Learn More
Knowledge Sifter is a scaleable agent-based system that supports access to heterogeneous information sources such as the Web, open-source repositories, XML-databases and the emerging Semantic Web. User query specifi cation is supported by a user agent that accesses multiple ontologies using an integrated conceptual m o del. A c o llection of cooperating(More)
In the solution of large-scale numerical problems, pamllel computing is becoming simultaneously more important and more difictilt. The complex organization of today's multi-processors with several memory hierarchies has forced the sci-entiific progmmmer to make a choice between simple but unscal-able code and scalable but extremely complex code that does(More)
The Parallel Object-Oriented Methods and Applications (POOMA) Framework, written in ANSI/ISO C++, has demonstrated both great expressiveness and eecient code performance for large-scale scientiic applications on computing platforms ranging from workstations to massively parallel supercomputers. The POOMA Framework provides high-level abstractions for(More)
When we work on a practical scheduling task, we usually do not have complete knowledge of the related resources and constraints. For example, when scheduling a conference, we may not know the exact sizes of available rooms or equipment needs of some speakers. The task of constructing a schedule based on incomplete data gives rise to several related(More)
Resting state fMRI may help identify markers of risk for affective disorder. Given the comorbidity of anxiety and depressive disorders and the heterogeneity of these disorders as defined by DSM, an important challenge is to identify alterations in resting state brain connectivity uniquely associated with distinct profiles of negative affect. The current(More)
Organizations need to protect information assets against cyber crime, denial-of-service attacks, web hackers, data breaches, identity and credit card theft, and fraud. Criminals often try to achieve financial, political, or personal gain through these attacks, so the threats that their actions prompt are insidious motivators for organizations to adopt(More)