Imaging for dismantlement verification: Information management and analysis algorithms
暂无分享,去创建一个
Sean M. Robinson | Mitchell L. Woodring | Erin A. Miller | Kenneth D. Jarman | Mitchell J. Myjak | Allen Seifert | W. Karl Pitts | Alex C. Misner | K. Jarman | M. Myjak | S. Robinson | M. L. Woodring | A. Misner | A. Seifert | E. Miller | W. Pitts
[1] James F. Morgan,et al. Gamma-ray camera for arms control applications , 1999, Optics & Photonics.
[2] M.J. Myjak,et al. Pulse processing system for the RADMAP radiation modulation aperture imager , 2007, 2007 IEEE Nuclear Science Symposium Conference Record.
[3] R. F.,et al. Mathematical Statistics , 1944, Nature.
[4] Richard O. Duda,et al. Use of the Hough transformation to detect lines and curves in pictures , 1972, CACM.
[5] Robert B. Bass,et al. Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System , 2003 .
[6] Richard T. Kouzes,et al. AUTHENTICATION OF MONITORING SYSTEMS FOR NON-PROLIFERATION AND ARMS CONTROL , 2001 .
[7] E. E. Fenimore,et al. Uniformly redundant arrays , 1977 .
[8] Philip R. Bingham,et al. Portable fast-neutron radiography with the nuclear materials identification system for fissile material transfers , 2007 .
[9] R. Whiteson,et al. Information barriers in the trilateral initiative: Conceptual description , 1998 .
[10] J. Mattingly,et al. NMIS plus gamma spectroscopy for attributes of HEU, PU and HE detection , 2004 .
[11] Christoph Busch,et al. Template Protection via Piecewise Hashing , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[12] T. M. Cannon,et al. Coded aperture imaging with uniformly redundant arrays. , 1978, Applied optics.