Natalie Stanley

Learn More
Many systems are naturally represented by a multilayer network in which edges exist in multiple layers that encode different, but potentially related, types of interactions, and it is important to understand limitations on the detectability of community structure in these networks. Using random matrix theory, we analyze detectability limitations for(More)
Multilayer networks are a useful data structure for simultaneously capturing multiple types of relationships between a set of nodes. In such networks, each relational definition gives rise to a layer. While each layer provides its own set of information, community structure across layers can be collectively utilized to discover and quantify underlying(More)
Community structure describes the organization of a network into subgraphs that contain a prevalence of edges within each subgraph and relatively few edges across boundaries between subgraphs. The development of community-detection methods has occurred across disciplines, with numerous and varied algorithms proposed to find communities. As we present in(More)
Community detection is a commonly used technique for identifying groups in a network based on similarities in connectivity patterns. To facilitate community detection in large networks, we recast the network to be partitioned into a smaller network of ‘super nodes’, each super node comprising one or more nodes in the original network. To define the seeds of(More)
The muscle-specific ubiquitin ligase muscle ring finger-1 (MuRF1) is critical in regulating both pathological and physiological cardiac hypertrophy in vivo. Previous work from our group has identified MuRF1's ability to inhibit serum response factor and insulin-like growth factor-1 signaling pathways (via targeted inhibition of cJun as underlying(More)
We present a methodology for identifying security critical properties for use in the dynamic verification of a processor. Such verification has been shown to be an effective way to prevent exploits of vulnerabilities in the processor, given a meaningful set of security properties. We use known processor errata to establish an initial set of(More)
  • 1