Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 53 of 53

Full-Text Articles in Engineering

Prox-Rbac: A Proximity-Based Spatially Aware Rbac, Michael Kirkpatrick, Maria Luisa Damiani, Elisa Bertino Jan 2011

Prox-Rbac: A Proximity-Based Spatially Aware Rbac, Michael Kirkpatrick, Maria Luisa Damiani, Elisa Bertino

Cyber Center Publications

As mobile computing devices are becoming increasingly dominant in enterprise and government organizations, the need for fine-grained access control in these environments continues to grow. Specifically, advanced forms of access control can be deployed to ensure authorized users can access sensitive resources only when in trusted locations. One technique that has been proposed is to augment role-based access control (RBAC) with spatial constraints. In such a system, an authorized user must be in a designated location in order to exercise the privileges associated with a role. In this work, we extend spatially aware RBAC systems by defining the notion of …


Network Science: Using Information Technology To Enable Collaboration, Arden L. Bement Jr. Dec 2010

Network Science: Using Information Technology To Enable Collaboration, Arden L. Bement Jr.

PPRI Digital Library

No abstract provided.


Endogenous Sirnas And Noncoding Rna-Derived Small Rnas Are Expressed In Adult Mouse Hippocampus And Are Up-Regulated In Olfactory Discrimination Training., Neil Smalheiser, G Lugli, Jyothi Thimmapuram, E.H. Cook, J Larson Nov 2010

Endogenous Sirnas And Noncoding Rna-Derived Small Rnas Are Expressed In Adult Mouse Hippocampus And Are Up-Regulated In Olfactory Discrimination Training., Neil Smalheiser, G Lugli, Jyothi Thimmapuram, E.H. Cook, J Larson

Cyber Center Publications

We previously proposed that endogenous siRNAs may regulate synaptic plasticity and long-term gene expression in the mammalian brain. Here, a hippocampal-dependent task was employed in which adult mice were trained to execute a nose-poke in a port containing one of two simultaneously present odors in order to obtain a reward. Mice demonstrating olfactory discrimination training were compared to pseudo-training and nose-poke control groups; size-selected hippocampal RNA was subjected to Illumina deep sequencing. Sequences that aligned uniquely and exactly to the genome without uncertain nucleotide assignments, within exons or introns of MGI annotated genes, were examined further. The data confirm that …


Green Technology: Think Globally, Act Locally, Arden L. Bement Jr. Oct 2010

Green Technology: Think Globally, Act Locally, Arden L. Bement Jr.

PPRI Digital Library

No abstract provided.


A Database Server For Next-Generation Scientific Data Management, Mohamed Eltabakh, Walid G. Aref, Ahmed Elmagarmid Jan 2010

A Database Server For Next-Generation Scientific Data Management, Mohamed Eltabakh, Walid G. Aref, Ahmed Elmagarmid

Cyber Center Publications

The growth of scientific information and the increasing automation of data collection have made databases integral to many scientific disciplines including life sciences, physics, meteorology, earth and atmospheric sciences, and chemistry. These sciences pose new data management challenges to current database system technologies. This dissertation addresses the following three challenges: (1) Annotation Management: Annotations and provenance information are important metadata that go hand-in-hand with scientific data. Annotating scientific data represents a vital mechanism for scientists to share knowledge and build an interactive and collaborative environment. A major challenge is: How to manage large volumes of annotations, especially at various granularities, …


Spatio-Temporal Access Methods: Part 2 (2003 - 2010), Long-Van Nguyen-Dinh, Walid G. Aref, Mohamed Mokbel Jan 2010

Spatio-Temporal Access Methods: Part 2 (2003 - 2010), Long-Van Nguyen-Dinh, Walid G. Aref, Mohamed Mokbel

Cyber Center Publications

In spatio-temporal applications, moving objects detect their locations via location-aware devices and update their locations continuously to the server. With the ubiquity and massive numbers of moving objects, many spatio-temporal access methods are developed to process user queries efficiently. Spatio- temporal access methods are classified into four categories: (1) Indexing the past data, (2) Indexing the current data, (3) Indexing the future data, and (4) Indexing data at all points of time. This short survey is Part 2 of our previous work [28]. In Part 2, we give an overview and classification of spatio-temporal access methods that are published between …


Privometer: Privacy Protection In Social Networks, Nilothpal Talukder, Mourad Ouzzani, Ahmed Elmagarmid, Hazem Elmeleegy Jan 2010

Privometer: Privacy Protection In Social Networks, Nilothpal Talukder, Mourad Ouzzani, Ahmed Elmagarmid, Hazem Elmeleegy

Cyber Center Publications

The increasing popularity of social networks, such as Facebook and Orkut, has raised several privacy concerns. Traditional ways of safeguarding privacy of personal information by hiding sensitive attributes are no longer adequate. Research shows that probabilistic classification techniques can effectively infer such private information. The disclosed sensitive information of friends, group affiliations and even participation in activities, such as tagging and commenting, are considered background knowledge in this process. In this paper, we present a privacy protection tool, called Privometer, that measures the amount of sensitive information leakage in a user profile and suggests selfsanitization actions to regulate the amount …


Online Piece-Wise Linear Approximation Of Numerical Streams With Precision Guarantees, Hazem Elmeleegy, Ahmed Elmagarmid, Emmanuel Cecchet, Walid G. Aref, Willy Zwaenepoel Aug 2009

Online Piece-Wise Linear Approximation Of Numerical Streams With Precision Guarantees, Hazem Elmeleegy, Ahmed Elmagarmid, Emmanuel Cecchet, Walid G. Aref, Willy Zwaenepoel

Cyber Center Publications

Continuous “always-on” monitoring is beneficial for a number of applications, but potentially imposes a high load in terms of communication, storage and power consumption when a large number of variables need to be monitored. We introduce two new filtering techniques, swing filters and slide filters, that represent within a prescribed precision a time-varying numerical signal by a piecewise linear function, consisting of connected line segments for swing filters and (mostly) disconnected line segments for slide filters. We demonstrate the effectiveness of swing and slide filters in terms of their compression power by applying them to a reallife data set plus …


Diversity And Strain Specificity Of Plant Cell Wall Degrading Enzymes Revealed By The Draft Genome Of Ruminococcus Flavefaciens Fd-1, Margret E. Berg Miller, Dionysios A. Antonopoulos, Mark Brand, Albert Bari, Alvaro Hernandez, Jyothi Thimmapuram, Bryan A. White, Marco Rincon, Harry J. Flint, Bernard Henrissat, Pedro M. Coutinho Aug 2009

Diversity And Strain Specificity Of Plant Cell Wall Degrading Enzymes Revealed By The Draft Genome Of Ruminococcus Flavefaciens Fd-1, Margret E. Berg Miller, Dionysios A. Antonopoulos, Mark Brand, Albert Bari, Alvaro Hernandez, Jyothi Thimmapuram, Bryan A. White, Marco Rincon, Harry J. Flint, Bernard Henrissat, Pedro M. Coutinho

Cyber Center Publications

Ruminococcus flavefaciens is a predominant cellulolytic rumen bacterium, which forms a multi-enzyme cellulosome complex that could play an integral role in the ability of this bacterium to degrade plant cell wall polysaccharides. Identifying the major enzyme types involved in plant cell wall degradation is essential for gaining a better understanding of the cellulolytic capabilities of this organism as well as highlighting potential enzymes for application in improvement of livestock nutrition and for conversion of cellulosic biomass to liquid fuels.


Generalization Of Acid Properties, Brahim Medjahed, Mourad Ouzzani, Ahmed Elmagarmid Jan 2009

Generalization Of Acid Properties, Brahim Medjahed, Mourad Ouzzani, Ahmed Elmagarmid

Cyber Center Publications

ACID (Atomicity, Consistency, Isolation, and Durability) is a set of properties that guarantee the reliability of database transactions [2]. ACID properties were initially developed with traditional, business-oriented applications (e.g., banking) in mind. Hence, they do not fully support the functional and performance requirements of advanced database applications such as computer-aided design, computer-aided manufacturing, office automation, network management, multidatabases, and mobile databases. For instance, transactions in computer-aided design applications are generally of long duration and preserving the traditional ACID properties in such transactions would require locking resources for long periods of time. This has lead to the generalization of ACID properties …


Beyond K-Anonymity: A Decision Theoretic Framework For Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, Elisa Bertino Jan 2009

Beyond K-Anonymity: A Decision Theoretic Framework For Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, Elisa Bertino

Cyber Center Publications

An important issue any organization or individual has to face when managing data containing sensitive information, is the risk that can be incurred when releasing such data. Even though data may be sanitized before being released, it is still possible for an adversary to reconstruct the original data using additional information thus resulting in privacy violations. To date, however, a systematic approach to quantify such risks is not available. In this paper we develop a framework, based on statistical decision theory, that assesses the relationship between the disclosed data and the resulting privacy risk. We model the problem of deciding …


Query Mesh: Multiroute, Rimma Nehme, Karen Works, Elke Rundensteiner, Elisa Bertino Jan 2009

Query Mesh: Multiroute, Rimma Nehme, Karen Works, Elke Rundensteiner, Elisa Bertino

Cyber Center Publications

We propose to demonstrate a practical alternative approach to the current state-of-the-art query processing techniques, called the “Query Mesh” (or QM, for short). The main idea of QM is to compute multiple routes (i.e., query plans)1, each designed for a particular subset of data with distinct statistical properties. Based on the execution routes and the data characteristics, a classifier model is induced and is used to partition new data tuples to assign the best routes for their processing. We propose to demonstrate the QM framework in the streaming context using our demo application, called the “Ubi-City”. We will illustrate the …


A Hierarchical Approach To Model Web Query Interfaces For Web Source Integration, Thomas Kabisch, Eduard Dragut, Clement Yu, Ulf Leser Jan 2009

A Hierarchical Approach To Model Web Query Interfaces For Web Source Integration, Thomas Kabisch, Eduard Dragut, Clement Yu, Ulf Leser

Cyber Center Publications

Much data in the Web is hidden behind Web query interfaces. In most cases the only means to "surface" the content of a Web database is by formulating complex queries on such interfaces. Applications such as Deep Web crawling and Web database integration require an automatic usage of these interfaces. Therefore, an important problem to be addressed is the automatic extraction of query interfaces into an appropriate model. We hypothesize the existence of a set of domain-independent "commonsense design rules" that guides the creation of Web query interfaces. These rules transform query interfaces into schema trees. In this paper we …


Private Queries And Trajectory Anonymization: A Dual Perspective On Location Privacy, Gabriel Ghinita Jan 2009

Private Queries And Trajectory Anonymization: A Dual Perspective On Location Privacy, Gabriel Ghinita

Cyber Center Publications

The emergence of mobile devices with Internet connectivity (e.g., Wi-Fi) and global positioning capabilities (e.g., GPS) have triggered the widespread development of location-based applications. For instance, users are able to ask queries about points of interest in their proximity. Furthermore, users can act as mobile sensors to monitor traffic flow, or levels of air pollution. However, such applications require users to disclose their locations, which raises serious privacy concerns. With knowledge of user locations, a malicious attacker can infer sensitive information, such as alternative lifestyles or political affiliations. Preserving location privacy is an essential requirement towards the successful deployment of …


The Plant Ionome Coming Into Focus, Lorraine Williams, David Salt Jan 2009

The Plant Ionome Coming Into Focus, Lorraine Williams, David Salt

Cyber Center Publications

92 elements have been identified on earth and 17 of these are known to be essential to all plants. The essential elements required in relatively large amounts (>0.1% of dry mass) are called macronutrients and include C, H, O, N, S, P, Ca, K, Mg. Those required in much smaller amounts (<0.01% of dry mass) are referred to as micronutrients or trace elements and include Ni, Mo, Cu, Zn, Mn, B, Fe, and Cl. Plant growth and development depends on a balanced supply of these essential elements and thus the plant has a range of homeostatic mechanisms operating to ensure that this is maintained. Beneficial elements which promote growth and may be essential to some taxa, include Na, Co, Al, Se and Si. Elements such as the heavy metal Cd and the metalloid As have no demonstrated biological function in plants, but are nevertheless taken up and cause severe toxicity in most plant species. The concept for this special issue is the plant ionome, a word coined to encompass all these elements and allow focussed discussion and investigations on the mechanisms that co-ordinately regulate these elements in response to genetic and environmental factors reviewed in Salt et al., 2008).


Foreword For The Special Issue Of Selected Papers From The 1st Acm Sigspatial Workshop On Security And Privacy In Gis And Lbs, Elisa Bertino, Maria Luisa Damiani Jan 2009

Foreword For The Special Issue Of Selected Papers From The 1st Acm Sigspatial Workshop On Security And Privacy In Gis And Lbs, Elisa Bertino, Maria Luisa Damiani

Cyber Center Publications

The first Workshop on Security and Privacy in GIS and LBS (SPRINGL 2008) was organized on November 4, 2008 at Irvine (CA) in conjunction with the SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM GIS 2008). The goal of the SPRINGL workshop series is to provide a forum for researchers working in the area of geospatial data security and privacy. Both security and privacy are critical for geospatial applications because of the dramatic increase and dissemination of geospatial data in several application contexts including homeland security, environmental crises, and natural and industrial disasters. Furthermore, geospatial infrastructures are being …


Location Privacy In Moving-Object Environments, Dan Lin, Elisa Bertino, Reynold Cheng, Sunil Prabhakar Jan 2009

Location Privacy In Moving-Object Environments, Dan Lin, Elisa Bertino, Reynold Cheng, Sunil Prabhakar

Cyber Center Publications

The expanding use of location-based services has profound implications on the privacy of personal information. If no adequate protection is adopted, information about movements of specific individuals could be disclosed to unauthorized subjects or organizations, thus resulting in privacy breaches. In this paper, we propose a framework for preserving location privacy in moving-object environments. Our approach is based on the idea of sending to the service provider suitably modified location information. Such modifications, that include transformations like scaling, are performed by agents interposed between users and service providers. Agents execute data transformation and the service provider directly processes the transformed …


Transcriptome Analysis Identifies Novel Responses And Potential Regulatory Genes Involved In Seasonal Dormancy Transitions Of Leafy Spurge (Euphorbia Esula L.), David P. Horvath, Wun S. Chao, Jeffrey C. Suttle, Jyothi Thimmapuram, James V. Anderson Nov 2008

Transcriptome Analysis Identifies Novel Responses And Potential Regulatory Genes Involved In Seasonal Dormancy Transitions Of Leafy Spurge (Euphorbia Esula L.), David P. Horvath, Wun S. Chao, Jeffrey C. Suttle, Jyothi Thimmapuram, James V. Anderson

Cyber Center Publications

Dormancy of buds is a critical developmental process that allows perennial plants to survive extreme seasonal variations in climate. Dormancy transitions in underground crown buds of the model herbaceous perennial weed leafy spurge were investigated using a 23 K element cDNA microarray. These data represent the first large-scale transcriptome analysis of dormancy in underground buds of an herbaceous perennial species. Crown buds collected monthly from August through December, over a five year period, were used to monitor the changes in the transcriptome during dormancy transitions.


Development And Annotation Of Perennial Triticeae Ests And Ssr Markers., B.S. Bushman, S R Larson, I W Mott, P F Cliften, R R Wang, N J Chatterton, A G Hernandez, S Ali, R W Kim, Jyothi Thimmapuram, G Gong, L Liu, M A Mikel Oct 2008

Development And Annotation Of Perennial Triticeae Ests And Ssr Markers., B.S. Bushman, S R Larson, I W Mott, P F Cliften, R R Wang, N J Chatterton, A G Hernandez, S Ali, R W Kim, Jyothi Thimmapuram, G Gong, L Liu, M A Mikel

Cyber Center Publications

Triticeae contains hundreds of species of both annual and perennial types. Although substantial genomic tools are available for annual Triticeae cereals such as wheat and barley, the perennial Triticeae lack sufficient genomic resources for genetic mapping or diversity research. To increase the amount of sequence information available in the perennial Triticeae, three expressed sequence tag (EST) libraries were developed and annotated for Pseudoroegneria spicata, a mixture of both Elymus wawawaiensis and E. lanceolatus, and a Leymus cinereus x L. triticoides interspecific hybrid. The ESTs were combined into unigene sets of 8 780 unigenes for P. spicata, 11 281 unigenes for …


Genes Controlling Plant Growth Habit In Leymus (Triticeae): Maize Barren Stalk1 (Ba1), Rice Lax Panicle, And Wheat Tiller Inhibition (Tin3) Genes As Possible Candidates., Paraminder Kaur, Steven R. Larson, B.S. Bushman, Richard R. Wang, Ivan W. Mott, Jyothi Thimmapuram, George Gong, Lei Liu Jun 2008

Genes Controlling Plant Growth Habit In Leymus (Triticeae): Maize Barren Stalk1 (Ba1), Rice Lax Panicle, And Wheat Tiller Inhibition (Tin3) Genes As Possible Candidates., Paraminder Kaur, Steven R. Larson, B.S. Bushman, Richard R. Wang, Ivan W. Mott, Jyothi Thimmapuram, George Gong, Lei Liu

Cyber Center Publications

Leymus cinereus and L. triticoides are large caespitose and rhizomatous perennial grasses, respectively. Previous studies detected quantitative trait loci (QTL) controlling rhizome spreading near the viviparous1 (vp1) gene markers on linkage groups LG3a and LG3b in two families, TTC1 and TTC2, derived from Leymus triticoides x Leymus cinereus hybrids. The wheat tiller inhibition gene (tin3) is located on Triticum monococcum chromosome 3 A(m)L near vp1. Triticeae group 3 is reportedly collinear with rice chromosome 1, which also contains the maize barren stalk1 and rice lax branching orthogene near vp1. However, previous studies lacked cross-species markers for comparative mapping and showed …


The Draft Genome Of The Transgenic Tropical Fruit Tree Papaya ( Carica Papaya Linnaeus), Ray Ming, Shaobin Hou, Yun Feng, Qinguyi Yu, Jyothi Thimmapuram Apr 2008

The Draft Genome Of The Transgenic Tropical Fruit Tree Papaya ( Carica Papaya Linnaeus), Ray Ming, Shaobin Hou, Yun Feng, Qinguyi Yu, Jyothi Thimmapuram

Cyber Center Publications

Papaya, a fruit crop cultivated in tropical and subtropical regions, is known for its nutritional benefits and medicinal applications. Here we report a 3 draft genome sequence of 'SunUp' papaya, the first commercial virus-resistant transgenic fruit tree1 to be sequenced. The papaya genome is three times the size of the Arabidopsis genome, but contains fewer genes, including significantly fewer disease-resistance gene analogues. Comparison of the five sequenced genomes suggests a minimal angiosperm gene set of 13,311. A lack of recent genome duplication, atypical of other angiosperm genomes sequenced so far may account for the smaller papaya gene number in …


Meaningful Labeling Of Integrated Query Interfaces, Eduard Dragut, Clement Yu, Weiyi Meng Jan 2006

Meaningful Labeling Of Integrated Query Interfaces, Eduard Dragut, Clement Yu, Weiyi Meng

Cyber Center Publications

The contents of Web databases are accessed through queries formulated on complex user interfaces. In many domains of interest (e.g. Auto) users are interested in obtaining information from alternative sources. Thus, they have to access many individual Web databases via query interfaces. We aim to construct automatically a well-designed query interface that integrates a set of interfaces in the same domain. This will permit users to access information uniformly from multiple sources. Earlier research in this area includes matching attributes across multiple query interfaces in the same domain and grouping related attributes. In this paper, we investigate the naming of …


Bicistronic And Fused Monocistronic Transcripts Are Derived From Adjacent Loci In The Arabidopsis Genome, Jyothi Thimmapuram, Hui Duan, Lei Liu, Mary A. Schuler Nov 2004

Bicistronic And Fused Monocistronic Transcripts Are Derived From Adjacent Loci In The Arabidopsis Genome, Jyothi Thimmapuram, Hui Duan, Lei Liu, Mary A. Schuler

Cyber Center Publications

Comparisons of full-length cDNAs and genomic DNAs available for Arabidopsis thaliana described here indicate that some adjacent loci are transcribed into extremely long RNAs spanning two annotated genes. Once expressed, some of these transcripts are post-transcriptionally spliced within their coding and intergenic sequences to generate bicistronic transcripts containing two complete open reading frames. Others are spliced to generate monocistronic transcripts coding for fusion proteins with sequences derived from both loci. RT-PCR of several P450 transcripts in this collection indicates that these extended transcripts exist side by side with shorter monocistronic transcripts derived from the individual loci in each pair. The …