- Microbial Metabolic Engineering and Bioproduction
- Biofuel production and bioconversion
- Advanced Software Engineering Methodologies
- Software Engineering Research
- Information and Cyber Security
- Gene Regulatory Network Analysis
- Security and Verification in Computing
- Advanced Malware Detection Techniques
- Model-Driven Software Engineering Techniques
- Software Engineering and Design Patterns
- Viral Infectious Diseases and Gene Expression in Insects
- Service-Oriented Architecture and Web Services
- Enzyme Production and Characterization
- Network Traffic and Congestion Control
- Software Engineering Techniques and Practices
- Diet, Metabolism, and Disease
- Mobile Agent-Based Network Management
- Intelligence, Security, War Strategy
- Fungal and yeast genetics research
- Bacterial Genetics and Biotechnology
- Metabolomics and Mass Spectrometry Studies
- Lipid Membrane Structure and Behavior
- IPv6, Mobility, Handover, Networks, Security
- Information Technology Governance and Strategy
- Logic, programming, and type systems
Sandia National Laboratories California
2023-2025
University of Wisconsin–Madison
2017-2021
Great Lakes Bioenergy Research Center
2017-2019
Booz Allen Hamilton (United States)
2010-2012
Universidad Nacional de La Plata
2009
University of Illinois Urbana-Champaign
2006-2009
Early software systems communicated in predefined ways, so they were easy to secure. However, the old ways of ensuring systems' security and reliability are inadequate on Internet. Although building secure is difficult, retrofitting existing introduce even harder. For example, sendmail, most popular mail transfer agent, has been plagued with vulnerabilities ever since Morris worm first exploited it 1988.
Researchers and practitioners have been successfully documenting software patterns for over two decades. But the next step--building pattern languages--has proven much more difficult. This paper describes an approach building a large language security: that can be used to create languages other domains. We describe mechanism of growing this language: how we cataloged security from books, papers collections written by all experts last 15 years, classified help developers find appropriate...
Zymomonas mobilis is an industrially relevant bacterium notable for its ability to rapidly ferment simple sugars ethanol using the Entner-Doudoroff (ED) glycolytic pathway, alternative well-known Embden-Meyerhof-Parnas (EMP) pathway used by most organisms. Recent computational studies have predicted that ED substantially more thermodynamically favorable than EMP a potential factor explaining high rate in Z. mobilis. Here, investigate vivo thermodynamics of and central carbon metabolism...
Abstract R. toruloides is an oleaginous yeast, with diverse metabolic capacities and high tolerance for inhibitory compounds abundant in plant biomass hydrolysates. While grows on several pentose sugars alcohols, further engineering of the native pathway required efficient conversion biomass-derived to higher value bioproducts. A previous high-throughput study inferred that possesses a non-canonical l -arabinose d -xylose metabolism proceeding through -arabitol -ribulose. In this study, we...
Efficient conversion of pentose sugars remains a significant barrier to the replacement petroleum-derived chemicals with plant biomass-derived bioproducts. While oleaginous yeast Rhodosporidium toruloides (also known as Rhodotorula toruloides) has relatively robust native metabolism compared other wild yeasts, faster assimilation those will be required for industrial utilization pentoses. To increase rate in R. toruloides, we leveraged previously reported high-throughput fitness data...
There are many more similarities than distinctions between natural languages and the used in computer science. The term "language" has been liberally as a metaphor discipline terms of language creation, evolution concept elegance. Examples presented to show that serves well.
Software patterns have been used to guide developers and disseminate expert knowledge. But can also be thought of as program transformations. Security are architectural. Therefore, transformations derived from those transform architecture. This paper describes how we a catalog security produce security-oriented These make architectural changes that systems more secure. is first example applying actively architectures.
This experience report describes a redesign of large commercial system. The goal the was to break up system into two parts without changing its external behavior. Such task is essentially refactoring. We describe our process as steps refactoring called extract subsystem separate process. believe that documenting large-scale refactorings important, and necessary make redesigning software easier.
We present a pattern language containing all security patterns that have been published in various venues. Ours is the first covers an entire problem domain; to our best knowledge, it also largest software.
Application-layer protocols play a special role in network programming. Typical programmers are more familiar with them and likely to implement them. Well-designed application-layer follow many patterns that improve the performance of applications using these protocols. We present subset focuses on congestion control at application layer.
Fred Brooks' retelling of the biblical story Tower Babel offers many insights into what makes building software difficult. The difficulty, according to common interpretations, comes from communication and organizational problems in development. But contains one more important lesson that people tend miss: cannot accomplish impossible goals, which programmers are often asked do. Software engineering, as a discipline, can overcome poor communication; but long we attempt live up expectations,...