Zobrazeno 1 - 10
of 1 437
pro vyhledávání: '"Thornton, Matthew"'
Autor:
Thornton, Matthew
The modalities of many imaging applications have been advancing toward the MIMO format for improved efficiency. This paper presents an approach to the implementation of the MIMO operating modality for FMCW radar imaging systems with multi-element dat
Externí odkaz:
http://hdl.handle.net/10150/624193
http://arizona.openrepository.com/arizona/handle/10150/624193
http://arizona.openrepository.com/arizona/handle/10150/624193
Autor:
Campos, Rosanna C., Matsunaga, Kate, Reid, Mark W., Fernandez, G. Esteban, Stepanian, Kayla, Bharathan, Sumitha P., Li, Meng, Thornton, Matthew E., Grubbs, Brendan H., Nagiel, Aaron
Publikováno v:
In Experimental Eye Research July 2024 244
Autor:
Huang, Biao, Zeng, Zipeng, Kim, Sunghyun, Fausto, Connor C., Koppitch, Kari, Li, Hui, Li, Zexu, Chen, Xi, Guo, Jinjin, Zhang, Chennan C., Ma, Tianyi, Medina, Pedro, Schreiber, Megan E., Xia, Mateo W., Vonk, Ariel C., Xiang, Tianyuan, Patel, Tadrushi, Li, Yidan, Parvez, Riana K., Der, Balint, Chen, Jyun Hao, Liu, Zhenqing, Thornton, Matthew E., Grubbs, Brendan H., Diao, Yarui, Dou, Yali, Gnedeva, Ksenia, Ying, Qilong, Pastor-Soler, Nuria M., Fei, Teng, Hallows, Kenneth R., Lindström, Nils O., McMahon, Andrew P., Li, Zhongwei
Publikováno v:
In Cell Stem Cell 6 June 2024 31(6):921-939
Publikováno v:
Phys. Rev. A 107, 062401 (2023)
Quantum State Sharing (QSS) is a protocol by which a (secret) quantum state may be securely split, shared between multiple potentially dishonest players, and reconstructed. Crucially the players are each assumed to be dishonest, and so QSS requires t
Externí odkaz:
http://arxiv.org/abs/2106.06337
Autor:
Richter, Stefan, Thornton, Matthew, Khan, Imran, Scott, Hannah, Jaksch, Kevin, Vogl, Ulrich, Stiller, Birgit, Leuchs, Gerd, Marquardt, Christoph, Korolkova, Natalia
Publikováno v:
Phys. Rev. X 11, 011038 (2021)
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security of an underlying classical cryptographic algorithm becomes compromised. Conversely, versatile cryptography allows the user to switch the cryptographi
Externí odkaz:
http://arxiv.org/abs/2001.10089
Autor:
Travisano, Stanislao Igor, Harrison, Michael R.M., Thornton, Matthew E., Grubbs, Brendan H., Quertermous, Thomas, Lien, Ching-Ling
Publikováno v:
In Cell Reports 26 September 2023 42(9)
Autor:
Thornton, Matthew, Sakovich, Anton, Mikhalychev, Alexander, Ferrer, Jesus Diaz, de la Hoz, Pablo, Korolkova, Natalia, Mogilevtsev, Dmitri
Publikováno v:
Phys. Rev. Applied 12, 064051 (2019)
We suggest and discuss a concept of deterministic integrated source of non-classical light based on the coherent diffusive photonics, a coherent light flow in a system of dissipatively coupled waveguides. We show how this practical quantum device can
Externí odkaz:
http://arxiv.org/abs/1907.01973
Recurrent neural networks can be difficult to train on long sequence data due to the well-known vanishing gradient problem. Some architectures incorporate methods to reduce RNN state updates, therefore allowing the network to preserve memory over lon
Externí odkaz:
http://arxiv.org/abs/1901.07334
Autor:
Rogers, Ciarán J., Bogdanov, Alexey, Seal, Manas, Thornton, Matthew E., Su, Xun-Cheng, Natrajan, Louise S., Goldfarb, Daniella, Bowen, Alice M.
Publikováno v:
In Journal of Magnetic Resonance June 2023 351