skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Pittman, T"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. We experimentally study the ability of a broadband “loop-and-switch” type quantum memory device to store entanglement. We find that one active loop-based memory and one passive fiber delay line can be used to faithfully store two polarization-entangled photons and demonstrate a rudimentary entanglement distribution protocol. The entangled photons are produced by a conventional spontaneous parametric down-conversion source with center wavelengths at 780 nm and bandwidths of ∼10 THz, while the memory has an even wider operational bandwidth that is enabled by the weakly dispersive nature of the Pockels effect used for polarization-insensitive active switching. These results help demonstrate the utility of loop-based quantum memories for quantum networking applications. 
    more » « less
  2. null (Ed.)
  3. There is a rapidly growing demand for individuals in cybersecurity and a deficit of persons able to fill those roles. To help meet this need, students not majoring in computing can be utilized to fulfill this demand by exposing them to date mining, cybersecurity practices, and applications of these concepts in the field. This paper presents findings from a twenty-one-week program in which minority undergraduate college students all members of the Reserve Officer Training Coprs (ROTC), were taught computer programming, natural language processing, data visualization, and computer vision fundamentals. Midshipmen and cadets used their newly gained knowledge, teamwork, planning, and communication skills to develop a threat dectection prototype using publicly available social media data. Resuls from pre and post python assessments and post-program interviews that recorded participant attitudes and sefl-efficacy are reported to highlight the programs' effectiveness. 
    more » « less