Filter Results
Researcher
- Hsuan-Hao Lu
- Joseph M Lukens
- Mingyan Li
- Alexander Miloshevsky
- Chad Steed
- Isaac C Sikkema
- Jian Chen
- Joseph V Olatt
- Junghoon Chae
- Kunal Mondal
- Mahim Mathur
- Muneer Alshowkan
- Nicholas A Peters
- Oscar A Martinez
- Pablo Moriano
- Robert A Bridges
- Samudra Dasgupta
- Samuel C Hollifield
- Travis S Humble
- Vasiliy S Morozov
- Zhili Feng
Quantum computation utilizing Majorana Fermions bound to the center of superconducting vortices requires performing exchange operations, i.e. physically exchanging the position of the individual vortices. The solution presented here requires modulating fields and beams.
SD card configuration for use in neutron-rich environments.
Parallel Sort with a Ranged, Partitioned Key-Value Store in a High Performance Computing Environment
Improved sorting techniques are provided that perform a parallel sort using a ranged, partitioned key-value store in a high-performance computing (HPC) environment. A plurality of input data files comprising unsorted key-value data in a partitioned key-value store are sorted.
Partitioned key-value stores with one-sided communications are provided for secondary global key lookup by range-knowledgeable clients.
The technology provides a means for a nearly lossless modulation of a continuous variable (CV) optical field. This type of approach would be a viable approach to CV quantum secret sharing (QSS).
In a world which is becoming increasingly reliant upon data-driven
This generalized framework leverages recent technological advances in artificial intelligence, large scale distributed computing, a large repository of both overhead and ground based imagery databases to propose a GIScience based object detection and counting platform.
By exploiting the latest high-performance computing technique and advances in deep learning, we propose a state-of-the-art building mapping method based on convolutional neural network.
The invention relates to cyber security and more specifically to methods for detecting malicious traffic injection attacks on a vehicle's CAN bus.
In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server).