Showing 1 - 15 of 19

PerCon SFA, Co-Investigator Vivian Lin earned her PhD in organic chemistry from the University of California, Berkeley with Professor Chris Chang, developing fluorescent probes for imaging redox active small molecules. Afterward, she traveled to Switzerland for a postdoctoral fellowship in the...

The IONTOF TOF.SIMS 5 data source is a time-of-flight secondary ion mass spectrometer and powerful surface analysis tool used to investigate scientific questions in biological, environmental, and energy research. Among the most sensitive of surface analysis tools, it uses a high-vacuum technique...

Biography Dr. Mary Lipton is currently a Staff Scientist at the Pacific Northwest National Laboratory and Adjunct Professor at Washington State University-Tri-Cities in Richland and Adjunct Professor in the Institute for Biological Chemistry and Washington State University Pullman. She is nationally...

Category

Chris received his Bachelor of Science degree in chemistry at the University of Colorado at Colorado Springs in 2005. He attained his PhD in chemistry at the University of Illinois at Urbana–Champaign in 2011, under Mary L. Kraft, where his graduate work focused on using secondary ion mass...

Category

ProxyTSPRD profiles are collected using NVIDIA Nsight Systems version 2020.3.2.6-87e152c and capture computational patterns from training deep learning-based time-series proxy-applications on four different levels: models (Long short-term Memory and Convolutional Neural Network), DL frameworks...

This year’s VAST Challenge focuses on visual analytics applications for both large scale situation analysis and cyber security. We have two mini-challenges to test your analytical skills and confound your visual analytics applications. In the first mini-challenge, (the imaginary) BankWorld's largest...

The VAST 2010 Challenge consisted of three mini-challenges (MC) and one Grand Challenge (GC). Each MC had a data set, instructions and a number of questions to be answered. The GC required participants to pull together information from all three data sets and write a debrief summarizing the...

The VAST 2009 Challenge scenario concerned a fictitious, cyber security event. An employee leaked important information from an embassy to a criminal organization. Participants were asked to discover the identity ofthe employee and the structure of the criminal organization. Participants were...

Mini Challenge 1: Wiki Editors The Paraiso movement is controversial and is having considerable social impact in a specific area of the world. We have extracted a segment of the Paraiso (the movement) Wikipedia edits page. Please note this is not the Paraiso Manifesto Wiki page which is part of the...

It is Fall of 2004 and one of your analyst colleagues has been called away from her current tasks to an emergency. The boss has given you the assignment of picking up her investigation and completing her task. She has been asked to pursue a line of investigation into some unexpected activities...

Dataset The dataset will consist of: About 1200 news stories from the Alderwood Daily News plus a few other items collected by the previous investigators A few photos A few maps of Alderwood and vicinity (in bitmap image form) A few files with other mixed materials, e.g. a spreadsheet with voter...

This data is a model of synthetic adversarial activity surrounded by noise and was funded by DARPA. The various versions include gradually more complex networks of activities. This data was generated by PNNL. Activities can be phone calls, transactions, or any other type of communications. Most of...
  1. Datasets

    7
The VAST Challenge 2019 presents three mini-challenges and a grand challenge for you to apply your visual analytics research and technologies to help a city grapple with the aftermath of an earthquake that damages their nuclear power plant. These challenges are open to participation by individuals...
  1. Datasets

    1
Dataset

The database contains 55 compounds and is comprised of the species in the paper referenced below that introduced the concept of the SERDP database.

Category

This data was generated by the organization IvySys. Activities can be phone calls, transactions, or any other type of communications. Most of the files are of the type .edges, .rdf, or .csv; but all can be opened in a text editor. A good introduction to this data can be found in \Tutorial1\MAA...