Learn More
Many recent large-scale distributed computing applications utilize spare processor cycles of personal computers that are connected to the Internet. The resulting distributed computing platforms provide computational power that previously was available only through the use of expensive supercomputers. However, distributed computations running in untrusted(More)
Volunteer distributed computations utilize spare processor cycles of personal computers that are connected to the Internet. The resulting platforms provide computational power previously available only through the use of expensive clusters or supercomputers. However, distributed computations running in untrustworthy environments raise a number of security(More)
Volunteer distributed computations utilize spare processor cycles of personal computers that are connected to the Internet. The related computation integrity concerns are commonly addressed by assigning tasks redundantly. Aside from the additional computational costs, a significant disadvantage of redundancy is its vulnerability to colluding adversaries.(More)
This paper describes our implementation and experience of incorporating computer science concepts into a team-taught, first-year interdisciplinary course for prospective science majors at the University of Richmond. The course integrates essential concepts from each of five STEM disciplines: biology, chemistry, computer science, mathematics, and physics.(More)
Many recent large-scale distributed computing applications utilize spare processor cycles of personal computers. The resulting distributed computing platforms provide computational power that previously was available only through the use of expensive supercomputers. However, distributed computations running in untrusted or unstable environments raise a(More)
We developed new approaches for analyzing biological sequences, a fundamental task in modern molecular biology. First, we formulated and analyzed heuristics for detecting new members of gene families using judicious primer selection in polymerase chain reactions. Secondly, we focused on reliability aspects of phylogenetic tree reconstruction and developed(More)
An intrusion detection system (IDS) is a collection of monitors strategically placed on a network or individual host iri order to detect anomalous behavior. Since James Anderson introduced one of the first frameworks for an intrusion detection system in [1], researchers have extended the capabilities of these systems. IDSs take many forms, from systems as(More)
An improvement to the processing efficiency of genomic data sequence for automated detection and diagnosis is presented in this paper. For the automation of genomic signal processing, the problem of representation, extraction and retrieval is proposed. In the current form of automated genomic processing system, the retrieval of the gene information depends(More)
  • 1