We view scientific workflows as the domain scientist's way to harness cyberinfrastructure for e-Science. Domain scientists are often interested in "end-to-end" fram...
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
iary models in order to bridge the semantic gap between high-level, abstract user requirements and low-level, concrete programs and to support a stepwise refinement process. This d...
Although the intrinsic physicality of human beings has not changed in millennia, the species has managed to profoundly reconstitute the physical and social world it inhabits. Alth...
Background: Many commonly used genome browsers display sequence annotations and related attributes as horizontal data tracks that can be toggled on and off according to user prefe...
Mary E. Dolan, Constance C. Holden, M. Kate Beard,...