Visual analysis of time-series data on protein phosphorylation presents a particular challenge: Bioinformatics tools currently available for visualising ‘omics’ data in time series have been developed primarily to study gene expression, and cannot easily be adopted to phosphorylation data, where a single protein typically has multiple phosphosites. Minardo is a novel layout strategy — a reference to Charles […]
Provenance Management Overview Provenance refers to the chain of successive custody—including sources and operations of resources such as hardware, software, documents, databases, data, and other entities. It is also concerned with the original sources of any subsequent changes or other treatment of information and resources throughout the life cycle of data. That information may be […]
Enabling the next generation of computational research in the chemical, physical and materials sciences.
Integrated water system modeling is a reasonable approach to provide scientific understanding to tackle the severe water crisis faced all over the world and to promote the implementation of integrated river basin management. After carefully evaluating the issues in the existing models, we proposed an integrated water system model by considering hydrological and biogeochemical processes, […]
Understanding extremes is often important in many fields (such as weather, finance and industrial standards). However, unlike the average which is widely used statistical summary, extremes need to be modelled but are hard to be modelled because they are rare. Unfortunately, theoretically based statistics frequently not work well. More importantly, the theories do not capture […]
TrustStoreTM We cannot take the things we treasure with us everywhere we go. Sometimes we do not even have room to keep them at home. That is why storage sheds and safety deposit boxes exist. With the masses of data that we store, we need very, very big storage sheds, which we now call the […]
Security and privacy protections are needed to increase the confidence on the wide deployment of Internet of Things (IoT) applications. Resource constrained IoT devices has limited computational power and battery lifetime. Such devices are desired to use affordable security solutions to guarantee data security as well as providing a long service period. In this project, […]
Database services in the cloud are attracting more companies to outsource their databases, since in this way the companies do not need to maintain their own database management systems. However, with such cloud services the companies lose the physical control to their databases and the privacy of outsourced data is always a concern. In this project, […]