Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

These Are Not The K-Mers You Are Looking For: Efficient Online K-Mer Counting Using A Probabilistic Data Structure, Qingpeng Zhang, Jason Pell, Rosangela Canino-Koning, Adina Chuang Howe, C. Titus Brown Jul 2014

These Are Not The K-Mers You Are Looking For: Efficient Online K-Mer Counting Using A Probabilistic Data Structure, Qingpeng Zhang, Jason Pell, Rosangela Canino-Koning, Adina Chuang Howe, C. Titus Brown

Adina Howe

K-mer abundance analysis is widely used for many purposes in nucleotide sequence analysis, including data preprocessing for de novo assembly, repeat detection, and sequencing coverage estimation. We present the khmer software package for fast and memory efficient online counting of k-mers in sequencing data sets. Unlike previous methods based on data structures such as hash tables, suffix arrays, and trie structures, khmer relies entirely on a simple probabilistic data structure, a Count-Min Sketch. The Count-Min Sketch permits online updating and retrieval of k-mer counts in memory which is necessary to support online k-mer analysis algorithms. On sparse data sets this …


Effective Detection Of Vulnerable And Malicious Browser Extensions, Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier Jun 2014

Effective Detection Of Vulnerable And Malicious Browser Extensions, Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier

Faculty and Research Publications

Unsafely coded browser extensions can compromise the security of a browser, making them attractive targets for attackers as a primary vehicle for conducting cyber-attacks. Among others, the three factors making vulnerable extensions a high-risk security threat for browsers include: i) the wide popularity of browser extensions, ii) the similarity of browser extensions with web applications, and iii) the high privilege of browser extension scripts. Furthermore, mechanisms that specifically target to mitigate browser extension-related attacks have received less attention as opposed to solutions that have been deployed for common web security problems (such as SQL injection, XSS, logic flaws, client-side vulnerabilities, …


An Assessment Of The Water Distribution System In The City Of Medford, Massachusetts, Yogesh Jitoo, Irvine Wei, Thomas R. Morgan, Donald Ouellette Jan 2014

An Assessment Of The Water Distribution System In The City Of Medford, Massachusetts, Yogesh Jitoo, Irvine Wei, Thomas R. Morgan, Donald Ouellette

Irvine W. Wei

The objective of this paper is to present the analysis of the water distribution system for the City of Medford, Massachusetts to identify areas of pressure deficiency. H₂OMAP Water Suite, modeling software, was used to assess the system, and using the calibrated hydraulic model of the water distribution system, the current available fire flows were compared to the required fire flows as determined by the Insurance Services Office (ISO) in 2002. Further, the influence of improvements made by the City to the distribution system from 2002 through 2004 to meet the required fire flows was evaluated. The model was also …