current picture of their IT environment, to reduce the time required to discover targeted attacks. At the heart of this capability is a cyber security ontology which enables the automated federation of multiple heterogeneous sources of data by providing uniform semantic relationships for IT network defense. This ontology is available for download at http://invincealabs.github.io/icas-ontology/. (ICAS Ontology - DISTAR case 24569 (5/15/2015).",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-john-everett",
26 | "Program Manager":"Dr. John Everett",
27 | "Program Manager Email":"john.everett@darpa.mil",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/MADCAT-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"MADCAT",
4 | "Long Name":"Multilingual Automatic Document Classification Analysis and Translation (MADCAT)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/multilingual-automatic-document-classification-analysis-and-translation",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The goal of the Multilingual Automatic Document Classification Analysis and Translation (MADCAT) program is to automatically convert foreign language text images into English transcripts, thus eliminating the need for linguists and analysts while automatically providing relevant, distilled actionable information to military command and personnel in a timely fashion.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-david-doermann",
26 | "Program Manager":"Dr. David Doermann",
27 | "Program Manager Email":"david.doermann@darpa.mil"
28 | }
--------------------------------------------------------------------------------
/MEMEX-data.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program": "MEMEX",
4 | "Data Set Name": "Ebola TREC DD Raw PDF",
5 | "Description": "The PDFs contained within the directory were crawled from the following sites using Apache Nutchi 1.10-SNAPSHOT. http://www.who.int/en, http://fts.unocha.org, http://www.worldbank.org/en/topic/ebola, http://apps.who.int/ebola/en/current-situation/ebola-situation-report The document corpus represents a dump of ONLY PDFs from the above sites with the aim of capturing a corpus representing sentiment focusing on the Ebola Crisis domain.",
6 | "Number of Rows": "",
7 | "Number of Columns": "",
8 | "Industry": [
9 | "Ebola"
10 | ],
11 | "New Date": "20150410",
12 | "Update Date": ""
13 | },
14 | {
15 | "DARPA Program": "MEMEX",
16 | "Data Set Name": "Ebola TREC DD PDF Solr Index",
17 | "Description": "Provides a Solr index representation of the data described as 'The PDFs contained within the directory were crawled from the following sites using Apache Nutchi 1.10-SNAPSHOT. http://www.who.int/en, http://fts.unocha.org, http://www.worldbank.org/en/topic/ebola, http://apps.who.int/ebola/en/current-situation/ebola-situation-report The document corpus represents a dump of ONLY PDFs from the above sites with the aim of capturing a corpus representing sentiment focusing on the Ebola Crisis domain.'",
18 | "Number of Rows": "",
19 | "Number of Columns": "",
20 | "Industry": [
21 | "Ebola"
22 | ],
23 | "New Date": "20150410",
24 | "Update Date": ""
25 | },
26 | {
27 | "DARPA Program": "MEMEX",
28 | "Data Set Name": "Florida District Court of Appeals",
29 | "Description": "4130 PDF documents (1st - 5th Districts dating back to 2007) - https://crawl-jpl.s3.amazonaws.com/florida_state_appeals_court.zip",
30 | "Number of Rows": "4130",
31 | "Number of Columns": "",
32 | "Industry": [
33 | "Public Criminal Law"
34 | ],
35 | "New Date": "20150410",
36 | "Update Date": ""
37 | },
38 | {
39 | "DARPA Program": "MEMEX",
40 | "Data Set Name": "District of Columbia Court of Appeals",
41 | "Description": "375 PDF documents (compounded documents) - https://crawl-jpl.s3.amazonaws.com/district_of_colombia.zip",
42 | "Number of Rows": "375",
43 | "Number of Columns": "",
44 | "Industry": [
45 | "Public Criminal Law"
46 | ],
47 | "New Date": "20150410",
48 | "Update Date": ""
49 | },
50 | {
51 | "DARPA Program": "MEMEX",
52 | "Data Set Name": "New York State 1st District Court of Appeals",
53 | "Description": "1798 PDF documents - https://crawl-jpl.s3.amazonaws.com/new_york_state_appellate_1st_div.zip",
54 | "Number of Rows": "1798",
55 | "Number of Columns": "",
56 | "Industry": [
57 | "Public Criminal Law"
58 | ],
59 | "New Date": "20150410",
60 | "Update Date": ""
61 | },
62 | {
63 | "DARPA Program": "MEMEX",
64 | "Data Set Name": "New York State 2nd District Court of Appeals",
65 | "Description": "8745 PDF documents - https://crawl-jpl.s3.amazonaws.com/new_york_state_appellate_2nd_div.zip",
66 | "Number of Rows": "8745",
67 | "Number of Columns": "",
68 | "Industry": [
69 | "Public Criminal Law"
70 | ],
71 | "New Date": "20150410",
72 | "Update Date": ""
73 | },
74 | {
75 | "DARPA Program": "MEMEX",
76 | "Data Set Name": "New York State 4th District Court of Appeals",
77 | "Description": "85 (compounded documents) - https://crawl-jpl.s3.amazonaws.com/new_york_state_appellate_4th_div.zip",
78 | "Number of Rows": "85",
79 | "Number of Columns": "",
80 | "Industry": [
81 | "Public Criminal Law"
82 | ],
83 | "New Date": "20150410",
84 | "Update Date": ""
85 | },
86 | {
87 | "DARPA Program": "MEMEX",
88 | "Data Set Name": "Escort Sites",
89 | "Description": "Multiple crawls of various escort sites as defined by this seed list: https://memexproxy.com/wiki/display/MPM/Web+Sites+For+Scraping. Data Set is available at: http://memex.dyndns.org:8983/solr/",
90 | "Number of Rows": "1019923",
91 | "Number of Columns": "",
92 | "Industry": [
93 | "Human Trafficking"
94 | ],
95 | "New Date": "20150410",
96 | "Update Date": ""
97 | },
98 | {
99 | "DARPA Program": "MEMEX",
100 | "Data Set Name": "Image Catalog",
101 | "Description": "Annotated version of the Roxyimages 32M+ image dataset containing all extracted EXIF metadata (camera serial number, etc.) by Tika, as well as OCR image to text extraction from Tika/Tesseract.",
102 | "Number of Rows": "31508592",
103 | "Number of Columns": "60+",
104 | "Industry": [
105 | "Human Trafficking"
106 | ],
107 | "New Date": "20150410",
108 | "Update Date": ""
109 | },
110 | {
111 | "DARPA Program": "MEMEX",
112 | "Data Set Name": "Ebola news articles in html. (ebola_01_12_2015.tar.gz)",
113 | "Description": "This dataset contains 328k articles about Ebola in html.",
114 | "Number of Rows": "",
115 | "Number of Columns": "",
116 | "Industry": [
117 | "News Media"
118 | ],
119 | "New Date": "20150410",
120 | "Update Date": ""
121 | },
122 | {
123 | "DARPA Program": "MEMEX",
124 | "Data Set Name": "Paper abstracts from Journal Cambridge in html. (abstracts.tar.gz)",
125 | "Description": "This dataset contains abstracts and metadata (title, authors, affiliations) of 69k papers (1980-2014) crawled from journals.cambridge.org.",
126 | "Number of Rows": "",
127 | "Number of Columns": "",
128 | "Industry": [
129 | "Material Sciences Literature"
130 | ],
131 | "New Date": "20150410",
132 | "Update Date": ""
133 | },
134 | {
135 | "DARPA Program": "MEMEX",
136 | "Data Set Name": "Papers (fulltext) from Journal Cambridge in PDF",
137 | "Description": "This dataset contains 67k full-text papers (1980-2014) in PDF format, crawled from journals.cambridge.org.",
138 | "Number of Rows": "",
139 | "Number of Columns": "",
140 | "Industry": [
141 | "Material Sciences Literature"
142 | ],
143 | "New Date": "20150410",
144 | "Update Date": ""
145 | },
146 | {
147 | "DARPA Program": "MEMEX",
148 | "Data Set Name": "Papers (fulltext) from Journal Cambridge in PDF",
149 | "Description": "This dataset contains 67k full-text papers extracted from PDF version.",
150 | "Number of Rows": "",
151 | "Number of Columns": "",
152 | "Industry": [
153 | "Material Sciences Literature"
154 | ],
155 | "New Date": "20150410",
156 | "Update Date": ""
157 | },
158 | {
159 | "DARPA Program": "MEMEX",
160 | "Data Set Name": "Papers (fulltext) from Nature Materials Journal in html",
161 | "Description": "This dataset contains 2771 full-text papers (2002 to 2015) in html format crawled from http://www.nature.com/nmat/archive/index.html.",
162 | "Number of Rows": "",
163 | "Number of Columns": "",
164 | "Industry": [
165 | "Material Sciences Literature"
166 | ],
167 | "New Date": "20150410",
168 | "Update Date": ""
169 | },
170 | {
171 | "DARPA Program": "MEMEX",
172 | "Data Set Name": "Papers (fulltext) from Nature Materials Journal in PDF",
173 | "Description": "This dataset contains 2771 full-text papers (2002 to 2015) in PDF format crawled from http://www.nature.com/nmat/archive/index.html.",
174 | "Number of Rows": "",
175 | "Number of Columns": "",
176 | "Industry": [
177 | "Material Sciences Literature"
178 | ],
179 | "New Date": "20150410",
180 | "Update Date": ""
181 | }
182 | ]
--------------------------------------------------------------------------------
/MEMEX-image.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/MEMEX-image.jpg
--------------------------------------------------------------------------------
/MEMEX-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"MEMEX",
4 | "Long Name":"Memex (Domain-Specific Search)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/memex",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | "Industry",
22 | "Name",
23 | "Description",
24 | "Total Rows",
25 | "Total Columns"
26 | ],
27 | "Display Examples Columns":"",
28 | "Description":"Today's web searches use a centralized, one-size-fits-all approach that searches the Internet with the same set of tools for all queries. While that model has been wildly successful commercially, it does not work well for many government use cases. To help overcome these challenges, DARPA launched the Memex program in September 2014. Memex seeks to develop software that advances online search capabilities far beyond the current state of the art. The goal is to invent better methods for interacting with and sharing information, so users can quickly and thoroughly organize and search subsets of information relevant to their individual interests. Creation of a new domain-specific indexing and search paradigm will provide mechanisms for improved content discovery, information extraction, information retrieval, user collaboration, and extension of current search capabilities to the deep web, the dark web, and nontraditional (e.g. multimedia) content.",
29 | "Program Manager Link":"http://www.darpa.mil/staff/mr-wade-shen",
30 | "Program Manager":"Mr. Wade Shen",
31 | "Program Manager Email":"wade.shen@darpa.mil",
32 | "Image":"MEMEX-image.jpg"
33 | }
--------------------------------------------------------------------------------
/MRC-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"MRC",
4 | "Long Name":"Mission-oriented Resilient Clouds (MRC)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/mission-oriented-resilient-clouds",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The Mission-oriented Resilient Clouds (MRC) program is addressing some of the security challenges facing cloud computing by developing technologies to detect, diagnose and respond to attacks in the cloud, with the goal of effectively building a 'community health system' for the cloud. MRC is also developing technologies intended to enable missions that are supported by cloud computing and other networked systems to continue functioning while under cyberattack.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-stuart-wagner",
26 | "Program Manager":"Dr. Stuart Wagner",
27 | "Program Manager Email":"Stuart.Wagner@darpa.mil",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/MUSE-data.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program": "MUSE",
4 | "Data Set Name": "Android on Github",
5 | "Description": "This data set contains 10,000 cloned Github repos that contain Android app source files.",
6 | "Number of Rows": "10160",
7 | "Number of Columns": "",
8 | "Industry": [
9 | "Android"
10 | ],
11 | "New Date": "20160323",
12 | "Update Date": ""
13 | },
14 | {
15 | "DARPA Program": "MUSE",
16 | "Data Set Name": "DroidLife Traces",
17 | "Description": "This data set contains 134 execution traces consisting of initializing events, callbacks, and framework callins on running Android applications. In these traces, 184 distinct Android types have been traced.",
18 | "Number of Rows": "134",
19 | "Number of Columns": "",
20 | "Industry": [
21 | "Android"
22 | ],
23 | "New Date": "20160323",
24 | "Update Date": ""
25 | },
26 | {
27 | "DARPA Program": "MUSE",
28 | "Data Set Name": "Google Code Jam subset",
29 | "Description": "This data set consists of scraped Google Code Jam submissions from 2006 through 2015, restricted to those written in C and compilable using ‘gcc -c‘ with gcc version 4.6.4.",
30 | "Number of Rows": "19238",
31 | "Number of Columns": "",
32 | "Industry": [
33 | "Education"
34 | ],
35 | "New Date": "20160323",
36 | "Update Date": ""
37 | }
38 | ]
--------------------------------------------------------------------------------
/MUSE-image.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/MUSE-image.jpg
--------------------------------------------------------------------------------
/MUSE-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"MUSE",
4 | "Long Name":"Mining and Understanding Software Enclaves (MUSE)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/mining-and-understanding-software-enclaves",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | "Data Set Name",
22 | "Description",
23 | "Number of Rows",
24 | "Number of Columns",
25 | "Industry"
26 | ],
27 | "Display Examples Columns":"",
28 | "Description":"MUSE seeks to make significant advances in the way software is built, debugged, verified, maintained, and understood. The goal is to apply the principles of big data analytics to identify and understand deep commonalities among the constantly evolving corpus of software drawn from the hundreds of billions of lines of open source code available today. The program aims to treat programs--more precisely, facts about programs--as data, discovering new relationships (enclaves) among this 'big code' to build better, more robust software. Central to MUSE's approach is the creation of a community infrastructure that would incorporate a continuously operational specification-mining engine. This engine would leverage deep program analyses and foundational ideas underlying big data analytics to populate and refine a database containing inferences about salient properties, behaviors and vulnerabilities of the program components in the corpus.",
29 | "Program Manager Link":"http://www.darpa.mil/staff/dr-suresh-jagannathan",
30 | "Program Manager":"Dr. Suresh Jagannathan",
31 | "Program Manager Email":"suresh.jagannathan@darpa.mil",
32 | "Image":"MUSE-image.jpg"
33 | }
--------------------------------------------------------------------------------
/MUSE-pubs.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program": "MUSE",
4 | "Program Teams": [
5 | "University of Colorado Boulder",
6 | "University of Pennsylvania"
7 | ],
8 | "Title": "Synthesis through Unification",
9 | "Authors": [
10 | "Rajeev Alur",
11 | "Pavol Cerny",
12 | "Arjun Radhakrishna"
13 | ],
14 | "Link": "http://link.springer.com/chapter/10.1007%2F978-3-319-21668-3_10",
15 | "Categories": [
16 | "Software Notations and Tools"
17 | ],
18 | "Subcategories": [
19 | ""
20 | ],
21 | "ACM 1998 classification code": [
22 | "D.2.4"
23 | ],
24 | "New Date": "20160323",
25 | "Update Date": ""
26 | },
27 | {
28 | "DARPA Program": "MUSE",
29 | "Program Teams": [
30 | "University of Colorado Boulder",
31 | "Samsung Research America"
32 | ],
33 | "Title": "Selective Control-Flow Abstraction via Jumping",
34 | "Authors": [
35 | "Sam Blackshear",
36 | "Bor-Yuh Evan Chang",
37 | "Manu Sridharan"
38 | ],
39 | "Link": "http://dl.acm.org/citation.cfm?doid=2814270.2814293",
40 | "Categories": [
41 | "Software Notations and Tools"
42 | ],
43 | "Subcategories": [
44 | ""
45 | ],
46 | "ACM 1998 classification code": [
47 | "D.2.4"
48 | ],
49 | "New Date": "20160323",
50 | "Update Date": ""
51 | },
52 | {
53 | "DARPA Program": "MUSE",
54 | "Program Teams": [
55 | "Draper Laboratory"
56 | ],
57 | "Title": "Learning Program Attributes from a Variety of Sources",
58 | "Authors": [
59 | "Peter Chin",
60 | "Jacob Harer",
61 | "Allan McKay",
62 | "Aksahy Rangamani",
63 | "Trac Tran",
64 | "Felipe Vilas-Boas"
65 | ],
66 | "Link": "Not Applicable",
67 | "Categories": [
68 | "Software Architectures",
69 | "Methodology and Techniques"
70 | ],
71 | "Subcategories": [
72 | "Data Abstraction"
73 | ],
74 | "ACM 1998 classification code": [
75 | "D.2.11"
76 | ],
77 | "New Date": "20160323",
78 | "Update Date": ""
79 | },
80 | {
81 | "DARPA Program": "MUSE",
82 | "Program Teams": [
83 | "Georgia Institute of Technology"
84 | ],
85 | "Title": "A User-Guided Approach to Program Analysis",
86 | "Authors": [
87 | "Ravi Mangal",
88 | "Xin Zhang",
89 | "Aditya V. Nori",
90 | "Mayur Naik"
91 | ],
92 | "Link": "http://www.cc.gatech.edu/~naik/pubs/fse15a.pdf",
93 | "Categories": [
94 | "Software Verification"
95 | ],
96 | "Subcategories": [
97 | ""
98 | ],
99 | "ACM 1998 classification code": [
100 | "D.2.4"
101 | ],
102 | "New Date": "20160323",
103 | "Update Date": ""
104 | },
105 | {
106 | "DARPA Program": "MUSE",
107 | "Program Teams": [
108 | "Georgia Institute of Technology"
109 | ],
110 | "Title": "Volt: A Lazy Grounding Framework for Solving Very Large MaxSAT Instances",
111 | "Authors": [
112 | "Ravi Mangal",
113 | "Xin Zhang",
114 | "Aditya V. Nori",
115 | "Mayur Naik"
116 | ],
117 | "Link": "http://www.cc.gatech.edu/~naik/pubs/sat15.pdf",
118 | "Categories": [
119 | "Optimization"
120 | ],
121 | "Subcategories": [
122 | "Constrained optimization"
123 | ],
124 | "ACM 1998 classification code": [
125 | "G.1.6"
126 | ],
127 | "New Date": "20160323",
128 | "Update Date": ""
129 | },
130 | {
131 | "DARPA Program": "MUSE",
132 | "Program Teams": [
133 | "Georgia Institute of Technology"
134 | ],
135 | "Title": "Query-Guided Maximum Satisfiability",
136 | "Authors": [
137 | "Xin Zhang",
138 | "Ravi Mangal",
139 | "Aditya V. Nori",
140 | "Mayur Naik"
141 | ],
142 | "Link": "http://www.cc.gatech.edu/~naik/pubs/popl16.pdf",
143 | "Categories": [
144 | "Optimization"
145 | ],
146 | "Subcategories": [
147 | "Constrained optimization"
148 | ],
149 | "ACM 1998 classification code": [
150 | "G.1.6"
151 | ],
152 | "New Date": "20160323",
153 | "Update Date": ""
154 | },
155 | {
156 | "DARPA Program": "MUSE",
157 | "Program Teams": [
158 | "Georgia Institute of Technology"
159 | ],
160 | "Title": "Scaling Relational Inference Using Proofs and Refutations",
161 | "Authors": [
162 | "Ravi Mangal",
163 | "Xin Zhang",
164 | "Aditya Kamath",
165 | "Aditya V. Nori",
166 | "Mayur Naik"
167 | ],
168 | "Link": "http://www.cc.gatech.edu/~naik/pubs/aaai16.pdf",
169 | "Categories": [
170 | "Optimization",
171 | "Probability and statistics",
172 | "Knowledge Representation Formalisms and Methods",
173 | "Learning"
174 | ],
175 | "Subcategories": [
176 | "Constrained optimization",
177 | "Relation systems"
178 | ],
179 | "ACM 1998 classification code": [
180 | "G.1.6",
181 | "G.3",
182 | "I.2.4",
183 | "I.2.6"
184 | ],
185 | "New Date": "20160323",
186 | "Update Date": ""
187 | },
188 | {
189 | "DARPA Program": "MUSE",
190 | "Program Teams": [
191 | "Kestrel Institute"
192 | ],
193 | "Title": "Second-Order Functions and Theorems in ACL2",
194 | "Authors": [
195 | "Alessandro Coglio"
196 | ],
197 | "Link": "http://eptcs.web.cse.unsw.edu.au/paper.cgi?ACL22015.3.pdf",
198 | "Categories": [
199 | "Software Notations and Tools"
200 | ],
201 | "Subcategories": [
202 | "Formal Methods",
203 | "Formal Software Verification"
204 | ],
205 | "ACM 1998 classification code": [
206 | "D.2.4",
207 | "I.2.3"
208 | ],
209 | "New Date": "20160323",
210 | "Update Date": ""
211 | },
212 | {
213 | "DARPA Program": "MUSE",
214 | "Program Teams": [
215 | "MIT CSAIL"
216 | ],
217 | "Title": "Automatic Patch Generation by Learning Correct Code",
218 | "Authors": [
219 | "Fan Long",
220 | "Martin Rinard"
221 | ],
222 | "Link": "http://people.csail.mit.edu/fanl/papers/prophet-popl16.pdf",
223 | "Categories": [
224 | "Semantics of Programming Languages",
225 | "SOFTWARE ENGINEERING"
226 | ],
227 | "Subcategories": [
228 | "Program Analysis",
229 | "Testing and Debugging"
230 | ],
231 | "ACM 1998 classification code": [
232 | "F.3.2",
233 | "D.2.5"
234 | ],
235 | "New Date": "20160323",
236 | "Update Date": ""
237 | },
238 | {
239 | "DARPA Program": "MUSE",
240 | "Program Teams": [
241 | "MIT CSAIL"
242 | ],
243 | "Title": "Staged Program Repair with Condition Synthesis",
244 | "Authors": [
245 | "Fan Long",
246 | "Martin Rinard"
247 | ],
248 | "Link": "http://people.csail.mit.edu/fanl/papers/spr-fse15.pdf",
249 | "Categories": [
250 | "Semantics of Programming Languages",
251 | "SOFTWARE ENGINEERING"
252 | ],
253 | "Subcategories": [
254 | "Program Analysis",
255 | "Testing and Debugging"
256 | ],
257 | "ACM 1998 classification code": [
258 | "F.3.2",
259 | "D.2.5"
260 | ],
261 | "New Date": "20160323",
262 | "Update Date": ""
263 | },
264 | {
265 | "DARPA Program": "MUSE",
266 | "Program Teams": [
267 | "University of Wisconsin-Madison"
268 | ],
269 | "Title": "Newtonian Program Analysis Via Tensor Product",
270 | "Authors": [
271 | "Thomas Reps",
272 | "Emma Turetsky",
273 | "Prathmesh Prabhu"
274 | ],
275 | "Link": "http://www.cs.wisc.edu/wpis/papers/popl16.pdf",
276 | "Categories": [
277 | "Program Analysis",
278 | "Abstract Interpretation"
279 | ],
280 | "Subcategories": [
281 | "Newton's method",
282 | "polynomial fixed-point equation",
283 | "interprocedural program analysis",
284 | "semiring",
285 | "regular expression",
286 | "tensor product"
287 | ],
288 | "ACM 1998 classification code": [
289 | "D.2.4",
290 | "F.3.1",
291 | "F.3.2",
292 | "F.4.2",
293 | "F.4.3"
294 | ],
295 | "New Date": "20160323",
296 | "Update Date": ""
297 | },
298 | {
299 | "DARPA Program": "MUSE",
300 | "Program Teams": [
301 | "Rice University"
302 | ],
303 | "Title": "Learning to Grade Student Programs in a Massive Open Online Course",
304 | "Authors": [
305 | "Anna Drummond",
306 | "Yanxin Lu",
307 | "Swarat Chaudhuri",
308 | "Chris Jermaine",
309 | "Joe Warren",
310 | "Scott Rixner"
311 | ],
312 | "Link": "http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=7023401&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D7023401",
313 | "Categories": [
314 | "Databases",
315 | "Online Education"
316 | ],
317 | "Subcategories": [
318 | "Data Mining"
319 | ],
320 | "ACM 1998 classification code": [
321 | "H.2.8"
322 | ],
323 | "New Date": "20160323",
324 | "Update Date": ""
325 | }
326 | ]
--------------------------------------------------------------------------------
/PLANX-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"PLAN X",
4 | "Long Name":"PLAN X",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/plan-x",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Description",
11 | "Category",
12 | "Code",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"Plan X is a foundational cyberwarfare program to develop platforms for the Department of Defense to plan for, conduct, and assess cyberwarfare in a manner similar to kinetic warfare. Toward this end the program will bridge cyber communities of interest from academe, to the defense industrial base, to the commercial tech industry, to user-experience experts.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/mr-frank-pound",
26 | "Program Manager":"Mr. Frank Pound",
27 | "Program Manager Email":"frank.pound@darpa.mil",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/PPAML-image.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/PPAML-image.jpg
--------------------------------------------------------------------------------
/PPAML-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"PPAML",
4 | "Long Name":"Probabilistic Programming for Advancing Machine Learning (PPAML)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/probabilistic-programming-for-advancing-machine-Learning",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"Machine learning - the ability of computers to understand data, manage results and infer insights from uncertain information - is the force behind many recent revolutions in computing. Email spam filters, smartphone personal assistants and self-driving vehicles are all based on research advances in machine learning. Unfortunately, even as the demand for these capabilities is accelerating, every new application requires a Herculean effort. Teams of hard-to-find experts must build expensive, custom tools that are often painfully slow and can perform unpredictably against large, complex data sets.The Probabilistic Programming for Advancing Machine Learning (PPAML) program aims to address these challenges. Probabilistic programming is a new programming paradigm for managing uncertain information. Using probabilistic programming languages, PPAML seeks to greatly increase the number of people who can successfully build machine learning applications and make machine learning experts radically more effective. Moreover, the program seeks to create more economical, robust and powerful applications that need less data to produce more accurate results - features inconceivable with today's technology.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-suresh-jagannathan",
26 | "Program Manager":"Dr. Suresh Jagannathan",
27 | "Program Manager Email":"suresh.jagannathan@darpa.mil",
28 | "Image":"PPAML-image.jpg"
29 | }
--------------------------------------------------------------------------------
/PPAML-pubs.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program": "PPAML",
4 | "Program Teams": [
5 | "Charles River Analytics"
6 | ],
7 | "Title": "Hierarchical Reasoning with Probabilistic Programming",
8 | "Authors": [
9 | ""
10 | ],
11 | "Link": "Not Yet Published",
12 | "Categories": [
13 | ""
14 | ],
15 | "Subcategories": [
16 | ""
17 | ],
18 | "ACM 1998 classification code": [
19 | ""
20 | ],
21 | "New Date": "2014-06-20",
22 | "Update Date": ""
23 | },
24 | {
25 | "DARPA Program": "PPAML",
26 | "Program Teams": [
27 | "Indiana University"
28 | ],
29 | "Title": "Designing a MCMC Library for Probabilistic Programming",
30 | "Authors": [
31 | ""
32 | ],
33 | "Link": "Not Yet Published",
34 | "Categories": [
35 | ""
36 | ],
37 | "Subcategories": [
38 | ""
39 | ],
40 | "ACM 1998 classification code": [
41 | ""
42 | ],
43 | "New Date": "2014-06-20",
44 | "Update Date": ""
45 | },
46 | {
47 | "DARPA Program": "PPAML",
48 | "Program Teams": [
49 | "MIT"
50 | ],
51 | "Title": "Approximate Bayesian Image Interpretation using Generative Probabilistic Graphics Programs",
52 | "Authors": [
53 | ""
54 | ],
55 | "Link": "http://papers.nips.cc/paper/4881-approximate-bayesian-image-interpretation-using-generative-probabilistic-graphics-programs.pdf",
56 | "Categories": [
57 | ""
58 | ],
59 | "Subcategories": [
60 | ""
61 | ],
62 | "ACM 1998 classification code": [
63 | ""
64 | ],
65 | "New Date": "2014-06-20",
66 | "Update Date": ""
67 | },
68 | {
69 | "DARPA Program": "PPAML",
70 | "Program Teams": [
71 | "MIT"
72 | ],
73 | "Title": "A New Approach to Probabilistic Programming Inference ",
74 | "Authors": [
75 | ""
76 | ],
77 | "Link": "http://www.robots.ox.ac.uk/~fwood/assets/pdf/Wood-AISTATS-2014.pdf",
78 | "Categories": [
79 | ""
80 | ],
81 | "Subcategories": [
82 | ""
83 | ],
84 | "ACM 1998 classification code": [
85 | ""
86 | ],
87 | "New Date": "2014-06-20",
88 | "Update Date": ""
89 | },
90 | {
91 | "DARPA Program": "PPAML",
92 | "Program Teams": [
93 | "MIT"
94 | ],
95 | "Title": "Building Fast Bayesian Computing Machines out of Intentionally Stochastic, Digital Parts",
96 | "Authors": [
97 | ""
98 | ],
99 | "Link": "http://arxiv.org/pdf/1402.4914.pdf",
100 | "Categories": [
101 | ""
102 | ],
103 | "Subcategories": [
104 | ""
105 | ],
106 | "ACM 1998 classification code": [
107 | ""
108 | ],
109 | "New Date": "2014-06-20",
110 | "Update Date": ""
111 | },
112 | {
113 | "DARPA Program": "PPAML",
114 | "Program Teams": [
115 | "MIT"
116 | ],
117 | "Title": "Venture: a Higher-order Probabilistic Programming Platform with Programmable Inference",
118 | "Authors": [
119 | ""
120 | ],
121 | "Link": "http://arxiv.org/pdf/1404.0099.pdf",
122 | "Categories": [
123 | ""
124 | ],
125 | "Subcategories": [
126 | ""
127 | ],
128 | "ACM 1998 classification code": [
129 | ""
130 | ],
131 | "New Date": "2014-06-20",
132 | "Update Date": ""
133 | },
134 | {
135 | "DARPA Program": "PPAML",
136 | "Program Teams": [
137 | "Princeton University"
138 | ],
139 | "Title": "Bayesian Nonparametric Poisson Factorization for Recommendation Systems",
140 | "Authors": [
141 | ""
142 | ],
143 | "Link": "http://www.cs.princeton.edu/~blei/papers/GopalanRuizRanganathBlei2014.pdf",
144 | "Categories": [
145 | ""
146 | ],
147 | "Subcategories": [
148 | ""
149 | ],
150 | "ACM 1998 classification code": [
151 | ""
152 | ],
153 | "New Date": "2014-06-20",
154 | "Update Date": ""
155 | },
156 | {
157 | "DARPA Program": "PPAML",
158 | "Program Teams": [
159 | "Princeton University"
160 | ],
161 | "Title": "Black box variational inference",
162 | "Authors": [
163 | ""
164 | ],
165 | "Link": "http://arxiv.org/pdf/1401.0118v1.pdf",
166 | "Categories": [
167 | ""
168 | ],
169 | "Subcategories": [
170 | ""
171 | ],
172 | "ACM 1998 classification code": [
173 | ""
174 | ],
175 | "New Date": "2014-06-20",
176 | "Update Date": ""
177 | },
178 | {
179 | "DARPA Program": "PPAML",
180 | "Program Teams": [
181 | "Princeton University"
182 | ],
183 | "Title": "Build, Compute, Critique, Repeat: Data Analysis with Latent Variable Models ",
184 | "Authors": [
185 | ""
186 | ],
187 | "Link": "http://www.annualreviews.org/doi/pdf/10.1146/annurev-statistics-022513-115657",
188 | "Categories": [
189 | ""
190 | ],
191 | "Subcategories": [
192 | ""
193 | ],
194 | "ACM 1998 classification code": [
195 | ""
196 | ],
197 | "New Date": "2014-06-20",
198 | "Update Date": ""
199 | },
200 | {
201 | "DARPA Program": "PPAML",
202 | "Program Teams": [
203 | "Princeton University"
204 | ],
205 | "Title": "The Inverse Regression Topic Model",
206 | "Authors": [
207 | ""
208 | ],
209 | "Link": "http://www.cs.princeton.edu/~blei/papers/RabinovichBlei2014.pdf\n\n\n\n\n\n\n",
210 | "Categories": [
211 | ""
212 | ],
213 | "Subcategories": [
214 | ""
215 | ],
216 | "ACM 1998 classification code": [
217 | ""
218 | ],
219 | "New Date": "2014-06-20",
220 | "Update Date": ""
221 | },
222 | {
223 | "DARPA Program": "PPAML",
224 | "Program Teams": [
225 | "University of Texas - Dallas"
226 | ],
227 | "Title": "Lifted MAP Inference for Markov Logic Networks",
228 | "Authors": [
229 | ""
230 | ],
231 | "Link": "http://www.hlt.utdallas.edu/~vgogate/papers/aistats14-1.pdf",
232 | "Categories": [
233 | ""
234 | ],
235 | "Subcategories": [
236 | ""
237 | ],
238 | "ACM 1998 classification code": [
239 | ""
240 | ],
241 | "New Date": "2014-06-20",
242 | "Update Date": ""
243 | },
244 | {
245 | "DARPA Program": "PPAML",
246 | "Program Teams": [
247 | "University of Texas - Dallas"
248 | ],
249 | "Title": "Loopy Belief Propagation in the Presence of Determinism",
250 | "Authors": [
251 | ""
252 | ],
253 | "Link": "http://www.hlt.utdallas.edu/~vgogate/papers/aistats14-2.pdf",
254 | "Categories": [
255 | ""
256 | ],
257 | "Subcategories": [
258 | ""
259 | ],
260 | "ACM 1998 classification code": [
261 | ""
262 | ],
263 | "New Date": "2014-06-20",
264 | "Update Date": ""
265 | },
266 | {
267 | "DARPA Program": "PPAML",
268 | "Program Teams": [
269 | "University of California - Irvine"
270 | ],
271 | "Title": "Marginal Structured SVM with Hidden Variables",
272 | "Authors": [
273 | ""
274 | ],
275 | "Link": "Not Yet Published",
276 | "Categories": [
277 | ""
278 | ],
279 | "Subcategories": [
280 | ""
281 | ],
282 | "ACM 1998 classification code": [
283 | ""
284 | ],
285 | "New Date": "2014-06-20",
286 | "Update Date": ""
287 | },
288 | {
289 | "DARPA Program": "PPAML",
290 | "Program Teams": [
291 | "University of California - Berkeley"
292 | ],
293 | "Title": "Unifying Logic and Probability: Recent Developments",
294 | "Authors": [
295 | ""
296 | ],
297 | "Link": "Not Yet Published",
298 | "Categories": [
299 | ""
300 | ],
301 | "Subcategories": [
302 | ""
303 | ],
304 | "ACM 1998 classification code": [
305 | ""
306 | ],
307 | "New Date": "2014-06-20",
308 | "Update Date": ""
309 | },
310 | {
311 | "DARPA Program": "PPAML",
312 | "Program Teams": [
313 | "University of California - Riverside"
314 | ],
315 | "Title": "Deterministic Anytime Inference for Stochastic Continuous-Time Markov Processes",
316 | "Authors": [
317 | ""
318 | ],
319 | "Link": "http://www.cs.ucr.edu/~cshelton/papers/index.cgi?CelShe14",
320 | "Categories": [
321 | ""
322 | ],
323 | "Subcategories": [
324 | ""
325 | ],
326 | "ACM 1998 classification code": [
327 | ""
328 | ],
329 | "New Date": "2014-06-20",
330 | "Update Date": ""
331 | }
332 | ]
333 |
--------------------------------------------------------------------------------
/PROCEED-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"PROCEED",
4 | "Long Name":"PROgramming Computation on EncryptEd Data (PROCEED)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/programming-computation-on-encrypted-data",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"DARPA's Programming Computation on Encrypted Data (PROCEED) program is a research effort that seeks to develop methods that allow computing with encrypted data without first decrypting that data, making it possible to compute more securely in untrusted environments.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-john-launchbury",
26 | "Program Manager":"Dr. John Launchbury",
27 | "Program Manager Email":"john.launchbury@darpa.mil",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/RATS-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"RATS",
4 | "Long Name":"Robust Automatic Transcription of Speech (RATS)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/robust-atuomatic-transcription-of-speech",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The Robust Automatic Transcription of Speech (RATS) program will create algorithms and software for performing the following tasks on potentially speech-containing signals received over communication channels that are extremely noisy and/or highly distorted: speech activity detection, language identification, speaker identification, and key word spotting.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-david-doermann",
26 | "Program Manager":"Dr. David Doermann",
27 | "Program Manager Email":"david.doermann@darpa.mil"
28 | }
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | darpa_open_catalog
2 | ==================
3 |
4 | # This site is no longer in use, please contact your DARPA program manager to post content to the DARPA Open Catalog.
5 |
6 |
7 | The former data collaboration repository for the DARPA open catalog project.
8 |
9 | Here is the code that turns this into a web page and generates code statistics:
10 |
11 | https://github.com/ericwhyne/open-catalog-generator
12 |
13 | The web page:
14 |
15 | http://opencatalog.darpa.mil/
16 |
17 | License:
18 |
19 | http://creativecommons.org/licenses/by/4.0/
20 |
21 |
--------------------------------------------------------------------------------
/RP-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"BTO",
3 | "DARPA Program Name":"Revolutionizing Prosthetics",
4 | "Long Name":"Revolutionizing Prosthetics",
5 | "Program Teams":[
6 | "DEKA Integrated Solutions, Inc.",
7 | "The Johns Hopkins University Applied Physics Lab",
8 | "University of Chicago",
9 | "Purdue University",
10 | "University of Pittsburgh Medical Center",
11 | "California Institute of Technology"
12 | ],
13 | "Link":"http://www.darpa.mil/program/revolutionizing-prosthetics",
14 | "Display Software Columns":[
15 | "Team",
16 | "Project",
17 | "Description",
18 | "Instructional Material",
19 | "Category",
20 | "Code",
21 | "Stats",
22 | "License"
23 | ],
24 | "Display Pubs Columns":[
25 | "Team",
26 | "Title",
27 | "Link"
28 | ],
29 | "Display Data Columns":[
30 | ""
31 | ],
32 | "Display Examples Columns":"",
33 | "Description":"DARPA launched the Revolutionizing Prosthetics program with a radical goal: Create an advanced electromechanical prosthetic upper limb with near-natural control that enhances independence and improves quality of life for amputees, and gain U.S. Food and Drug Administration (FDA) approval for its use. In May 2014, less than eight years after the effort was launched, that dream is a reality; the FDA approved the DEKA Arm System.",
34 | "Program Manager Link":"http://www.darpa.mil/staff/dr-justin-sanchez",
35 | "Program Manager":"Dr. Justin Sanchez",
36 | "Program Manager Email":"justin.sanchez@darpa.mil",
37 | "Image":"Revolutionizing-Prosthetics-image.jpg"
38 | }
--------------------------------------------------------------------------------
/RP-pubs.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program": "Revolutionizing Prosthetics",
4 | "Program Teams": [
5 | "University of Chicago"
6 | ],
7 | "Title": "Biological and Bionic Hands: Natural Neural Coding and Artificial Perception",
8 | "Authors": [
9 | "Sliman J. Bensmaia"
10 | ],
11 | "Link": "http://rstb.royalsocietypublishing.org/content/370/1677/20140209",
12 | "Categories": [
13 | "Human-centered computing"
14 | ],
15 | "Subcategories": [
16 | "Human computer interaction",
17 | "HCI design and evaluation methods",
18 | "Interaction devices",
19 | "HCI theory",
20 | "concepts and models"
21 | ],
22 | "ACM 1998 classification code": [
23 | "J.3",
24 | "I.6.5"
25 | ],
26 | "New Date": "20150805",
27 | "Update Date": ""
28 | },
29 | {
30 | "DARPA Program": "RP",
31 | "Program Teams": [
32 | "The Johns Hopkins University Applied Physics Lab",
33 | "University of Chicago",
34 | "Purdue University",
35 | "University of Pittsburgh"
36 | ],
37 | "Title": "The Effect of Chronic Intracortical Microstimulation on the Electrode-Tissue Interface",
38 | "Authors": [
39 | "Kevin H. Chen",
40 | "John F. Fammann",
41 | "Jessica L. Boback",
42 | "Francesco V. Tenore",
43 | "Kevin J. Otto",
44 | "Robert A. Gaunt",
45 | "Sliman J. Bensmaia"
46 | ],
47 | "Link": "http://dx.doi.org/10.1088/1741-2560/11/2/026004",
48 | "Categories": [
49 | ""
50 | ],
51 | "Subcategories": [
52 | ""
53 | ],
54 | "ACM 1998 classification code": [
55 | ""
56 | ],
57 | "New Date": "20140724",
58 | "Update Date": ""
59 | },
60 | {
61 | "DARPA Program": "RP",
62 | "Program Teams": [
63 | "The Johns Hopkins University Applied Physics Lab",
64 | "University of Chicago"
65 | ],
66 | "Title": "Restoring the Sense of Touch with a Prosthetic Hand through a Brain Interface",
67 | "Authors": [
68 | "Gregg A. Tabot",
69 | "John F. Dammann",
70 | "Joshua A. Berg",
71 | "Francesco V. Tenore",
72 | "Jessica L. Boback",
73 | "R. Jacob Vogelstein",
74 | "Sliman J. Bensmaia"
75 | ],
76 | "Link": "http://dx.doi.org/10.1073/pnas.1221113110",
77 | "Categories": [
78 | ""
79 | ],
80 | "Subcategories": [
81 | ""
82 | ],
83 | "ACM 1998 classification code": [
84 | ""
85 | ],
86 | "New Date": "20140724",
87 | "Update Date": ""
88 | },
89 | {
90 | "DARPA Program": "RP",
91 | "Program Teams": [
92 | "The Johns Hopkins University Applied Physics Lab"
93 | ],
94 | "Title": "Experimental Validation of Imposed Safety Regions for Neural Controlled Human Patient Self-feeding using the Modular Prosthetic Limb",
95 | "Authors": [
96 | "Brock A. Wester",
97 | "Matthew P. Para",
98 | "Ashok Sivakumar",
99 | "Michael D. Kutzer",
100 | "Kapil D. Katyal",
101 | "Alan D. Ravitz",
102 | "James D. Beaty",
103 | "Michael P. McLoughlin",
104 | "Matthew S. Johannes"
105 | ],
106 | "Link": "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6696454&tag=1",
107 | "Categories": [
108 | ""
109 | ],
110 | "Subcategories": [
111 | ""
112 | ],
113 | "ACM 1998 classification code": [
114 | ""
115 | ],
116 | "New Date": "20140724",
117 | "Update Date": ""
118 | },
119 | {
120 | "DARPA Program": "RP",
121 | "Program Teams": [
122 | "University of Pittsburgh"
123 | ],
124 | "Title": "High-performance Neuroprosthetic Control by an Individual with Tetraplegia",
125 | "Authors": [
126 | "Jennifer L. Collinger",
127 | "Brian Wodlinger",
128 | "John E. Downey",
129 | "Wei Wang",
130 | "Elizabeth C Tyler-Kabara",
131 | "Douglas J Weber",
132 | "Angus JC McMorland",
133 | "Meel Velliste",
134 | "Michael L Boninger",
135 | "Andrew B Schwartz"
136 | ],
137 | "Link": "http://dx.doi.org/10.1016/S0140-6736(12)61816-9",
138 | "Categories": [
139 | ""
140 | ],
141 | "Subcategories": [
142 | ""
143 | ],
144 | "ACM 1998 classification code": [
145 | ""
146 | ],
147 | "New Date": "20140724",
148 | "Update Date": ""
149 | }
150 | ]
151 |
--------------------------------------------------------------------------------
/Revolutionizing-Prosthetics-image.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/Revolutionizing-Prosthetics-image.jpg
--------------------------------------------------------------------------------
/SAFER-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"SAFER",
4 | "Long Name":"Safer Warfighter Communications (SAFER)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/safer-warfighter-communications",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The SAFER program seeks to develop technology to enable safe, resilient communications over the Internet, particularly in situations in which third parties attempt to discover the identity or location of the end users, or block communications. The program also seeks to provide the technological quality of service required to support applications such as electronic mail, instant messaging, voice over IP, and other media that promote effective communication.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/mr-michael-walker",
26 | "Program Manager":"Mr. Michael Walker",
27 | "Program Manager Email":"michael.walker@darpa.mil",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/SMISC-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"SMISC",
4 | "Long Name":"Social Media in Strategic Communication (SMISC)",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/social-media-in-strategic-communication",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Category",
11 | "Code",
12 | "Description",
13 | "License"
14 | ],
15 | "Display Pubs Columns":[
16 | "Team",
17 | "Title",
18 | "Link"
19 | ],
20 | "Display Data Columns":[
21 | ""
22 | ],
23 | "Display Examples Columns":"",
24 | "Description":"The general goal of the Social Media in Strategic Communication (SMISC) program is to develop a new science of social networks built on an emerging technology base. Through the program, DARPA seeks to develop tools to support the efforts of human operators to counter misinformation or deception campaigns with truthful information.",
25 | "Program Manager Link":"http://www.darpa.mil/staff/dr-michael-hsieh",
26 | "Program Manager":"Dr. Michael Hsieh",
27 | "Program Manager Email":"michael.hsieh@darpa.mil",
28 | "Image":""
29 | }
--------------------------------------------------------------------------------
/SystemF6-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"TTO",
3 | "DARPA Program Name":"System F6",
4 | "Long Name":"System F6",
5 | "Program Teams":[
6 | "Vanderbilt University"
7 | ],
8 | "Link":"http://www.darpa.mil/program/system-f6",
9 | "Display Software Columns":[
10 | "Team",
11 | "Project",
12 | "Description",
13 | "Category",
14 | "License"
15 | ],
16 | "Display Pubs Columns":[
17 | "Team",
18 | "Title",
19 | "Link"
20 | ],
21 | "Display Data Columns":[
22 | ""
23 | ],
24 | "Display Examples Columns":"",
25 | "Description":"System F6 seeks to demonstrate the feasibility and benefits of a satellite architecture wherein the functionality of a traditional ?monolithic? spacecraft is delivered by a cluster of wirelessly interconnected modules capable of sharing their resources and utilizing resources found elsewhere in the cluster. Such architecture enhances the adaptability and survivability of space systems, while shortening development timelines and reducing the barrier-to-entry for participation in the national security space industry.",
26 | "Program Manager Link":"http://www.darpa.mil/staff/dr-lindsay-millard",
27 | "Program Manager":"Dr. Lindsay Millard",
28 | "Program Manager Email":"lindsay.millard@darpa.mil",
29 | "Image":"F6-image.jpg"
30 | }
--------------------------------------------------------------------------------
/SystemF6-pubs.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program": "System F6",
4 | "Program Teams": [
5 | "Emergent Space Technologies"
6 | ],
7 | "Title": "Simulated Annealing Maneuver Planner For Cluster Flight",
8 | "Authors": [
9 | "Allen Brown",
10 | "Matthew Ruschmann",
11 | "Brent Duffy",
12 | "Lucas Ward",
13 | "Sun Hur-Diaz",
14 | "Eric Ferguson",
15 | "Shaun Stewart"
16 | ],
17 | "Link": "http://www.emergentspace.com/assets/1/7/ISSFD24_Paper_S16-1_Brown.pdf",
18 | "Categories": [
19 | "Applications and Expert Systems",
20 | "Methodology and Techniques",
21 | "Optimization",
22 | "Software Architectures"
23 | ],
24 | "Subcategories": [
25 | ""
26 | ],
27 | "ACM 1998 classification code": [
28 | "J.2",
29 | "I.2.8",
30 | "G.4",
31 | "G.1.6",
32 | "F.2.1"
33 | ],
34 | "New Date": "20150326",
35 | "Update Date": ""
36 | },
37 | {
38 | "DARPA Program": "System F6",
39 | "Program Teams": [
40 | "Emergent Space Technologies"
41 | ],
42 | "Title": "Scatter Strategies for Cluster Flight",
43 | "Authors": [
44 | "Allen Brown",
45 | "Matthew Ruschmann",
46 | "Brent Duffy",
47 | "Lucas Ward"
48 | ],
49 | "Link": "http://www.emergentspace.com/assets/1/7/ISSFD24_Paper_S9-2_duffy.pdf",
50 | "Categories": [
51 | "Applications and Expert Systems",
52 | "Methodology and Techniques",
53 | "Optimization"
54 | ],
55 | "Subcategories": [
56 | ""
57 | ],
58 | "ACM 1998 classification code": [
59 | "J.2",
60 | "I.2.8",
61 | "G.4",
62 | "G.1.6",
63 | "F.2.1"
64 | ],
65 | "New Date": "20150326",
66 | "Update Date": ""
67 | },
68 | {
69 | "DARPA Program": "System F6",
70 | "Program Teams": [
71 | "Emergent Space Technologies"
72 | ],
73 | "Title": "Cluster Flight Application on System F6",
74 | "Authors": [
75 | "Sun Hur-Diaz",
76 | "Brendan O'Connor"
77 | ],
78 | "Link": "http://www.emergentspace.com/assets/1/7/ISSFD24_Paper_S9-3_Hur-Diaz.pdf",
79 | "Categories": [
80 | "Applications and Expert Systems",
81 | "Methodology and Techniques",
82 | "Optimization",
83 | "Probabilistic Algorithms",
84 | "Software Architectures"
85 | ],
86 | "Subcategories": [
87 | ""
88 | ],
89 | "ACM 1998 classification code": [
90 | "J.2",
91 | "I.2.8",
92 | "G.4",
93 | "G.3",
94 | "G.1.6",
95 | "F.2.1",
96 | "D.2.11",
97 | "I.2.9"
98 | ],
99 | "New Date": "20150326",
100 | "Update Date": ""
101 | },
102 | {
103 | "DARPA Program": "System F6",
104 | "Program Teams": [
105 | "Emergent Space Technologies"
106 | ],
107 | "Title": "Efficient Station Keeping for Cluster Flight",
108 | "Authors": [
109 | "Matthew Ruschmann",
110 | "Brent Duffy",
111 | "Rafael de la Torre",
112 | "Sun Hur-Diaz"
113 | ],
114 | "Link": "http://www.emergentspace.com/assets/1/7/ISSFD24_Paper_P_ruschmann.pdf",
115 | "Categories": [
116 | "Applications and Expert Systems",
117 | "Methodology and Techniques",
118 | "Optimization"
119 | ],
120 | "Subcategories": [
121 | ""
122 | ],
123 | "ACM 1998 classification code": [
124 | "J.2",
125 | "I.2.8",
126 | "G.4",
127 | "G.1.6",
128 | "F.2.1"
129 | ],
130 | "New Date": "20150326",
131 | "Update Date": ""
132 | },
133 | {
134 | "DARPA Program": "System F6",
135 | "Program Teams": [
136 | "Emergent Space Technologies"
137 | ],
138 | "Title": "Satellite Cluster Flight Design Considerations",
139 | "Authors": [
140 | "Jason Schmidt",
141 | "Mike Phillips",
142 | "Matthew Ruschmann"
143 | ],
144 | "Link": "http://www.emergentspace.com/assets/1/7/ISSFD24_Paper_S16-5_Schmidt.pdf",
145 | "Categories": [
146 | "Methodology and Techniques",
147 | "Optimization"
148 | ],
149 | "Subcategories": [
150 | ""
151 | ],
152 | "ACM 1998 classification code": [
153 | "J.2",
154 | "G.4",
155 | "G.1.6",
156 | "F.2.1"
157 | ],
158 | "New Date": "20150326",
159 | "Update Date": ""
160 | },
161 | {
162 | "DARPA Program": "System F6",
163 | "Program Teams": [
164 | "Emergent Space Technologies"
165 | ],
166 | "Title": "Distributed GN&C Flight Software Simulation for Spacecraft Cluster Flight",
167 | "Authors": [
168 | "Shaun Stewart",
169 | "Lucas Ward",
170 | "Stacey Strand"
171 | ],
172 | "Link": "http://www.emergentspace.com/assets/1/7/AAS_14_032_sstewart.pdf",
173 | "Categories": [
174 | "Applications and Expert Systems",
175 | "Methodology and Techniques",
176 | "Software Architectures",
177 | "Model Validation and Analysis"
178 | ],
179 | "Subcategories": [
180 | ""
181 | ],
182 | "ACM 1998 classification code": [
183 | "J.2",
184 | "G.4",
185 | "F.2.1",
186 | "D.2.4",
187 | "D.2.11"
188 | ],
189 | "New Date": "20150326",
190 | "Update Date": ""
191 | },
192 | {
193 | "DARPA Program": "System F6",
194 | "Program Teams": [
195 | "Emergent Space Technologies"
196 | ],
197 | "Title": "Computing Collision Probability Using Linear Covariance and Unscented Transforms",
198 | "Authors": [
199 | "Sun Hur-Diaz",
200 | "Matthew Ruschmann",
201 | "Martin Heyne",
202 | "Mike Phillips"
203 | ],
204 | "Link": "http://www.emergentspace.com/assets/1/7/AIAA_GNC_2013_Pc_Lincov_Unscented_1665138.pdf",
205 | "Categories": [
206 | "Applications and Expert Systems",
207 | "Methodology and Techniques",
208 | "Probabilistic Algorithms"
209 | ],
210 | "Subcategories": [
211 | ""
212 | ],
213 | "ACM 1998 classification code": [
214 | "J.2",
215 | "G.4",
216 | "G.3",
217 | "F.2.1"
218 | ],
219 | "New Date": "20150326",
220 | "Update Date": ""
221 | },
222 | {
223 | "DARPA Program": "System F6",
224 | "Program Teams": [
225 | "Emergent Space Technologies"
226 | ],
227 | "Title": "On-Board Estimation of Collision Probability for Cluster Flight",
228 | "Authors": [
229 | "Mike Phillips",
230 | "Sun Hur-Diaz"
231 | ],
232 | "Link": "http://www.emergentspace.com/assets/1/7/AAS_13-357.pdf",
233 | "Categories": [
234 | "Applications and Expert Systems",
235 | "Methodology and Techniques",
236 | "Probabilistic Algorithms"
237 | ],
238 | "Subcategories": [
239 | ""
240 | ],
241 | "ACM 1998 classification code": [
242 | "J.2",
243 | "G.4",
244 | "G.3",
245 | "F.2.1"
246 | ],
247 | "New Date": "20150326",
248 | "Update Date": ""
249 | },
250 | {
251 | "DARPA Program": "System F6",
252 | "Program Teams": [
253 | "Emergent Space Technologies"
254 | ],
255 | "Title": "A Distributed, Redundant Navigation and Fault Detection System for DARPA System F6",
256 | "Authors": [
257 | "Jason Schmidt",
258 | "Mike Phillips"
259 | ],
260 | "Link": "http://www.emergentspace.com/assets/1/7/AIAA_13-4963.pdf",
261 | "Categories": [
262 | "Applications and Expert Systems",
263 | "Methodology and Techniques",
264 | "Optimization",
265 | "Probabilistic Algorithms",
266 | "Software Architectures"
267 | ],
268 | "Subcategories": [
269 | ""
270 | ],
271 | "ACM 1998 classification code": [
272 | "J.2",
273 | "G.4",
274 | "G.3",
275 | "F.2.1",
276 | "D.2.11",
277 | "I.2.9"
278 | ],
279 | "New Date": "20150326",
280 | "Update Date": ""
281 | }
282 | ]
--------------------------------------------------------------------------------
/SystemF6-software.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program": "System F6",
4 | "Program Teams": [
5 | "F6IAP Team"
6 | ],
7 | "Contributors": [
8 | "Vanderbilt University"
9 | ],
10 | "Sub-contractors": [
11 | "Object Computing, Inc.",
12 | "Kestrel Institute",
13 | "Remedy IT"
14 | ],
15 | "Software": "DREMS",
16 | "Internal Link": "",
17 | "External Link": "https://drems.isis.vanderbilt.edu/",
18 | "Public Code Repo": "",
19 | "Instructional Material": "",
20 | "Stats": "",
21 | "Description": "DREMS is a complete Information Architecture Platform for building distributed real-time embedded systems. It includes both the run-time components: an operating system, middleware, and services as well as design-time tools: a model-driven development toolchain.",
22 | "Internal Code Repo": "/projects/drems_usr_project/repository",
23 | "License": [
24 | "MIT/X",
25 | "GPL",
26 | "LGPL",
27 | "ACE/TAO License"
28 | ],
29 | "Languages": [
30 | "C",
31 | "C++",
32 | "Python"
33 | ],
34 | "Platform Requirements": [
35 | "x86",
36 | "Linux Ubuntu",
37 | "Windows 7"
38 | ],
39 | "Dependent modules": [
40 | ""
41 | ],
42 | "Dependent module URLs": [
43 | ""
44 | ],
45 | "Component modules": [
46 | ""
47 | ],
48 | "Component module URLs": [
49 | ""
50 | ],
51 | "Industry": [
52 | "Embedded Software"
53 | ],
54 | "Functionality": [
55 | "Platform for Distributed Real-time Embedded Systems",
56 | "Model-driven Development Toolchain"
57 | ],
58 | "Categories": [
59 | "Infrastructure"
60 | ],
61 | "New Date": "20150326",
62 | "Update Date": ""
63 | }
64 | ]
--------------------------------------------------------------------------------
/XDATA-data.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Program":"XDATA",
4 | "Data Set Name":"Twitter",
5 | "Description":"This data set contains 4 million Tweets from Latin America from March to May of 2014. About 11% of the Tweets are geotagged.",
6 | "Number of Rows":"4017233",
7 | "Number of Columns":"19",
8 | "Industry":[
9 | "Social Media"
10 | ],
11 | "New Date":"20150310",
12 | "Update Date":""
13 | }
14 | ]
15 |
--------------------------------------------------------------------------------
/XDATA-examples.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "Application Name":"Fake Application 1",
4 | "Teams":[
5 | "Boeing",
6 | "L-3"
7 | ],
8 | "Description":"A fake example",
9 | "Instructional Material":"http://www.example1.com/demo",
10 | "Link":"http://www.example1.com",
11 | "New Date":"Date approved to go live in yyyymmdd format",
12 | "Update Date":"Date updated with new information in yyyymmdd format"
13 | },
14 | {
15 | "Application Name":"Fake Application 2",
16 | "Teams":[
17 | "UCLA",
18 | "L-3"
19 | ],
20 | "Description":"A fake example",
21 | "Instructional Material":"http://www.example2.com/demo",
22 | "Link":"http://www.example2.com",
23 | "New Date":"Date approved to go live in yyyymmdd format",
24 | "Update Date":"Date updated with new information in yyyymmdd format"
25 | }
26 | ]
27 |
28 |
--------------------------------------------------------------------------------
/XDATA-image.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ericwhyne/darpa_open_catalog/f6f94bdd83abc638eb2b84b95e11a9df1f32cef5/XDATA-image.png
--------------------------------------------------------------------------------
/XDATA-program.json:
--------------------------------------------------------------------------------
1 | {
2 | "DARPA Office":"I2O",
3 | "DARPA Program Name":"XDATA",
4 | "Long Name":"XDATA",
5 | "Program Teams":"",
6 | "Link":"http://www.darpa.mil/program/xdata",
7 | "Display Software Columns":[
8 | "Team",
9 | "Project",
10 | "Description",
11 | "Instructional Material",
12 | "Category",
13 | "Code",
14 | "Stats",
15 | "License"
16 | ],
17 | "Display Pubs Columns":[
18 | "Team",
19 | "Title",
20 | "Link"
21 | ],
22 | "Display Data Columns":[
23 | ""
24 | ],
25 | "Display Examples Columns":[
26 | "Name",
27 | "Team",
28 | "Description",
29 | "Instructional Material",
30 | "Link"
31 | ],
32 | "Description":"XDATA is developing an open source software library for big data to help overcome the challenges of effectively scaling to modern data volume and characteristics. The program is developing the tools and techniques to process and analyze large sets of imperfect, incomplete data. Its programs and publications focus on the areas of analytics, visualization, and infrastructure to efficiently fuse, analyze, and disseminate these large volumes of data.",
33 | "Program Manager Link":"http://www.darpa.mil/staff/mr-wade-shen",
34 | "Program Manager":"Mr. Wade Shen",
35 | "Program Manager Email":"wade.shen@darpa.mil",
36 | "Image":"XDATA-image.png"
37 | }
38 |
--------------------------------------------------------------------------------
/active_content.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Office":"I2O",
4 | "Program Name":"AA",
5 | "Program File":"AA-program.json",
6 | "Pubs File":"AA-pubs.json",
7 | "Software File":"AA-software.json",
8 | "Data File":"",
9 | "Examples File":"",
10 | "Banner":""
11 | },
12 | {
13 | "DARPA Office":"I2O",
14 | "Program Name":"ADAMS",
15 | "Program File":"ADAMS-program.json",
16 | "Pubs File":"ADAMS-pubs.json",
17 | "Software File":"",
18 | "Data File":"",
19 | "Examples File":"",
20 | "Banner":""
21 | },
22 | {
23 | "DARPA Office":"I2O",
24 | "Program Name":"APAC",
25 | "Program File":"APAC-program.json",
26 | "Pubs File":"APAC-pubs.json",
27 | "Software File":"APAC-software.json",
28 | "Data File":"",
29 | "Examples File":"",
30 | "Banner":""
31 | },
32 | {
33 | "DARPA Office":"TTO",
34 | "Program Name":"AVM",
35 | "Program File":"AVM-program.json",
36 | "Pubs File":"",
37 | "Software File":"AVM-software.json",
38 | "Data File":"",
39 | "Examples File":"",
40 | "Banner":"NEW"
41 | },
42 | {
43 | "DARPA Office":"I2O",
44 | "Program Name":"BET",
45 | "Program File":"BET-program.json",
46 | "Pubs File":"BET-pubs.json",
47 | "Software File":"",
48 | "Data File":"",
49 | "Examples File":"",
50 | "Banner":""
51 | },
52 | {
53 | "DARPA Office":"BTO",
54 | "Program Name":"Biochronicity",
55 | "Program File":"Biochronicity-program.json",
56 | "Pubs File":"Biochronicity-pubs.json",
57 | "Software File":"",
58 | "Data File":"",
59 | "Examples File":"",
60 | "Banner":""
61 | },
62 | {
63 | "DARPA Office":"I2O",
64 | "Program Name":"BOLT",
65 | "Program File":"BOLT-program.json",
66 | "Pubs File":"BOLT-pubs.json",
67 | "Software File":"BOLT-software.json",
68 | "Data File":"",
69 | "Examples File":"",
70 | "Banner":""
71 | },
72 | {
73 | "DARPA Office":"I2O",
74 | "Program Name":"CFT",
75 | "Program File":"CFT-program.json",
76 | "Pubs File":"",
77 | "Software File":"CFT-software.json",
78 | "Data File":"",
79 | "Examples File":"",
80 | "Banner":""
81 | },
82 | {
83 | "DARPA Office":"",
84 | "Program Name":"CINDER",
85 | "Program File":"CINDER-program.json",
86 | "Pubs File":"",
87 | "Software File":"CINDER-software.json",
88 | "Data File":"",
89 | "Examples File":"",
90 | "Banner":"NEW"
91 | },
92 | {
93 | "DARPA Office":"I2O",
94 | "Program Name":"CRASH",
95 | "Program File":"CRASH-program.json",
96 | "Pubs File":"CRASH-pubs.json",
97 | "Software File":"CRASH-software.json",
98 | "Data File":"",
99 | "Examples File":"",
100 | "Banner":""
101 | },
102 | {
103 | "DARPA Office":"I2O",
104 | "Program Name":"CSFV",
105 | "Program File":"CSFV-program.json",
106 | "Pubs File":"CSFV-pubs.json",
107 | "Software File":"",
108 | "Data File":"",
109 | "Examples File":"",
110 | "Banner":""
111 | },
112 | {
113 | "DARPA Office":"I2O",
114 | "Program Name":"CyberGenome",
115 | "Program File":"CYBERGENOME-program.json",
116 | "Pubs File":"CYBERGENOME-pubs.json",
117 | "Software File":"CYBERGENOME-software.json",
118 | "Data File":"",
119 | "Examples File":"",
120 | "Banner":""
121 | },
122 | {
123 | "DARPA Office":"I2O",
124 | "Program Name":"DCAPS",
125 | "Program File":"DCAPS-program.json",
126 | "Pubs File":"DCAPS-pubs.json",
127 | "Software File":"DCAPS-software.json",
128 | "Data File":"",
129 | "Examples File":"",
130 | "Banner":""
131 | },
132 | {
133 | "DARPA Office":"I2O",
134 | "Program Name":"DEFT",
135 | "Program File":"DEFT-program.json",
136 | "Pubs File":"DEFT-pubs.json",
137 | "Software File":"DEFT-software.json",
138 | "Data File":"",
139 | "Examples File":"",
140 | "Banner":""
141 | },
142 | {
143 | "DARPA Office":"I2O",
144 | "Program Name":"ENGAGE",
145 | "Program File":"ENGAGE-program.json",
146 | "Pubs File":"ENGAGE-pubs.json",
147 | "Software File":"ENGAGE-software.json",
148 | "Data File":"",
149 | "Examples File":"",
150 | "Banner":""
151 | },
152 | {
153 | "DARPA Office":"I2O",
154 | "Program Name":"FLASHLIGHT",
155 | "Program File":"FLASHLIGHT-program.json",
156 | "Pubs File":"",
157 | "Software File":"FLASHLIGHT-software.json",
158 | "Data File":"",
159 | "Examples File":"",
160 | "Banner":""
161 | },
162 | {
163 | "DARPA Office":"DSO",
164 | "Program Name":"GRAPHS",
165 | "Program File":"GRAPHS-program.json",
166 | "Pubs File":"GRAPHS-pubs.json",
167 | "Software File":"GRAPHS-software.json",
168 | "Data File":"",
169 | "Examples File":"",
170 | "Banner":""
171 | },
172 | {
173 | "DARPA Office":"I2O",
174 | "Program Name":"HACMS",
175 | "Program File":"HACMS-program.json",
176 | "Pubs File":"HACMS-pubs.json",
177 | "Software File":"HACMS-software.json",
178 | "Data File":"",
179 | "Examples File":"",
180 | "Banner":""
181 | },
182 | {
183 | "DARPA Office":"I2O",
184 | "Program Name":"ICAS",
185 | "Program File":"ICAS-program.json",
186 | "Pubs File":"",
187 | "Software File":"",
188 | "Data File":"",
189 | "Examples File":"",
190 | "Banner":"NEW"
191 | },
192 | {
193 | "DARPA Office":"I2O",
194 | "Program Name":"MADCAT",
195 | "Program File":"MADCAT-program.json",
196 | "Pubs File":"MADCAT-pubs.json",
197 | "Software File":"",
198 | "Data File":"",
199 | "Examples File":"",
200 | "Banner":""
201 | },
202 | {
203 | "DARPA Office":"I2O",
204 | "Program Name":"MEMEX",
205 | "Program File":"MEMEX-program.json",
206 | "Pubs File":"MEMEX-pubs.json",
207 | "Software File":"MEMEX-software.json",
208 | "Data File":"",
209 | "Examples File":"",
210 | "Banner":""
211 | },
212 | {
213 | "DARPA Office":"I2O",
214 | "Program Name":"MRC",
215 | "Program File":"MRC-program.json",
216 | "Pubs File":"MRC-pubs.json",
217 | "Software File":"MRC-software.json",
218 | "Data File":"",
219 | "Examples File":"",
220 | "Banner":""
221 | },
222 | {
223 | "DARPA Office":"I2O",
224 | "Program Name":"MUSE",
225 | "Program File":"MUSE-program.json",
226 | "Pubs File":"MUSE-pubs.json",
227 | "Software File":"MUSE-software.json",
228 | "Data File":"MUSE-data.json",
229 | "Examples File":"",
230 | "Banner":"NEW"
231 | },
232 | {
233 | "DARPA Office":"I2O",
234 | "Program Name":"PLANX",
235 | "Program File":"PLANX-program.json",
236 | "Pubs File":"",
237 | "Software File":"PLANX-software.json",
238 | "Data File":"",
239 | "Examples File":"",
240 | "Banner":""
241 | },
242 | {
243 | "DARPA Office":"I2O",
244 | "Program Name":"PPAML",
245 | "Program File":"PPAML-program.json",
246 | "Pubs File":"PPAML-pubs.json",
247 | "Software File":"PPAML-software.json",
248 | "Data File":"",
249 | "Examples File":"",
250 | "Banner":""
251 | },
252 | {
253 | "DARPA Office":"I2O",
254 | "Program Name":"PROCEED",
255 | "Program File":"PROCEED-program.json",
256 | "Pubs File":"PROCEED-pubs.json",
257 | "Software File":"",
258 | "Data File":"",
259 | "Examples File":"",
260 | "Banner":""
261 | },
262 | {
263 | "DARPA Office":"I2O",
264 | "Program Name":"RATS",
265 | "Program File":"RATS-program.json",
266 | "Pubs File":"RATS-pubs.json",
267 | "Software File":"",
268 | "Data File":"",
269 | "Examples File":"",
270 | "Banner":""
271 | },
272 | {
273 | "DARPA Office":"BTO",
274 | "Program Name":"RP",
275 | "Program File":"RP-program.json",
276 | "Pubs File":"RP-pubs.json",
277 | "Software File":"",
278 | "Data File":"",
279 | "Examples File":"",
280 | "Banner":""
281 | },
282 | {
283 | "DARPA Office":"I2O",
284 | "Program Name":"SAFER",
285 | "Program File":"SAFER-program.json",
286 | "Pubs File":"SAFER-pubs.json",
287 | "Software File":"SAFER-software.json",
288 | "Data File":"",
289 | "Examples File":"",
290 | "Banner":""
291 | },
292 | {
293 | "DARPA Office":"I2O",
294 | "Program Name":"SMISC",
295 | "Program File":"SMISC-program.json",
296 | "Pubs File":"SMISC-pubs.json",
297 | "Software File":"",
298 | "Data File":"",
299 | "Examples File":"",
300 | "Banner":""
301 | },
302 | {
303 | "DARPA Office":"TTO",
304 | "Program Name":"System F6",
305 | "Program File":"SystemF6-program.json",
306 | "Pubs File":"SystemF6-pubs.json",
307 | "Software File":"SystemF6-software.json",
308 | "Data File":"",
309 | "Examples File":"",
310 | "Banner":"NEW"
311 | },
312 | {
313 | "DARPA Office":"I2O",
314 | "Program Name":"XDATA",
315 | "Program File":"XDATA-program.json",
316 | "Pubs File":"XDATA-pubs.json",
317 | "Software File":"XDATA-software.json",
318 | "Data File":"",
319 | "Examples File":"XDATA-examples.json",
320 | "Banner":"UPDATED"
321 | }
322 | ]
323 |
--------------------------------------------------------------------------------
/active_content_deployed.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "DARPA Office":"I2O",
4 | "Program Name":"AA",
5 | "Program File":"AA-program.json",
6 | "Pubs File":"AA-pubs.json",
7 | "Software File":"AA-software.json",
8 | "Data File":"",
9 | "Examples File":"",
10 | "Banner":""
11 | },
12 | {
13 | "DARPA Office":"I2O",
14 | "Program Name":"ADAMS",
15 | "Program File":"ADAMS-program.json",
16 | "Pubs File":"ADAMS-pubs.json",
17 | "Software File":"",
18 | "Data File":"",
19 | "Examples File":"",
20 | "Banner":""
21 | },
22 | {
23 | "DARPA Office":"I2O",
24 | "Program Name":"APAC",
25 | "Program File":"APAC-program.json",
26 | "Pubs File":"APAC-pubs.json",
27 | "Software File":"APAC-software.json",
28 | "Data File":"",
29 | "Examples File":"",
30 | "Banner":""
31 | },
32 | {
33 | "DARPA Office":"I2O",
34 | "Program Name":"BET",
35 | "Program File":"BET-program.json",
36 | "Pubs File":"BET-pubs.json",
37 | "Software File":"",
38 | "Data File":"",
39 | "Examples File":"",
40 | "Banner":""
41 | },
42 | {
43 | "DARPA Office":"BTO",
44 | "Program Name":"Biochronicity",
45 | "Program File":"Biochronicity-program.json",
46 | "Pubs File":"Biochronicity-pubs.json",
47 | "Software File":"",
48 | "Data File":"",
49 | "Examples File":"",
50 | "Banner":"UPDATED"
51 | },
52 | {
53 | "DARPA Office":"I2O",
54 | "Program Name":"BOLT",
55 | "Program File":"BOLT-program.json",
56 | "Pubs File":"BOLT-pubs.json",
57 | "Software File":"BOLT-software.json",
58 | "Data File":"",
59 | "Examples File":"",
60 | "Banner":""
61 | },
62 | {
63 | "DARPA Office":"I2O",
64 | "Program Name":"CFT",
65 | "Program File":"CFT-program.json",
66 | "Pubs File":"",
67 | "Software File":"CFT-software.json",
68 | "Data File":"",
69 | "Examples File":"",
70 | "Banner":""
71 | },
72 | {
73 | "DARPA Office":"I2O",
74 | "Program Name":"CRASH",
75 | "Program File":"CRASH-program.json",
76 | "Pubs File":"CRASH-pubs.json",
77 | "Software File":"CRASH-software.json",
78 | "Data File":"",
79 | "Examples File":"",
80 | "Banner":"UPDATED"
81 | },
82 | {
83 | "DARPA Office":"I2O",
84 | "Program Name":"CSFV",
85 | "Program File":"CSFV-program.json",
86 | "Pubs File":"CSFV-pubs.json",
87 | "Software File":"",
88 | "Data File":"",
89 | "Examples File":"",
90 | "Banner":""
91 | },
92 | {
93 | "DARPA Office":"I2O",
94 | "Program Name":"CyberGenome",
95 | "Program File":"CYBERGENOME-program.json",
96 | "Pubs File":"CYBERGENOME-pubs.json",
97 | "Software File":"CYBERGENOME-software.json",
98 | "Data File":"",
99 | "Examples File":"",
100 | "Banner":""
101 | },
102 | {
103 | "DARPA Office":"I2O",
104 | "Program Name":"DCAPS",
105 | "Program File":"DCAPS-program.json",
106 | "Pubs File":"DCAPS-pubs.json",
107 | "Software File":"DCAPS-software.json",
108 | "Data File":"",
109 | "Examples File":"",
110 | "Banner":""
111 | },
112 | {
113 | "DARPA Office":"I2O",
114 | "Program Name":"DEFT",
115 | "Program File":"DEFT-program.json",
116 | "Pubs File":"DEFT-pubs.json",
117 | "Software File":"DEFT-software.json",
118 | "Data File":"",
119 | "Examples File":"",
120 | "Banner":""
121 | },
122 | {
123 | "DARPA Office":"I2O",
124 | "Program Name":"ENGAGE",
125 | "Program File":"ENGAGE-program.json",
126 | "Pubs File":"ENGAGE-pubs.json",
127 | "Software File":"ENGAGE-software.json",
128 | "Data File":"",
129 | "Examples File":"",
130 | "Banner":""
131 | },
132 | {
133 | "DARPA Office":"I2O",
134 | "Program Name":"FLASHLIGHT",
135 | "Program File":"FLASHLIGHT-program.json",
136 | "Pubs File":"",
137 | "Software File":"FLASHLIGHT-software.json",
138 | "Data File":"",
139 | "Examples File":"",
140 | "Banner":""
141 | },
142 | {
143 | "DARPA Office":"DSO",
144 | "Program Name":"GRAPHS",
145 | "Program File":"GRAPHS-program.json",
146 | "Pubs File":"GRAPHS-pubs.json",
147 | "Software File":"",
148 | "Data File":"",
149 | "Examples File":"",
150 | "Banner":""
151 | },
152 | {
153 | "DARPA Office":"I2O",
154 | "Program Name":"HACMS",
155 | "Program File":"HACMS-program.json",
156 | "Pubs File":"HACMS-pubs.json",
157 | "Software File":"HACMS-software.json",
158 | "Data File":"",
159 | "Examples File":"",
160 | "Banner":""
161 | },
162 | {
163 | "DARPA Office":"I2O",
164 | "Program Name":"MADCAT",
165 | "Program File":"MADCAT-program.json",
166 | "Pubs File":"MADCAT-pubs.json",
167 | "Software File":"",
168 | "Data File":"",
169 | "Examples File":"",
170 | "Banner":""
171 | },
172 | {
173 | "DARPA Office":"I2O",
174 | "Program Name":"MEMEX",
175 | "Program File":"MEMEX-program.json",
176 | "Pubs File":"MEMEX-pubs.json",
177 | "Software File":"MEMEX-software.json",
178 | "Data File":"",
179 | "Examples File":"",
180 | "Banner":"UPDATED"
181 | },
182 | {
183 | "DARPA Office":"I2O",
184 | "Program Name":"MRC",
185 | "Program File":"MRC-program.json",
186 | "Pubs File":"MRC-pubs.json",
187 | "Software File":"MRC-software.json",
188 | "Data File":"",
189 | "Examples File":"",
190 | "Banner":"UPDATED"
191 | },
192 | {
193 | "DARPA Office":"I2O",
194 | "Program Name":"PLANX",
195 | "Program File":"PLANX-program.json",
196 | "Pubs File":"",
197 | "Software File":"PLANX-software.json",
198 | "Data File":"",
199 | "Examples File":"",
200 | "Banner":""
201 | },
202 | {
203 | "DARPA Office":"I2O",
204 | "Program Name":"PPAML",
205 | "Program File":"PPAML-program.json",
206 | "Pubs File":"PPAML-pubs.json",
207 | "Software File":"PPAML-software.json",
208 | "Data File":"",
209 | "Examples File":"",
210 | "Banner":""
211 | },
212 | {
213 | "DARPA Office":"I2O",
214 | "Program Name":"PROCEED",
215 | "Program File":"PROCEED-program.json",
216 | "Pubs File":"PROCEED-pubs.json",
217 | "Software File":"",
218 | "Data File":"",
219 | "Examples File":"",
220 | "Banner":""
221 | },
222 | {
223 | "DARPA Office":"I2O",
224 | "Program Name":"RATS",
225 | "Program File":"RATS-program.json",
226 | "Pubs File":"RATS-pubs.json",
227 | "Software File":"",
228 | "Data File":"",
229 | "Examples File":"",
230 | "Banner":""
231 | },
232 | {
233 | "DARPA Office":"BTO",
234 | "Program Name":"RP",
235 | "Program File":"RP-program.json",
236 | "Pubs File":"RP-pubs.json",
237 | "Software File":"",
238 | "Data File":"",
239 | "Examples File":"",
240 | "Banner":"UPDATED"
241 | },
242 | {
243 | "DARPA Office":"I2O",
244 | "Program Name":"SAFER",
245 | "Program File":"SAFER-program.json",
246 | "Pubs File":"SAFER-pubs.json",
247 | "Software File":"SAFER-software.json",
248 | "Data File":"",
249 | "Examples File":"",
250 | "Banner":""
251 | },
252 | {
253 | "DARPA Office":"I2O",
254 | "Program Name":"SMISC",
255 | "Program File":"SMISC-program.json",
256 | "Pubs File":"SMISC-pubs.json",
257 | "Software File":"",
258 | "Data File":"",
259 | "Examples File":"",
260 | "Banner":""
261 | },
262 | {
263 | "DARPA Office":"I2O",
264 | "Program Name":"XDATA",
265 | "Program File":"XDATA-program.json",
266 | "Pubs File":"XDATA-pubs.json",
267 | "Software File":"XDATA-software.json",
268 | "Data File":"",
269 | "Examples File":"",
270 | "Banner":"UPDATED"
271 | }
272 | ]
--------------------------------------------------------------------------------
/license-content.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "License Short Name":["ALv2"],
4 | "License Long Name":"Apache License 2.0",
5 | "License Description":"This free software license includes certain patent termination and indemnification provisions, compatible with GPL3.",
6 | "License Link":"https://www.apache.org/licenses/LICENSE-2.0"
7 | },
8 | {
9 | "License Short Name":["ASL"],
10 | "License Long Name":"Apache Software License",
11 | "License Description":"A whole class of free software licenses, with versions available for individual constraints.",
12 | "License Link":"https://www.apache.org/licenses/"
13 | },
14 | {
15 | "License Short Name":["BSDv3"],
16 | "License Long Name":"BSD 3-Clause 'New' or 'Revised' license",
17 | "License Description":"This permissive, free software license was created by removing the advertising clause from the original version of the BSD license. It is compatible with GNU GPL.",
18 | "License Link":"http://opensource.org/licenses/BSD-3-Clause"
19 | },
20 | {
21 | "License Short Name":["BSDv2","FreeBSD"],
22 | "License Long Name":"BSD 2-Clause 'Simplified' or 'FreeBSD' license",
23 | "License Description":"This is the original BSD license without the advertising (and one other) clause. It is a permissive, non-copyleft-free license.",
24 | "License Link":"http://opensource.org/licenses/BSD-2-Clause"
25 | },
26 | {
27 | "License Short Name":["BSD"],
28 | "License Long Name":"Berkeley Source Distribution",
29 | "License Description":"This permissive, free software license imposes minimal restrictions on the redistribution of covered software.",
30 | "License Link":"http://en.wikipedia.org/wiki/BSD_licenses"
31 | },
32 | {
33 | "License Short Name":["CC0"],
34 | "License Long Name":"Creative Commons Public Domain Dedication",
35 | "License Description":"This free software license dedicates its covered projects to the public domain.",
36 | "License Link":"https://creativecommons.org/publicdomain/zero/1.0/"
37 | },
38 | {
39 | "License Short Name":["CPL"],
40 | "License Long Name":"Common Public License",
41 | "License Description":"This free software license has weak copyleft and choice of law clauses that make it incompatible with the GNU GPL.",
42 | "License Link":"http://opensource.org/licenses/cpl1.0.php"
43 | },
44 | {
45 | "License Short Name":["CDDL"],
46 | "License Long Name":"Common Development and Distribution License",
47 | "License Description":"A free software license scoped copyleft similarly to the Mozilla Public License. It is incompatible with the GNU GPL.",
48 | "License Link":"http://en.wikipedia.org/wiki/Common_Development_and_Distribution_License"
49 | },
50 | {
51 | "License Short Name":["COTS"],
52 | "License Long Name":"Commercial off-the-shelf",
53 | "License Description":"This license is governed by the 3rd-party vendor providing the software. It is neither free nor open source.",
54 | "License Link":"http://en.wikipedia.org/wiki/Commercial_off-the-shelf"
55 | },
56 | {
57 | "License Short Name":["EPL"],
58 | "License Long Name":"Eclipse Public License",
59 | "License Description":"This free software license removes broader patent retaliation language in the Common Public License, but remains incompatible with the GNU GPL.",
60 | "License Link":"http://www.eclipse.org/legal/epl-v10.html"
61 | },
62 | {
63 | "License Short Name":["GPR"],
64 | "License Long Name":"Government Purpose Rights",
65 | "License Description":"Software license allowing free release of the project within the government only.",
66 | "License Link":"http://www.acq.osd.mil/dpap/dars/dfars/html/current/227_71.htm"
67 | },
68 | {
69 | "License Short Name":["UGPR"],
70 | "License Long Name":"Unlimited Government Purpose Rights",
71 | "License Description":"Software license for projects built solely built under government funding that allows for free dissemination of the work.",
72 | "License Link":"http://www.acq.osd.mil/dpap/dars/dfars/html/current/227_71.htm"
73 | },
74 | {
75 | "License Short Name":["GPLv3", "GPL"],
76 | "License Long Name":"GNU General Public License (GPL) version 3",
77 | "License Description":"The latest version of the GNU GPL, this is a free software and copyleft license.",
78 | "License Link":"http://www.gnu.org/licenses/gpl.html"
79 | },
80 | {
81 | "License Short Name":["GPLv2"],
82 | "License Long Name":"GNU General Public License (GPL) version 2",
83 | "License Description":"This free and copyleft software license is an older version of GPL3.",
84 | "License Link":"http://www.gnu.org/licenses/old-licenses/gpl-2.0.html"
85 | },
86 | {
87 | "License Short Name":["LGPL"],
88 | "License Long Name":"GNU Library or 'Lesser' General Public License (LGPL)",
89 | "License Description":"This free software license is not strong copyleft, as it permits linking with nonfree modules.",
90 | "License Link":"http://www.gnu.org/licenses/lgpl.html"
91 | },
92 | {
93 | "License Short Name":["MIT"],
94 | "License Long Name":"MIT License",
95 | "License Description":"The MIT license allows for permissive, free distribution of software and is compatible with GNU GPL.",
96 | "License Link":"http://en.wikipedia.org/wiki/MIT_License"
97 | },
98 | {
99 | "License Short Name":["MPLv2"],
100 | "License Long Name":"Mozilla Public License 2.0",
101 | "License Description":"A free software license with indirect compatibility with GNU GPL v2 and later, but can have constraints that make it incompatible with secondary licenses.",
102 | "License Link":"http://www.mozilla.org/MPL/2.0/"
103 | },
104 | {
105 | "License Short Name":["NCSA"],
106 | "License Long Name":"NCSA/University of Illinois Open Source License",
107 | "License Description":"This license is lax, non-copyleft-free, and based on the terms of the Expat and modified BSD licenses.",
108 | "License Link":"http://directory.fsf.org/wiki/License:IllinoisNCSA"
109 | },
110 | {
111 | "License Short Name":["NCSLA"],
112 | "License Long Name":"Non-Commercial Software License Agreement (CU14012)",
113 | "License Description":"A Columbia University license that allows for free use of this software for non-commercial, academic, or research purposes only.",
114 | "License Link":"https://secure.nouvant.com/columbia/technology/cu14012/license/258"
115 | },
116 | {
117 | "License Short Name":["Open Source"],
118 | "License Long Name":"Open Source",
119 | "License Description":"Developed with the sponsorship of the Defense Advanced Research Projects Agency (DARPA) and delivered to the U.S. Government with Unlimited Rights as defined in DFARS 252.227-7013. Permission is hereby granted, free of charge, to any person obtaining a copy of this data, including any software or models in source or binary form, as well as any drawings, specifications, and documentation (collectively 'the Data'), to deal in the Data without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Data, and to permit persons to whom the Data is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Data.",
120 | "License Link":"http://cps-vo.org/file/14090/download/50384"
121 | },
122 | {
123 | "License Short Name":["Public Domain"],
124 | "License Long Name":"Public Domain",
125 | "License Description":"While not technically a license, this designation means the material is not copyrighted.",
126 | "License Link":"http://directory.fsf.org/wiki/License:PublicDomain"
127 | },
128 | {
129 | "License Short Name":["SUN","SPL"],
130 | "License Long Name":"Sun Public License",
131 | "License Description":"Recognized by both the Free Software Foundation and the Open Source Initiative, the Sun Public License is derived from the Mozilla Public License.",
132 | "License Link":"http://en.wikipedia.org/wiki/Sun_Public_License"
133 | },
134 | {
135 | "License Short Name":["CMUCS"],
136 | "License Long Name":"Carnegie Mellon University Software Licensing",
137 | "License Description":"Restricted by a university license that: (a)prohibits further distribution without the new recipient signing the license, (b)prohibits commercialization, and (c)protects the source organization, CMU and USC, from lawsuits.",
138 | "License Link":"http://www.cs.cmu.edu/~helpext/software_licensing/index.html"
139 | },
140 | {
141 | "License Short Name":["LLVM"],
142 | "License Long Name":"LLVM Release License",
143 | "License Description":"Covered by the Illinois/NCSA Academic Use license. This allows individuals to use our software for non-commercial purposes, but restricts commercial use.",
144 | "License Link":"http://llvm.org/releases/2.8/LICENSE.TXT"
145 | },
146 | {
147 | "License Short Name":["HTK"],
148 | "License Long Name":"University of Cambridge HTK License",
149 | "License Description":"Covered by the Illinois/NCSA Academic Use license. This allows individuals to use our software for non-commercial purposes, but restricts commercial use.",
150 | "License Link":"http://llvm.org/releases/2.8/LICENSE.TXT"
151 | },
152 | {
153 | "License Short Name":["UN"],
154 | "License Long Name":"Unlicense Yourself: Set Your Code Free",
155 | "License Description":"The Unlicense is a template for dedicating your software to the public domain. It combines a copyright waiver patterned after the very successful public domain SQLite project with the no-warranty statement from the widely-used MIT/X11 license.",
156 | "License Link":"http://unlicense.org/"
157 |
158 | }
159 | ]
160 |
--------------------------------------------------------------------------------