Open Access. Powered by Scholars. Published by Universities.®

Medicine and Health Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Medicine and Health Sciences

Network Science: Using Information Technology To Enable Collaboration, Arden L. Bement Jr. Dec 2010

Network Science: Using Information Technology To Enable Collaboration, Arden L. Bement Jr.

PPRI Digital Library

No abstract provided.


Endogenous Sirnas And Noncoding Rna-Derived Small Rnas Are Expressed In Adult Mouse Hippocampus And Are Up-Regulated In Olfactory Discrimination Training., Neil Smalheiser, G Lugli, Jyothi Thimmapuram, E.H. Cook, J Larson Nov 2010

Endogenous Sirnas And Noncoding Rna-Derived Small Rnas Are Expressed In Adult Mouse Hippocampus And Are Up-Regulated In Olfactory Discrimination Training., Neil Smalheiser, G Lugli, Jyothi Thimmapuram, E.H. Cook, J Larson

Cyber Center Publications

We previously proposed that endogenous siRNAs may regulate synaptic plasticity and long-term gene expression in the mammalian brain. Here, a hippocampal-dependent task was employed in which adult mice were trained to execute a nose-poke in a port containing one of two simultaneously present odors in order to obtain a reward. Mice demonstrating olfactory discrimination training were compared to pseudo-training and nose-poke control groups; size-selected hippocampal RNA was subjected to Illumina deep sequencing. Sequences that aligned uniquely and exactly to the genome without uncertain nucleotide assignments, within exons or introns of MGI annotated genes, were examined further. The data confirm that …


A Database Server For Next-Generation Scientific Data Management, Mohamed Eltabakh, Walid G. Aref, Ahmed Elmagarmid Jan 2010

A Database Server For Next-Generation Scientific Data Management, Mohamed Eltabakh, Walid G. Aref, Ahmed Elmagarmid

Cyber Center Publications

The growth of scientific information and the increasing automation of data collection have made databases integral to many scientific disciplines including life sciences, physics, meteorology, earth and atmospheric sciences, and chemistry. These sciences pose new data management challenges to current database system technologies. This dissertation addresses the following three challenges: (1) Annotation Management: Annotations and provenance information are important metadata that go hand-in-hand with scientific data. Annotating scientific data represents a vital mechanism for scientists to share knowledge and build an interactive and collaborative environment. A major challenge is: How to manage large volumes of annotations, especially at various granularities, …


Spatio-Temporal Access Methods: Part 2 (2003 - 2010), Long-Van Nguyen-Dinh, Walid G. Aref, Mohamed Mokbel Jan 2010

Spatio-Temporal Access Methods: Part 2 (2003 - 2010), Long-Van Nguyen-Dinh, Walid G. Aref, Mohamed Mokbel

Cyber Center Publications

In spatio-temporal applications, moving objects detect their locations via location-aware devices and update their locations continuously to the server. With the ubiquity and massive numbers of moving objects, many spatio-temporal access methods are developed to process user queries efficiently. Spatio- temporal access methods are classified into four categories: (1) Indexing the past data, (2) Indexing the current data, (3) Indexing the future data, and (4) Indexing data at all points of time. This short survey is Part 2 of our previous work [28]. In Part 2, we give an overview and classification of spatio-temporal access methods that are published between …


Privometer: Privacy Protection In Social Networks, Nilothpal Talukder, Mourad Ouzzani, Ahmed Elmagarmid, Hazem Elmeleegy Jan 2010

Privometer: Privacy Protection In Social Networks, Nilothpal Talukder, Mourad Ouzzani, Ahmed Elmagarmid, Hazem Elmeleegy

Cyber Center Publications

The increasing popularity of social networks, such as Facebook and Orkut, has raised several privacy concerns. Traditional ways of safeguarding privacy of personal information by hiding sensitive attributes are no longer adequate. Research shows that probabilistic classification techniques can effectively infer such private information. The disclosed sensitive information of friends, group affiliations and even participation in activities, such as tagging and commenting, are considered background knowledge in this process. In this paper, we present a privacy protection tool, called Privometer, that measures the amount of sensitive information leakage in a user profile and suggests selfsanitization actions to regulate the amount …