Massachusetts Institute of Technology
Sign in | Create Account

R. Scott Kemp

Professor R. Scott Kemp is looking at how to move past traditional technical modes of verification by using open source literature as a way to detect clandestine nuclear programs.

Comments (0)

You need to log in, in order to post comments. If you don’t have an account yet, sign up now!

Research Thumbnails

Research Thumbnails

Category: Engineering | Updated 6 months ago

Created
February 17, 2014 14:06
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
837 times

More from Research Thumbnails

Michael Short

Michael Short

Added 7 months ago | 00:01:26 | 926 views

Paola Cappellaro

Paola Cappellaro

Added 6 months ago | 00:01:50 | 736 views

Anne White

Anne White

Added 8 months ago | 00:01:24 | 1106 views

Jacopo Buongiorno

Jacopo Buongiorno

Added 7 months ago | 00:03:13 | 844 views

Ju Li

Ju Li

Added 1 year ago | 00:00:52 | 1307 views

R. Scott Kemp

R. Scott Kemp

Added over 1 year ago | 00:00:33 | 1162 views