Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Conferences

Characterization of a Josephson Junction Comb Generator

Author(s)
Akim Babenko, Alirio De Jesus Soares Boaventura, Nathan Flowers-Jacobs, Justus Brevik, Anna Fox, Dylan Williams, Zoya Popovic, Paul Dresselhaus, Samuel P. Benz
We present a new type of microwave frequency combs with a potentially calculable pulse shape. The device is an array of 1500 Josephson junctions (JJs) connected

Matching and comparing objects in a serial cytometer

Author(s)
Nikita Podobedov, Matthew DiSalvo, Jason A. Hsu, Paul Patrone, Gregory A. Cooksey
Flow cytometers are indispensable for clinical studies, yet are hindered by inherent uncertainties. We have developed an optofluidic device capable of multiple

SCALABLE THERMAL SIMULATION OF POWDER BED FUSION

Author(s)
Paul Witherell, Vadim Shapiro, Yaqi Zhang
Powder bed fusion (PBF) has become a widely used additive manufacturing (AM) technology to produce metallic parts. As the PBF process is driven by a moving heat

NDN-DPDK: NDN Forwarding at 100 Gbps on Commodity Hardware

Author(s)
Junxiao Shi, Davide Pesavento, Lotfi Benmohamed
Since the Named Data Networking (NDN) data plane requires name-based lookup of potentially large tables using variable-length hierarchical names as well as per

Anteater: Interactive Visualization for Program Understanding

Author(s)
Rebecca Faust, Kartherin Isaacs, William Z. Bernstein, Michael Sharp, Carlos Scheidegger
Debugging is famously one the hardest parts in programming. In this paper, we tackle the question: what does a debugging environment look like when we take

Vulnerability trends in web servers and browsers

Author(s)
M S Raunak, D. Richard Kuhn, Richard Kogut, Raghu N. Kacker
In previous work we have looked at trends in vulnerabilities due to ordinary programming errors [2, 3]. This analysis focuses on two of the most widely used

Economic considerations for recovery-based design

Author(s)
Juan Fung, Dustin Cook, Yating Zhang, Katherine Johnson, Siamak Sattar
Current building design practice targets life safety performance for the design-level earthquake. While some buildings (e.g., schools, hospitals) may be

Towards Usable Updates for Smart Home Devices

Author(s)
Julie M. Haney, Susanne M. Furman
Smart home device updates are important tools for users to remediate security vulnerabilities and protect devices from future attacks. However, no prior

Cryptanalysis of LEDAcrypt

Author(s)
Daniel C. Apon, Ray A. Perlner, Angela Y. Robinson, Paulo Santini
We report on the concrete cryptanalysis of LEDAcrypt, a 2nd Round candidate in NIST's Post- Quantum Cryptography standardization process and one of 17
Was this page helpful?