Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Strategies For Sensor Data Aggregation In Support Of Emergency Response, X. Wang, A. Walden, M. Weigle, S. Olariu
Strategies For Sensor Data Aggregation In Support Of Emergency Response, X. Wang, A. Walden, M. Weigle, S. Olariu
Computer Science Presentations
PDF of a powerpoint presentation from the Military Communications Conference (MILCOM), Baltimore, Maryland, October 7, 2014. Also available on Slideshare.
Automating Deployment Of Several Gbrowse Instances, Neil Moore, Jerzy W. Jaromczyk, Christopher L. Schardl, Joedocei Hill, Devin Wright
Automating Deployment Of Several Gbrowse Instances, Neil Moore, Jerzy W. Jaromczyk, Christopher L. Schardl, Joedocei Hill, Devin Wright
Computer Science Presentations
Background
As part of the fungal endophyte genomes project, we maintain genome browsers for several dozen strains of fungi from the Clavicipitaceae and related families. These genome browsers are based on the GBrowse software, with a large collection of in-house software for visualization, analysis, and searching of genome features.
Although GBrowse supports serving multiple data sources, such as distinct genome assemblies, from a single GBrowse instance, there are advantages to maintaining separate instances for each genome. Besides permitting per-genome customizations of the software, page layout, and database schemas, our use of separate instances also allows us to maintain different security …
Communications And Energy-Harvesting In Nanosensor Networks, Michele C. Weigle
Communications And Energy-Harvesting In Nanosensor Networks, Michele C. Weigle
Computer Science Presentations
PDF of a powerpoint presentation from the National Science Foundation (NSF) Workshop on Biological Computations and Communications in Boston, Massachusetts, November 9, 2012. Also available on Slideshare.
Using Timed-Release Cryptography To Mitigate The Preservation Risk Of Embargo Periods, Rabia Haq, Michael L. Nelson
Using Timed-Release Cryptography To Mitigate The Preservation Risk Of Embargo Periods, Rabia Haq, Michael L. Nelson
Computer Science Presentations
PDF of a powerpoint presentation from the 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin, Texas, June 15-19, 2009. Also available on Slideshare.