Filter Results
Researcher
- Corson Cramer
- Steve Bullock
- Brian Post
- Chad Steed
- Erdem Asa
- Greg Larsen
- Jim Tobin
- Junghoon Chae
- Mike Zach
- Nicholas Peters
- Omer Onar
- Sam Hollifield
- Travis Humble
- Trevor Aguirre
- Vivek Sujan
- Vlastimil Kunc
- Aaron Myers
- Adam Stevens
- Alexander Enders
- Alexandra Moy
- Alexandre Sorokine
- Ali Passian
- Andrew F May
- Annetta Burger
- Ben Garrison
- Brad Johnson
- Brian Weber
- Brian Williams
- Bruce Hannan
- Carter Christopher
- Chance C Brown
- Christopher S Blessinger
- Chris Tyler
- Clinton Stipek
- Dan Coughlin
- Daniel Adams
- David J Mitchell
- David Olvera Trejo
- Debraj De
- Dustin Gilmer
- Gabriel Veith
- Gautam Malviya Thakur
- Harper Jordan
- Hsin Wang
- Hsuan-Hao Lu
- Isabelle Snyder
- J.R. R Matheson
- James Gaboardi
- James Klett
- Jason Jarnagin
- Jesse McGaha
- Jessica Moehl
- Joel Asiamah
- Joel Dawson
- John Holliman II
- Jordan Wright
- Joseph Lukens
- Josh Crabtree
- Junghyun Bae
- Justin Cazares
- Justin Griswold
- Justin West
- Kevin Spakes
- Kevin Sparks
- Kim Sitzlar
- Lilian V Swann
- Liz McBride
- Loren L Funk
- Louise G Evans
- Luke Chapman
- Luke Koch
- Mark Provo II
- Mary A Adkisson
- Matt Larson
- Mengdawn Cheng
- Mingyan Li
- Muneer Alshowkan
- Nance Ericson
- Nedim Cinbiz
- Pablo Moriano Salazar
- Padhraic L Mulligan
- Paula Cable-Dunlap
- Philipe Ambrozio Dias
- Polad Shikhaliev
- Raymond Borges Hink
- Richard L. Reed
- Robert Stewart
- Rob Root
- Ryan Kerekes
- Sally Ghanem
- Samudra Dasgupta
- Scott Smith
- Srikanth Yoginath
- Steven Guzorek
- Sudarsanam Babu
- Sunil Subedi
- Sydney Murray III
- Taylor Hauser
- Theodore Visscher
- Todd Thomas
- T Oesch
- Varisara Tansakul
- Vasilis Tzoganis
- Viswadeep Lebakula
- Vladislav N Sedov
- Xiuling Nie
- Yacouba Diawara
- Yaosuo Xue
- Yonghao Gui
- Yun Liu

With this technology, we propose a systematic method for constructing a potentially very large number of complementary anomaly detectors from a single probabilistic model of the data.


In Scenario Driven Data Modeling a Semantic Model is created.

In current, graph based reliability models, modeling the effects of stimulus to the system is efficient, but representing component failure beyond simultaneous double-point failure has been computationally difficult.

The Functional Randomness in Security Tokens method and system improves the security of two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data.

Here, we discuss how CSES is used to rank candidate threats (i.e., semantically enhanced structural anomalies) for the benefit of a human operator assessment: (a) regarding their potential as a significant emergent threat and its consequent impacts, (b) semantics will be used

The subject invention is an advanced chlorophyll pulse amplitude modulation fluorometer for environmental monitoring. Detection is achieved by algal biosensors that grow naturally in source drinking waters. The principle of detection is chlorophyll fluorescence measurement.

This disclosure describes a potential improvement the neutron/gamma inspection systems being developed for inspection of air cargo containers. These current systems use neutrons and gammas together to help isolate materials such as explosives within a container.

Cermet formulations are provided for integrated waste forms that comprise a composite of tailored ceramic phases encapsulated in a special metal matrix. The ceramic phases immobilize certain radioisotopes in a stable, low-leachability chemical form. The metal

The inventive Cyberspace Security Econometrics System (CSES) is a methodology for estimating security costs to stakeholders as a function of possible risk postures. Additional work has applied CSES to specific business cases.