Search Results for author: Jim Gray

Found 2 papers, 2 papers with code

Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic

1 code implementation19 Mar 2020 Ramesh Raskar, Isabel Schunemann, Rachel Barbar, Kristen Vilcans, Jim Gray, Praneeth Vepakomma, Suraj Kapa, Andrea Nuzzo, Rajiv Gupta, Alex Berke, Dazza Greenwood, Christian Keegan, Shriank Kanaparti, Robson Beaudry, David Stansbury, Beatriz Botero Arcila, Rishank Kanaparti, Francesco M Benedetti, Alina Clough, Riddhiman Das, Kaushal Jain, Khahlil Louisy, Greg Nadeau, Vitor Pamplona, Steve Penrod, Yasaman Rajaee, Abhishek Singh, Greg Storm, John Werner

Containment, the key strategy in quickly halting an epidemic, requires rapid identification and quarantine of the infected individuals, determination of whom they have had close contact with in the previous days and weeks, and decontamination of locations the infected individual has visited.

Cryptography and Security Computers and Society Distributed, Parallel, and Cluster Computing

Indexing the Sphere with the Hierarchical Triangular Mesh

1 code implementation26 Jan 2007 Alexander S. Szalay, Jim Gray, George Fekete, Peter Z. Kunszt, Peter Kukol, Ani Thakar

We describe a method to subdivide the surface of a sphere into spherical triangles of similar, but not identical, shapes and sizes.

Databases Data Structures and Algorithms

Cannot find the paper you are looking for? You can Submit a new open access paper.