Paul Adamczyk

ORCID: 0000-0003-0976-5782
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Microbial Metabolic Engineering and Bioproduction
  • Biofuel production and bioconversion
  • Advanced Software Engineering Methodologies
  • Software Engineering Research
  • Information and Cyber Security
  • Gene Regulatory Network Analysis
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques
  • Model-Driven Software Engineering Techniques
  • Software Engineering and Design Patterns
  • Viral Infectious Diseases and Gene Expression in Insects
  • Service-Oriented Architecture and Web Services
  • Enzyme Production and Characterization
  • Network Traffic and Congestion Control
  • Software Engineering Techniques and Practices
  • Diet, Metabolism, and Disease
  • Mobile Agent-Based Network Management
  • Intelligence, Security, War Strategy
  • Fungal and yeast genetics research
  • Bacterial Genetics and Biotechnology
  • Metabolomics and Mass Spectrometry Studies
  • Lipid Membrane Structure and Behavior
  • IPv6, Mobility, Handover, Networks, Security
  • Information Technology Governance and Strategy
  • Logic, programming, and type systems

Sandia National Laboratories California
2023-2025

University of Wisconsin–Madison
2017-2021

Great Lakes Bioenergy Research Center
2017-2019

Booz Allen Hamilton (United States)
2010-2012

Universidad Nacional de La Plata
2009

University of Illinois Urbana-Champaign
2006-2009

Early software systems communicated in predefined ways, so they were easy to secure. However, the old ways of ensuring systems' security and reliability are inadequate on Internet. Although building secure is difficult, retrofitting existing introduce even harder. For example, sendmail, most popular mail transfer agent, has been plagued with vulnerabilities ever since Morris worm first exploited it 1988.

10.1109/ms.2007.114 article EN IEEE Software 2007-07-01

Researchers and practitioners have been successfully documenting software patterns for over two decades. But the next step--building pattern languages--has proven much more difficult. This paper describes an approach building a large language security: that can be used to create languages other domains. We describe mechanism of growing this language: how we cataloged security from books, papers collections written by all experts last 15 years, classified help developers find appropriate...

10.1145/2384592.2384607 article EN 2012-10-19

Zymomonas mobilis is an industrially relevant bacterium notable for its ability to rapidly ferment simple sugars ethanol using the Entner-Doudoroff (ED) glycolytic pathway, alternative well-known Embden-Meyerhof-Parnas (EMP) pathway used by most organisms. Recent computational studies have predicted that ED substantially more thermodynamically favorable than EMP a potential factor explaining high rate in Z. mobilis. Here, investigate vivo thermodynamics of and central carbon metabolism...

10.1016/j.ymben.2019.05.006 article EN cc-by-nc-nd Metabolic Engineering 2019-05-09

Abstract R. toruloides is an oleaginous yeast, with diverse metabolic capacities and high tolerance for inhibitory compounds abundant in plant biomass hydrolysates. While grows on several pentose sugars alcohols, further engineering of the native pathway required efficient conversion biomass-derived to higher value bioproducts. A previous high-throughput study inferred that possesses a non-canonical l -arabinose d -xylose metabolism proceeding through -arabitol -ribulose. In this study, we...

10.1186/s12934-023-02126-x article EN cc-by Microbial Cell Factories 2023-08-03

Efficient conversion of pentose sugars remains a significant barrier to the replacement petroleum-derived chemicals with plant biomass-derived bioproducts. While oleaginous yeast Rhodosporidium toruloides (also known as Rhodotorula toruloides) has relatively robust native metabolism compared other wild yeasts, faster assimilation those will be required for industrial utilization pentoses. To increase rate in R. toruloides, we leveraged previously reported high-throughput fitness data...

10.1186/s12934-023-02148-5 article EN cc-by Microbial Cell Factories 2023-08-03

10.1016/j.coisb.2017.11.001 article EN publisher-specific-oa Current Opinion in Systems Biology 2017-11-15

There are many more similarities than distinctions between natural languages and the used in computer science. The term "language" has been liberally as a metaphor discipline terms of language creation, evolution concept elegance. Examples presented to show that serves well.

10.1145/2089131.2089133 article EN 2011-10-22

Software patterns have been used to guide developers and disseminate expert knowledge. But can also be thought of as program transformations. Security are architectural. Therefore, transformations derived from those transform architecture. This paper describes how we a catalog security produce security-oriented These make architectural changes that systems more secure. is first example applying actively architectures.

10.1109/wicsa.2011.39 article EN 2011-06-01

This experience report describes a redesign of large commercial system. The goal the was to break up system into two parts without changing its external behavior. Such task is essentially refactoring. We describe our process as steps refactoring called extract subsystem separate process. believe that documenting large-scale refactorings important, and necessary make redesigning software easier.

10.1109/icse-companion.2009.5070963 article EN 2009-01-01

We present a pattern language containing all security patterns that have been published in various venues. Ours is the first covers an entire problem domain; to our best knowledge, it also largest software.

10.1145/2384716.2384746 article EN 2012-10-18

Application-layer protocols play a special role in network programming. Typical programmers are more familiar with them and likely to implement them. Well-designed application-layer follow many patterns that improve the performance of applications using these protocols. We present subset focuses on congestion control at application layer.

10.1145/1772070.1772075 article EN 2007-09-05

Fred Brooks' retelling of the biblical story Tower Babel offers many insights into what makes building software difficult. The difficulty, according to common interpretations, comes from communication and organizational problems in development. But contains one more important lesson that people tend miss: cannot accomplish impossible goals, which programmers are often asked do. Software engineering, as a discipline, can overcome poor communication; but long we attempt live up expectations,...

10.1145/1869459.1869537 article EN 2010-10-17
Coming Soon ...