An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In this paper, we present a Support Vector Machine (SVM) based pixel classifier for a semi-automated segmentation algorithm to detect neuronal membrane structures in stacks of electron microscopy images of brain tissue samples. This algorithm uses high-
Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE 802
In this research, we present an (semi-) automated segmentation algo-rithm using a Support Vector Machine classifier. This algorithm uses a high-dimensional feature space generated from patch-based multiple-features and a training dataset in order to detect
Sketch-based 3D shape retrieval has become an important research topic in content-based 3D object retrieval. To foster this research area, two Shape Retrieval Contest (SHREC) tracks on this topic have been organized by us in 2012 and 2013 based on a small
Wireless mesh/sensor networks offer various unique features such as self-configuration, ease of installation, scalability, and self-healing, which makes them very attractive for deployment in various smart grid domains, such as Home Area Networks (HAN)
A prototype to translate web graph and map images into 3D printed models in order to give the blind and visually impaired access to voting and election information.
Domain adaptation algorithms aim at handling the shift between source and target domains. A classifier is trained on images from the source domain; and the classifier recognizes objects in images from the target domain. In this paper, we present a joint
Anirudha Sahoo, Michael R. Souryal, Mudumbai Ranganathan
Dynamic spectrum access (DSA) is emerging as a promising technology to mitigate spectrum scarcity caused by static frequency allocation. Among the different models proposed for DSA, opportunistic spectrum access (OSA) is a promising class of solutions. In
With recent advances in imaging technologies large numbers of bioimages are currently being acquired. Automated classification of these bio-images is a very important and challenging problem. Here we investigate the capabilities of local features and the
Allen L. Roginsky, Ken Christensen, Mehrgan Mostowfi
On-off scheduling of systems that have the ability to sleep can be used to extend system idle periods and enable greater opportunities for energy savings from sleeping. In this paper, we achieve a theoretical understanding of the delay behavior of on-off
Prevention, detection and response are nowadays considered to be three priority topics for protecting critical infrastructures, such as energy control systems. Despite attempts to address these current issues, there is still a particular lack of
Kevin L. Mills, Christopher E. Dabrowski, James J. Filliben, Sanford P. Ressler
Large infrastructures, such as clouds, can exhibit substantial outages, sometimes due to failure scenarios that were not considered during system design. We define a method that uses a genetic algorithm (GA) to search system simulations for parameter
Bryan M. Barnes, Martin Y. Sohn, Francois R. Goasmat, Hui Zhou, Andras Vladar, Richard M. Silver, Abraham Arceo
Identifying defects in photolithographic patterning is a persistent challenge in semiconductor manufacturing. Well-established optical methods in current use are jeopardized by upcoming sub-20 nm device dimensions. Volumetric processing of focus-resolved
The Ontology Summit 2012 explored the current and potential uses of ontology, its methods and paradigms, in big systems and big data: How ontology can be used to design, develop, and operate such systems. The systems addressed were not just software
Distributed mesh sensor networks provide cost-effective communications for deployment in various smart grid domains, such as home area networks (HAN), neighborhood area networks (NAN), and substation/plant-generation local area networks. This paper
Itzel Dominguez, D. Richard Kuhn, Raghu N. Kacker, Yu Lei
This poster presents some measures of combinatorial coverage that can be helpful in estimating residual risk related to insufficient testing of rare interactions, and a tool for computing these measures.
How does one inspect terabyte-sized 3D images visually from multiple viewpoints? The current solutions are limited to gigabyte-sized images using specialized hardware to achieve interactivity and lacking the ability to share data for collaborative research
This work addresses the problem of re-projecting a terabyte-sized 3D data set represented as a set of 2D Deep Zoom pyramids. In general, a re-projection for small 3D data sets is executed directly in RAM. However, RAM becomes a limiting factor for terabyte
Peter Bajcsy, Antoine Vandecreme, Julien M. Amelot, Phuong T. Nguyen, Joe Chalfoun, Mary C. Brady
We present a characterization of four basic terabyte size image computations on a Hadoop cluster in terms of their relative efficiency according to the modified Amdahls law. The work is motivated by the fact that there is a lack of standard benchmarks and
The Text REtrieval Conference (TREC) is a series of annual workshops designed to build the infrastructure for large-scale evaluation of search systems and thus improve the state-of-the-art. Each workshop is organized around a set "tracks", challenge
The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses, by translating domain names to IP addresses and back. The DNS infrastructure is made up of
Jing Qin, Richard M. Silver, Bryan M. Barnes, Hui Zhou, Francois R. Goasmat
There has been much recent work in developing advanced optical metrology methods that use imaging optics for critical dimension measurements and defect detection. Sensitivity to nanometer scale changes has been observed when measuring critical dimensions