no code implementations • 23 Sep 2022 • Lena M. Downes, Ted J. Steiner, Rebecca L. Russell, Jonathan P. How
This paper presents Restricted FOV Wide-Area Geolocalization (ReWAG), a cross-view geolocalization approach that generalizes WAG for use with standard, non-panoramic ground cameras by creating pose-aware embeddings and providing a strategy to incorporate particle pose into the Siamese network.
1 code implementation • 25 Feb 2021 • Alexander V. Gramolin, Rebecca L. Russell
Our reanalysis shows that the proton radius discrepancy cannot be explained by issues with fitting and extrapolating the A1 data to $Q^2 = 0$.
Nuclear Experiment High Energy Physics - Experiment High Energy Physics - Phenomenology Nuclear Theory
no code implementations • 31 Oct 2019 • Rebecca L. Russell, Christopher Reale
We experimentally show in a visual tracking problem the large impact that accurate multivariate uncertainty quantification can have on Kalman filter performance for both in-domain and out-of-domain evaluation data.
no code implementations • 8 Feb 2019 • Onur Ozdemir, Rebecca L. Russell, Andrew A. Berlin
We introduce a new computer aided detection and diagnosis system for lung cancer screening with low-dose CT scans that produces meaningful probability assessments.
2 code implementations • 11 Jul 2018 • Rebecca L. Russell, Louis Kim, Lei H. Hamilton, Tomo Lazovich, Jacob A. Harer, Onur Ozdemir, Paul M. Ellingwood, Marc W. McConley
The labeled dataset is available at: https://osf. io/d45bw/.
no code implementations • NeurIPS 2018 • Jacob Harer, Onur Ozdemir, Tomo Lazovich, Christopher P. Reale, Rebecca L. Russell, Louis Y. Kim, Peter Chin
Motivated by the problem of automated repair of software vulnerabilities, we propose an adversarial learning approach that maps from one discrete source domain to another target domain without requiring paired labeled examples or source and target domains to be bijections.
no code implementations • 14 Feb 2018 • Jacob A. Harer, Louis Y. Kim, Rebecca L. Russell, Onur Ozdemir, Leonard R. Kosta, Akshay Rangamani, Lei H. Hamilton, Gabriel I. Centeno, Jonathan R. Key, Paul M. Ellingwood, Erik Antelman, Alan Mackay, Marc W. McConley, Jeffrey M. Opper, Peter Chin, Tomo Lazovich
We then compare methods applied directly to source code with methods applied to artifacts extracted from the build process, finding that source-based models perform better.