Publications
-
What Works, What We Think Works, and How It Can Work for You
This session will first provide an overview of our understanding of the What Works Clearinghouse (WWC) standards of evidence for determining the rigor and quality of research studies, and we…
-
Iteration Learning By Demonstration
We present a domain-independent approach to iteration learning by demonstration based on a dataflow model of user actions.
-
Selective Loss of Gabab Receptors in Orexin-Producing Neurons Results in Disrupted Sleep/Wakefulness Architecture
Here we analyze the in vivo and in vitro phenotype of mice lacking the GABAB1 gene specifically in orexin neurons (oxGKO mice) and demonstrate that GABAB receptors on orexin neurons are essential in stabilizing and consolidating sleep/wake…
-
Bead-Based Mosaicing of Single Plane Illumination Microscopy Images Using Geometric Local Descriptor Matching
Existing intensity-based registration techniques still struggle to robustly and accurately align images that are characterized by limited overlap and/or heavy blurring. To be able to register such images, we add…
-
Tracking Multiple Occluding People By Localizing on Multiple Scene Planes
Occlusion and lack of visibility in crowded and cluttered scenes make it difficult to track individual people correctly and consistently, particularly in a single view. We present a multi-view approach…
-
The Leukocytes Expressing DARPP-32 are Reduced in Patients with Schizophrenia and Bipolar Disorder
Bipolar disorder (BPD) and schizophrenia (SCZ) are severe disorders representing an enormous social, familiar and individual burden, being SCZ the most disabling psychiatric disorder characterized by psychosis and cognitive impairment.
-
Learning situation models in a smart home
This article addresses the problem of learning situation models for providing context-aware services.
-
13th International Conference on Financial Cryptography and Data Security (FC 2009)
The following topics in information security were discussed: information security economics, anonymity and privacy, private computation, authentication and identification, passwords, fraud detection, cryptographic applications, etc.
-
Micro-fluidic-based flow cytometer for point-of-care applications based on a spatial modulation technique
In this presentation we will describe and illustrate a fundamentally new design of the optical detection system that delivers high effective sensitivity (i.e., high signal to noise discrimination) without complex…
-
Carbon-neutral liquid fuel from sunlight, air, and water
We propose a system that produces carbon-neutral liquid fuel using only sunlight, air, and water.
-
An Argument-Based Approach To Evaluating The Validity Of Inference Chains In Teacher Education
-
Directions in Network-Based Security Monitoring
The author discusses differences between traditional network intrusion detection and new techniques, and highlights a new freely available tool called BotHunter.