Publications
-
Supporting K-12 Students in Online Learning: A Review of Online Algebra I Courses
The purpose of this report is to provide objective information about the online Algebra I courses available on the market today.
-
Discovering Action Idioms: Bridging the Gap between System-Level Events and Human-Level Actions
We present a sequential pattern mining approach to discovering human-level actions-action idioms - from instrumentation logs of lower-level events.
-
Environmental Levels of Bisphenol-A Can Expand Numbers of Mammary Stem Cells and Potentially Increase Breast Cancer Risk
-
Safety Verification for Linear Systems
-
Controlled Mesoporosity in SiOC Via Chemically Bonded Polymeric Spacers
Silicon oxycarbides with controlled porosity in the mesopore range have been obtained through high-temperature pyrolysis of newly developed reactive siloxane formulations.
-
Efficient Worm-Like Locomotion: Slip and Control of Soft-Bodied Peristaltic Robots
-
Evaluating Transformative Research Programmes: A Case Study of the NSF Small Grants for Exploratory Research Programme
This article describes an evaluation of the National Science Foundation’s Small Grants for Exploratory Research programme conducted for NSF by SRI International.
-
A Hierarchical Behavior Analysis Approach for Automated Trainee Performance Evaluation in Training Ranges
In this paper we present a closed loop mixed reality training system that provides automatic assessment of trainee performance during kinetic military exercises.
-
In-well pumped blue GaN-based vertical-external-cavity surface-emitting lasers
We describe the properties of in-well pumped blue InGaN/GaN vertical-external-cavity surface-emitting lasers.
-
Returning lost dollars with real-time fraud analytics
This presentation includes a high level tour of PARC's customer-centered research process, some of the analytics we use, our plans for real-time analytics, and a demonstration of the Metal Detector…
-
Privacy in content-oriented networking
In this paper, we present a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze…
-
Fraud detection for healthcare
We present a fraud screening solution to identify suspicious pharmacies from a large dataset of pharmacy claims.