Author pages are created from data sourced from our academic publisher partnerships and public sources.

- Publications
- Influence

A Bayesian calibration approach to the thermal problem

- D. Higdon, C. Nakhleh, J. Gattiker, B. Williams
- Computer Science
- 1 May 2008

Many of the problems we work with at Los Alamos National Laboratory are similar to the thermal problem described in the tasking document. In this paper, we describe the tools and methods we have… Expand

Calibration of Computational Models With Categorical Parameters and Correlated Outputs via Bayesian Smoothing Spline ANOVA

- C. Storlie, W. A. Lane, E. Ryan, J. Gattiker, D. Higdon
- Mathematics
- 21 May 2014

It has become commonplace to use complex computer models to predict outcomes in regions where data do not exist. Typically these models need to be calibrated and validated using some experimental… Expand

A System for Interpretation of Line Drawings

- R. Kasturi, S. T. Bow, W. El-Masri, J. Shah, J. Gattiker, Umesh B. Mokate
- Computer Science
- IEEE Trans. Pattern Anal. Mach. Intell.
- 1 October 1990

A system for interpretation of images of paper-based line drawings is described. Since a typical drawing contains both text strings and graphics, an algorithm has been developed to locate and… Expand

Parallel Bayesian Additive Regression Trees

- M. Pratola, Hugh A. Chipman, J. Gattiker, D. Higdon, Robert McCulloch, W. N. Rust
- Computer Science, Mathematics
- 7 September 2013

Bayesian additive regression trees (BART) is a Bayesian approach to flexible nonlinear regression which has been shown to be competitive with the best modern predictive methods such as those based on… Expand

Computer Intrusion Detection with Classification and Anomaly Detection, Using SVMs

- Mike Fugate, J. Gattiker
- Computer Science, Mathematics
- Int. J. Pattern Recognit. Artif. Intell.
- 1 May 2003

This paper describes experiences and results applying Support Vector Machine (SVM) to a Computer Intrusion Detection (CID) dataset. First, issues in supervised classification are discussed, then the… Expand

Anomaly Detection Enhanced Classification in Computer Intrusion Detection

- Mike Fugate, J. Gattiker
- Computer Science
- SVM
- 10 August 2002

This paper describes experiences and results applying Support Vector Machine (SVM) to a Computer Intrusion Detection (CID) dataset. This is the second stage of work with this dataset, emphasizing… Expand

Dynamic Bayesian Influenza Forecasting in the United States with Hierarchical Discrepancy

- D. Osthus, J. Gattiker, R. Priedhorsky, S. Valle
- Mathematics
- 30 August 2017

Timely and accurate forecasts of seasonal influenza would assist public health decision-makers in planning intervention strategies, efficiently allocating resources, and possibly saving lives. For… Expand

Alarm criteria in radiation portal monitoring.

- T. Burr, J. Gattiker, K. Myers, G. Tompkins
- Chemistry, Medicine
- Applied radiation and isotopes : including data…
- 1 May 2007

Gamma detectors at border crossings are intended to detect illicit nuclear material. These detectors collect counts that are used to determine whether to trigger an alarm. Several candidate alarm… Expand

A Synergistic Model for Representing and Interpreting Human Activities and Events from Video

- N. Bourbakis, J. Gattiker, G. Bebis
- Computer Science
- Int. J. Artif. Intell. Tools
- 1 March 2003

This paper describes a new and innovative and approach for representing, recognizing and interpreting human activity from video, contributing to an automated system capable of recognition of complex… Expand