PNNL computer scientists joined international leaders in machine learning to present research to detect and address potential cybersecurity threats and devise epidemic interventions.
PNNL data scientists Svitlana Volkova and Emily Saldanha, along with former PNNL intern Pamela Bilo Thomas, will publish their research on online information spread in Nature's Scientific Reports.
By combining state-of-the-art computational and experimental approaches, researchers have begun to resolve the effects of solvent molecules on electron transfer.
PNNL researchers Leo Fifield, Mike Larche, and Bishnu Bhattarai were recently elected to the board of the Institute of Electrical and Electronics Engineers Richland, Washington section.
Niri Govind and Amity Andersen co-hosted a workshop to explain how to use theory and modeling in the interpretation of X-ray absorption spectroscopy data.
Michael Henry, a senior data scientist at PNNL, has accepted a joint appointment at the Texas A&M University RELLIS Center for Applied Research and Experiential Learning.
(ISC)², the world’s largest nonprofit association of cybersecurity professionals, elected PNNL cybersecurity expert Lori Ross O’Neil as vice chairperson of the board of directors.
Sriram Krishnamoorthy, a computer scientist at PNNL, collaborated with a University of Utah team on a student computing research project that won Best Student Paper at SC20.
PNNL data scientists Henry Kvinge and Ted Fujimoto presented their research on few-shot learning and reinforcement learning, respectively, at workshops during the 2021 AAAI Conference on Artificial Intelligence.
As a member of the NAM board of directors, Brett Jefferson, PNNL data scientist, will help lead the professional association’s mission to advance mathematical excellence of underrepresented minorities.
The partnership to apply artificial intelligence to improve complex systems is part of a U.S. Department of Energy Office of Science $4.2 million, three-year grant.
Red teaming for CPS, the process of challenging systems, involves a group of cybersecurity experts to emulate end-to-end cyberattacks following a set of realistic tactics, techniques, and procedures.