Search Results - "Whitney, Paul D."
-
1
Bayesian Model Averaging for Ensemble-Based Estimates of Solvation-Free Energies
Published in The journal of physical chemistry. B (20-04-2017)“…This paper applies the Bayesian Model Averaging statistical ensemble technique to estimate small molecule solvation free energies. There is a wide range of…”
Get full text
Journal Article -
2
Developing Concept-Based User Interfaces for Scientific Computing
Published in Computer (Long Beach, Calif.) (01-09-2006)“…Although drawings and graphs can express complex concepts, such methods can't be computationally analyzed. Researchers have developed visual approaches and…”
Get full text
Journal Article -
3
A Sheaf Theoretical Approach to Uncertainty Quantification of Heterogeneous Geolocation Information
Published in Sensors (Basel, Switzerland) (17-06-2020)“…Integration of multiple, heterogeneous sensors is a challenging problem across a range of applications. Prominent among these are multi-target tracking, where…”
Get full text
Journal Article -
4
Graph-based comparisons of scenarios in intelligence analysis
Published in 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583) (2004)“…Intelligence analysis relies heavily on extracting relevant information from history and using this information as models and context for interpreting evolving…”
Get full text
Conference Proceeding -
5
A Graphical Approach to Diagnosing the Validity of the Conditional Independence Assumptions of a Bayesian Network Given Data
Published in Journal of computational and graphical statistics (01-12-2012)“…Bayesian networks (BNs) have attained widespread use in data analysis and decision making. Well-studied topics include efficient inference, evidence…”
Get full text
Journal Article -
6
A Conceptual Model to Identify Intent to Use Chemical-Biological Weapons
Published in Journal of strategic security (01-10-2017)“…This paper describes a conceptual model to identify and interrelate indicators of intent of non-state actors to use chemical or biological weapons. The model…”
Get full text
Journal Article -
7
Violent frames in action
Published in Dynamics of asymmetric conflict (01-07-2011)“…We present a computational approach to radical rhetoric that leverages the co-expression of rhetoric and action features in discourse to identify violent…”
Get full text
Journal Article -
8
Graph-Based Analysis of Nuclear Smuggling Data
Published in Journal of applied security research (06-10-2009)“…Much of the data that is collected and analyzed today is structural, consisting not only of entities but also of relationships between the entities. As a…”
Get full text
Journal Article -
9
Screening the Hanford tanks for trapped gas
Published in EnvironMetrics (London, Ont.) (01-08-2002)“…The Hanford Site is home to 177 large, underground nuclear waste storage tanks. This article describes a screening study carried out in the mid 1990s that used…”
Get full text
Journal Article Conference Proceeding -
10
Bayesian Model Averaging for Ensemble-Based Estimates of Solvation Free Energies
Published 11-09-2016“…This paper applies the Bayesian Model Averaging (BMA) statistical ensemble technique to estimate small molecule solvation free energies. There is a wide range…”
Get full text
Journal Article -
11
Toward the Routine Analysis of Diverse Data Types
Published in Journal of computational and graphical statistics (01-12-2003)“…This article describes a variety of data analysis problems. The types of data across these problems included free text, parallel text, an image collection,…”
Get full text
Journal Article -
12
The lifecycle of Bayesian network models developed for Multi-Source Signature assessment of Nuclear Programs
Published in 2013 IEEE International Conference on Intelligence and Security Informatics (01-06-2013)“…The Multi-Source Signatures for Nuclear Programs project, part of Pacific Northwest National Laboratory's (PNNL's) Signature Discovery Initiative, seeks to…”
Get full text
Conference Proceeding -
13
Applying the scientific method to cybersecurity research
Published in 2016 IEEE Symposium on Technologies for Homeland Security (HST) (01-05-2016)“…The cyber environment has rapidly evolved from a curiosity to an essential component of the contemporary world. As the cyber environment has expanded and…”
Get full text
Conference Proceeding -
14
Parameterizing bayesian network representations of social-behavioral models by expert elicitation
Published in 2010 IEEE International Conference on Intelligence and Security Informatics (01-05-2010)“…Bayesian networks provide a general framework with which to model many natural phenomena. The mathematical nature of Bayesian networks enables a plethora of…”
Get full text
Conference Proceeding -
15
Reduced incidence of rat colon cancer metastases by perioperative immunostimulation with maleic anhydride-divinyl ether-2 (MVE-2)
Published in Diseases of the colon & rectum (01-04-1985)“…Intra-abdominal operations result in profound immunodepression during a period when tumor cells are released into the systemic and portal circulations. This…”
Get more information
Journal Article