scispace - formally typeset
Search or ask a question
Institution

Hewlett-Packard

CompanyPalo Alto, California, United States
About: Hewlett-Packard is a company organization based out in Palo Alto, California, United States. It is known for research contribution in the topics: Signal & Substrate (printing). The organization has 34663 authors who have published 59808 publications receiving 1467218 citations. The organization is also known as: Hewlett Packard & Hewlett-Packard Company.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors reported triggered single-photon emission from gallium nitride quantum dots at temperatures up to 200 K, a temperature easily reachable with thermo-electric cooling.
Abstract: Fundamentally secure quantum cryptography has still not seen widespread application owing to the difficulty of generating single photons on demand. Semiconductor quantum-dot structures have recently shown great promise as practical single-photon sources, and devices with integrated optical cavities and electrical-carrier injection have already been demonstrated. However, a significant obstacle for the application of commonly used III–V quantum dots to quantum-information-processing schemes is the requirement of liquid-helium cryogenic temperatures. Epitaxially grown gallium nitride quantum dots embedded in aluminium nitride have the potential for operation at much higher temperatures. Here, we report triggered single-photon emission from gallium nitride quantum dots at temperatures up to 200 K, a temperature easily reachable with thermo-electric cooling. Gallium nitride quantum dots also open a new wavelength region in the blue and near-ultraviolet portions of the spectrum for single-photon sources.

417 citations

Proceedings Article
01 May 2001
TL;DR: Jena, an RDF API in Java based on an interpretation of the W3C RDF Model and Syntax Specification, is described.
Abstract: Some aspects of W3C's RDF Model and Syntax Specification require careful reading and interpretation to produce a conformant implementation. Issues have arisen around anonymous resources, reification and RDF Graphs. These and other issues are identified, discussed and an interpretation of each is proposed. Jena, an RDF API in Java based on this interpretation, is described.

412 citations

PatentDOI
TL;DR: It should become possible, with a temporal microscope, to expand ultrafast optical phenomena to a time scale that is accessible to conventional high-speed photodiodes.
Abstract: A temporal imaging system is presented consisting of a dispersive input path, a phase modulator producing a phase modulation substantially equal to A+Bt 2 , and an output dispersive path. This temporal imaging system can be combined with other temporal lenses to image input signals in the same manner that spatial lenses can be used to image light from spatial sources. In particular, this temporal imaging system can be used to expand, compress and or invert input temporal signals.

411 citations

Proceedings ArticleDOI
Ping Wah Wong1
04 Oct 1998
TL;DR: A public key watermarking algorithm for image integrity verification that uses a public key as in public key cryptography, and hence it can be performed by any person without the secure exchange of a secret key.
Abstract: We propose a public key watermarking algorithm for image integrity verification. This watermark is capable of detecting any change made to an image, including changes in pixel values and image size. This watermark is important for several imaging applications, including trusted camera, legal usage of images, medical archiving of images, news reporting, commercial image transaction, and others. In each of these applications, it is important to verify that the image has not been manipulated and that the image was originated by either a specific camera or a specific user. The verification (the watermark extraction) procedure uses a public key as in public key cryptography, and hence it can be performed by any person without the secure exchange of a secret key. This is very important in many applications (e.g., trusted camera, news reporting) where the exchange of a secret key is either not possible or undesirable.

410 citations

Patent
27 Jun 1996
TL;DR: In this paper, a distributed STREAMS process operates on a multicomputer system composed of a cluster of nodes of one or more processors running an operating system having a file system and a message-passing mechanism implementing network protocols, client-server applications, and STREAMs-based pipes.
Abstract: A distributed STREAMS process operates on a multicomputer system composed of a cluster of nodes of one or more processors running an operating system having a file system and a STREAMS message-passing mechanism implementing network protocols, client-server applications, and STREAMS-based pipes. A local node has a software application operative under the operating system. The distributed STREAMS process determines that it is operating within a cluster and transparently intercepts application open requests which are sent to a controlling thread (CT) created during node initialization. The CT determines whether the open is to occur on the local or a remote node and whether any cluster facility should be activated by examining major and minor numbers encoded within the file structure being opened. If the CT determines a local open is to occur, it performs a local open, as normal, and activates the indicated cluster facilities. If the CT determines a remote open is to occur, it uses the STREAMS mechanism to establish a connection to the remote node via a STREAMS software interconnect driver (S-ICS) operating on both nodes. The local node's CT then communicates the open request to the remote node's CT which performs an internal STREAMS open to create data structures and infrastructure to ensure proper communication and error recovery. If a failure occurs, the CT and S-ICS detect this failure and transparently initiate error recovery by migrating failed components, if possible, to new node(s) within the cluster. This migration capability can also be used to provide load balancing within the cluster of distributed STREAMS.

409 citations


Authors

Showing all 34676 results

NameH-indexPapersCitations
Andrew White1491494113874
Stephen R. Forrest1481041111816
Rafi Ahmed14663393190
Leonidas J. Guibas12469179200
Chenming Hu119129657264
Robert E. Tarjan11440067305
Hong-Jiang Zhang11246149068
Ching-Ping Wong106112842835
Guillermo Sapiro10466770128
James R. Heath10342558548
Arun Majumdar10245952464
Luca Benini101145347862
R. Stanley Williams10060546448
David M. Blei98378111547
Wei-Ying Ma9746440914
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

94% related

Samsung
163.6K papers, 2M citations

90% related

Carnegie Mellon University
104.3K papers, 5.9M citations

90% related

Microsoft
86.9K papers, 4.1M citations

90% related

Bell Labs
59.8K papers, 3.1M citations

89% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20231
202223
2021240
20201,028
20191,269
2018964