Publications
-
Who is to Blame if Snoring Becomes a Problem?
-
End-Resonance Clock and All-Photonic Clock
Here, we report the most recent result of the end-resonance clock. In addition, we report a whole new technique, push-pull laser-atomic oscillator, which can be thought as all-photonic clock.
-
High-Time Resolution Dayside Convection Monitoring By Incoherent Scatter Radar and a Sample Application
In this paper, we demonstrate that Sondrestrom incoherent scatter radar (ISR) observations have the ability to accurately monitor the dayside convection with ∼2.5 min temporal resolution.
-
Improving NER in Arabic using a morphological tagger
We discuss a named entity recognition system for Arabic, and show how we incorporated the information provided by MADA, a full morphological tagger which uses a morphological analyzer.
-
On Updates That Constrain the Features’ Connections During Learning
We investigate two online update techniques that share a sparsity preservation capacity: they allow for constraining the number of prediction connections that each feature can make.
-
Parameterized Access Control: from Design to Prototype
We describe the implementation of the Decentralized Authentication and Authorization Layer (DAAL), a mechanism to leverage the storage functionality of the overlay and obviate the need for an online, centralized access…
-
Preclinical Development of Neuropeptide Therapeutics and Diagnostics
-
Strong Surface Diffusion Mediated Glancing-Angle Deposition: Growth, Recrystallization and Reorientation of Tin Nanorods
Different from usual glancing-angle deposition where low surface diffusion is necessary to form nanorods, strong surface diffusion mediated glancing-angle deposition is exemplified by growing tin nanorod films on both silicon…
-
The Impact of Smoking Cessation on Sleep
-
Usable Artificial Intelligence
The AI and HCI communities have often been characterized as having opposing views of how humans and computers should interact" observes Winograd in "Shifting Viewpoints". Reconciling these views requires a…
-
Forcing and Dynamics of Seafloor-Water Column Exchangeon a Broad Continental Shelf
-
Key Management and Secure Software Updates in Wireless Process Control Environments
To reduce the risk of successful cryptanalysis, new keys must be established (rekeying). We have designed a rekeying scheme that provides both backward and forward secrecy.