Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Strategies For Sensor Data Aggregation In Support Of Emergency Response, X. Wang, A. Walden, M. Weigle, S. Olariu Oct 2014

Strategies For Sensor Data Aggregation In Support Of Emergency Response, X. Wang, A. Walden, M. Weigle, S. Olariu

Computer Science Presentations

PDF of a powerpoint presentation from the Military Communications Conference (MILCOM), Baltimore, Maryland, October 7, 2014. Also available on Slideshare.


Automating Deployment Of Several Gbrowse Instances, Neil Moore, Jerzy W. Jaromczyk, Christopher L. Schardl, Joedocei Hill, Devin Wright Sep 2014

Automating Deployment Of Several Gbrowse Instances, Neil Moore, Jerzy W. Jaromczyk, Christopher L. Schardl, Joedocei Hill, Devin Wright

Computer Science Presentations

Background

As part of the fungal endophyte genomes project, we maintain genome browsers for several dozen strains of fungi from the Clavicipitaceae and related families. These genome browsers are based on the GBrowse software, with a large collection of in-house software for visualization, analysis, and searching of genome features.

Although GBrowse supports serving multiple data sources, such as distinct genome assemblies, from a single GBrowse instance, there are advantages to maintaining separate instances for each genome. Besides permitting per-genome customizations of the software, page layout, and database schemas, our use of separate instances also allows us to maintain different security …


Communications And Energy-Harvesting In Nanosensor Networks, Michele C. Weigle Nov 2012

Communications And Energy-Harvesting In Nanosensor Networks, Michele C. Weigle

Computer Science Presentations

PDF of a powerpoint presentation from the National Science Foundation (NSF) Workshop on Biological Computations and Communications in Boston, Massachusetts, November 9, 2012. Also available on Slideshare.


Using Timed-Release Cryptography To Mitigate The Preservation Risk Of Embargo Periods, Rabia Haq, Michael L. Nelson Jun 2009

Using Timed-Release Cryptography To Mitigate The Preservation Risk Of Embargo Periods, Rabia Haq, Michael L. Nelson

Computer Science Presentations

PDF of a powerpoint presentation from the 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin, Texas, June 15-19, 2009. Also available on Slideshare.