Share Email Print
cover

PROCEEDINGS VOLUME 11013

Disruptive Technologies in Information Sciences II
Editor(s): Misty Blowers; Russell D. Hall; Venkateswara R. Dasari
For the purchase of this volume in printed format, please visit Proceedings.com

Volume Details

Volume Number: 11013
Date Published: 9 July 2019

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 11013
Author(s): Proceedings of SPIE
Next generation Wikis built on object-based production and adaptive process management fundamentally changes intelligence production in the IC
Author(s): Mike Gilger
Show Abstract
Adaptive data collection and retention planning to support cyber analytics (Conference Presentation)
Author(s): Georgiy M. Levchuk
Show Abstract
Auto-generating training data for network application classification
Author(s): Carlos Alcantara; Venkat Dasari; Christopher Mendoza; Michael P. McGarry
Show Abstract
Domain specific architectures, hardware acceleration for machine/deep learning
Author(s): Angel I. Solis; Patrica Nava
Show Abstract
Deep learning visual programming
Author(s): Dorra Mahouachi; Moulay A. Akhloufi
Show Abstract
Assessing online media reliability: trust, metrics and assessment
Author(s): Nicholas Snell; Jeremy Straub; Brandon Stoick; Terry Traylor; William Fleck
Show Abstract
Development of a 'fake news' machine learning classifier and a dataset for its testing
Author(s): William Fleck; Nicholas Snell; Terry Traylor; Jeremy Straub
Show Abstract
Building a high performance, secure, reliable and compliant heterogeneous computing capability through the integration of core and edge processing
Author(s): B. S. Farroha; D. L. Farroha
Show Abstract
Information processing via photonic routing: residue number system arithmetic and reconfigurable graph processors (Conference Presentation)
Author(s): Volker J. Sorger; Tarek A. El-Ghazawi
Show Abstract
Shannon mutual information of a qutrit in cascade model
Author(s): Vinod K. Mishra
Show Abstract
Integration of OpenTap with quantum entanglement testbed for security analysis
Author(s): Billy E. Geerhart III; Venkat R. Dasari; Michael McGarry
Show Abstract
Optimization problems with low SWAP tactical computing
Author(s): Mee Seong Im; Venkat R. Dasari; Lubjana Beshaj; Dale Shires
Show Abstract
Decentralized network assembly for positioning and coordination of ad hoc networks
Author(s): Brent Kraczek
Show Abstract
Hardware security kernel for cyber-defense
Author(s): Patrick Jungwirth; James Ross; Barry Secrest; Thomas Barnett; Philip Chan
Show Abstract
Tactical distributed ledger: an enabling technology for deploying resilient decentralized systems
Author(s): Manuel M. Vindiola; Jared C. Willard; Bryan P. Dawson; David C. Harman; Jamie K. Infantolino; Noah Weston
Show Abstract
Blockchain technologies and distributed ledger systems as enablers for real time decision support
Author(s): Misty Blowers; Shaun Scrafford; Jon Williams
Show Abstract
Distributed autonomous learning framework
Author(s): Kyler Harrington
Show Abstract
Performance of blockchain technology on DoD tactical networks
Author(s): Noah Weston; Jared Willard; Peng Wang
Show Abstract
HPC enabled immersive and non-immersive visualization of large scale scientific data
Author(s): Simon Su; Vincent Perry; Michael An; Luis Bravo; Venkat Dasari
Show Abstract
LoRaWan-Hyperledger robust network integrity on IoT devices
Author(s): Irak Vicarte Mayer
Show Abstract
Detection of changes in the qualitative parameters for LoRaWAN and SigFox network
Author(s): Erik Gresak; Jakub Jalowiczor; Jan Rozhon; Filip Rezac; Jakub Safarik
Show Abstract
PRAC: private and rateless adaptive coded computation at the edge
Author(s): Rawad Bitar; Yuxuan Xing; Yasaman Keshtkarjahromi; Venkat Dasari; Salim El Rouayheb; Hulya Seferoglu
Show Abstract
Privacy vs. modernity: artificial intelligence in China's infrastructure
Author(s): Hannah Hess
Show Abstract
Malware classification using fusion of neural networks
Author(s): Adam Lutz; Victor F. Sansing III; Waleed E. Farag; Soundararajan Ezekiel
Show Abstract
Search efficient blockchain-based immutable logging and querying
Author(s): Esben Klarlund; Rawad Bitar; Salim el Rouayheb
Show Abstract
Codes for straggler mitigation in secure distributed linear regression
Author(s): Rawad Bitar; Salim El Rouayheb
Show Abstract

© SPIE. Terms of Use
Back to Top
PREMIUM CONTENT
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?
close_icon_gray