John Cheng

Learn More
Recent reports describing the presence of lead (Pb) in lipsticks have suggested that, under ordinary use, the potential amount of Pb exposure is harmful. To permit independent assessment of the Pb contamination, a method for determining total Pb in lipstick using microwave-assisted digestion and analysis employing inductively coupled plasma-mass(More)
The effects of hydrophobic thickness and the molar phosphatidylglycerol (PG) content of lipid bilayers on the structure and membrane interaction of three cationic antimicrobial peptides were examined: aurein 2.2, aurein 2.3 (almost identical to aurein 2.2, except for a point mutation at residue 13), and a carboxy C-terminal analog of aurein 2.3. Circular(More)
This paper describes the current state of the OmniSeer system. OmniSeer supports intelligence analysts in the handling of massive amounts of data, the construction of scenarios, and the management of hypotheses. OmniSeer models analysts with dynamic user models that capture an analyst's context, interests, and preferences, thus enabling more efficient and(More)
The model of local spatial frequency provides a powerful analytical tool for image analysis. In this thesis we explore the application of this representation to long-standing problems in stereo vision. As the basis for this analysis, we develop a phase-based algorithm for stereo matching that uses an adaptive scale selection process. Our approach(More)
  • Maria Van Der Hoeven, Imre Gyuk, Rao Konidena, Scott Baker, Gunter Siddiqi, Jianhua Bai +57 others
  • 2014
The International Energy Agency (IEA), an autonomous agency, was established in November 1974. Its primary mandate was – and is – twofold: to promote energy security amongst its member countries through collective response to physical disruptions in oil supply, and provide authoritative research and analysis on ways to ensure reliable, affordable and clean(More)
  • Drew Dean, Sri International, Sean Guarino, Charles River, Analytics Leonard Eusebi, Charles River Analytics +13 others
  • 2015
Introduction The history of formal methods and computer security research is long and intertwined. Program logics that were in theory capable of proving security properties of software were developed by the early 1970s [1]. The development of the first security models [2-4] gave rise to a desire to prove that the models did, in fact, enforce the properties(More)
The US Government is authorized to reproduce and distribute reprints for Government purposes, notwithstanding any copyright notation thereon. Views and conclusions contained in this document are those of the authors and should not be interpreted as representing the oocial policies, either expressed or implied, of Wright Laboratory or the United States(More)
Standard Sudoku is a logic-based puzzle in which the user must fill a 9 x 9 board with the appropriate digits so that each row, column, and individual sub-grids (must be perfect squares) contains the digits 1-9. Sudoku is essentially a form of a constraint satisfaction problem, therefore we will use methods discussed in literature and lecture to help us(More)
  • 1