In this article we describe a computational architecture called MC2 that brings together a set of tools that contribute to the knowledge management process by allowing for the cre...
— Over the past 50 years, much attention has been given to the Prisoner’s Dilemma as a metaphor for problems surrounding the evolution and maintenance of cooperative and altrui...
In this paper we analyze the I/O access patterns of a widely-used biological sequence search tool and implement two variations that employ parallel-I/O for data access based on PV...
Yifeng Zhu, Hong Jiang, Xiao Qin, David R. Swanson
The immensevolumeof data resulting from DNAmicroarray experiments, accompaniedby an increase in the numberof publications discussing gene-related discoveries, presents a majordata...
Hagit Shatkay, Stephen Edwards, W. John Wilbur, Ma...
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...