Timothy Kelley

Learn More
Silicosis may be defined as the disease resulting from chronic occupational exposure to silica dust. Silica is primarily composed of quartz dust and has been classified since 2000 as a known human carcinogen by the U.S. government. Silicosis may lead to impairment of lung function resulting from fibrosis of the lungs. This may in turn lead to an increased(More)
New estimates of the impacts of germplasm improvement in the major staple crops between 1965 and 2004 on global land-cover change are presented, based on simulations carried out using a global economic model (Global Trade Analysis Project Agro-Ecological Zone), a multicommodity, multiregional computable general equilibrium model linked to a global spatially(More)
Phospholipid fatty acid (PLFA) analysis and 16S ribosomal DNA polymerase chain reaction amplification-denaturing gradient gel electrophoresis (PCR-DGGE) were used to determine microbial communities and predominant microbial populations in water samples collected from a pilot-scale constructed wetland system. This pilot-scale constructed wetland system(More)
Open Access Full open access to this and thousands of other papers at The Deepwater Horizon semi-submersible Mobile Offshore Drilling Unit (MODU), leased to BP (previously British Petroleum, now simply " BP " , with the previously-used promotional tagline of " beyond petroleum ") suffered an explosive " blowout " on April 20, 2010 which resulted in what is(More)
Community involvement in mosquito management programs provides more sustainable and effective organization and service. A door to door survey in Wayne County, NC carried out by student volunteers, resulted in 60 household responses. Residents had not previously experienced outreach from the county (88%), and 95% of them thought the student door to door(More)
Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks. In this work, we(More)
There is a long history of studying the epidemiology of computer malware. Much of this work has focused on the behaviors of specific viruses, worms, or botnets. In contrast, we seek to utilize an extension of the simple SIS model to examine the efficacy of various aggregate patching and recovery behaviors. We use the SIS model because we are interested in(More)
Source IP spoofing is still an endemic challenge despite best practices documents being published more than 13 years ago that would prevent it if all ISPs abided by them. We argue that these approaches failed to gain widespread adoption due to fundamental incentive misalignment. We then propose an SDN-based solution designed to be placed at Internet(More)
Security cues found in web browsers are meant to alert users to potential online threats, yet many studies demonstrate that security indicators are largely ineffective in this regard. Those studies have depended upon self-reporting of subjects' use or aggregate experimentation that correlate responses to sites with and without indicators. We report on a(More)