Filter Results
Researcher
- James (Jim) Tobin
- Samuel C Hollifield
- Adam G Stevens
- Ali Passian
- Brian K Post
- Brian Weber
- Chad Steed
- Corson L. Cramer
- Daniel R Coughlin
- Dustin B Gilmer
- Greg S Larsen
- Isabelle B Snyder
- James W Klett
- Joel A Dawson
- Joel M Asiamah
- Josh D Crabtree
- Junghoon Chae
- Justin West
- Kevin D Spakes
- Kim W Sitzlar
- Lilian V Swann
- Louise G Worrall
- Lucas R Koch
- Mary A Adkisson
- Milton N Ericson
- Mingyan Li
- Raymond C Borges Hink
- Richard L Reed
- Rob C Jordan
- Robert N Stewart
- Ryan A Kerekes
- Sally S Ghanem
- Samudra Dasgupta
- Srikanth B Yoginath
- Steven E Bullock
- Steven J. Guzorek
- Sudarsanam Babu
- Travis S Humble
- Trevor G Aguirre
- T S Oesch
- Varisara Tansakul
- Vlastimil Kunc
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
High energy density silicon electrodes suffer from (1) low porosity and (2) high tortuosity which limits electrode performance and silicon utilization.
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
We developed an innovative fabrication process to cost effectively produce complex geometric radiation shields. Radiation shields often utilize materials that are difficult to manufacture and require significant labor costs.
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
Given the challenge of different embedding (or representation or features) of geospatial PoI (points of interest) data types and geo-tagged ground-level imagery data types, this work performs the conflation of PoI and ground-level images data into a joint semantic knowledge gr
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
POIs within an area of interest (AOI) can capture how humans use the space and reflect land use characteristics of the AOI.
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
Just-in-Time (JIT) defect prediction is at the core of software quality assurance efforts. Here, we use graph- based ML to improve JIT defect prediction.
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
Technologies are described directed to quantum key authenticated site-to-site internet secure tunnels.