Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Sciences

Gpu Deconvolution Wow Result On 2048x2048x32 Plane Z-Series, George Mcnamara Jun 2015

Gpu Deconvolution Wow Result On 2048x2048x32 Plane Z-Series, George Mcnamara

George McNamara

GPU Deconvolution WOW result on 2048x2048x32 plane Z-series ... formerly bad academic code ("you get what you pay for") now impressive

Alternative title: "instant gratification quantitative deconvolution fluorescence microscopy".

http://works.bepress.com/gmcnamara/55/

Please see "74"

http://works.bepress.com/gmcnamara/74/

for 32-bit images from this project (bepress file size limitation prevented me from including them in this ZIP archive).

//

Summary: Deconvolution microscopy has historically been painfully slow. The early vendors were:

- Scanalytics (Carrington and Fay), commercialized to try to sell expensive, specialized array processors made by CSPI (the CSPI box likely had less computing power than a first gen smartphone).

- Applied Precision (Sedat …


Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris Jun 2015

Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris

Computer Engineering

SSL currently uses certificates signed by Certificate Authorities (CAs) to authenticate connections. e.g. Google will pay a CA to sign a certificate for them, so that they can prove that they're not someone pretending to be Google. Unfortunately, this system has had multiple problems, and many believe that an alternative needs to be found.

One of the ideas for alternatives is using multiple "network perspectives" to authenticate a server. The idea behind this is that, though playing man-in-the-middle (MITM) with one connection is easy, it should be difficult for an adversary to do so with many connections, especially if they …