Skip to main content

and
  1. Article

    Open Access

    A geographically-diverse collection of 418 human gut microbiome pathway genome databases

    Advances in high-throughput sequencing are resha** how we perceive microbial communities inhabiting the human body, with implications for therapeutic interventions. Several large-scale datasets derived from ...

    Aria S. Hahn, Tomer Altman, Kishori M. Konwar, Niels W. Hanson in Scientific Data (2017)

  2. Article

    Open Access

    Metabolic pathways for the whole community

    A convergence of high-throughput sequencing and computational power is transforming biology into information science. Despite these technological advances, converting bits and bytes of sequence information int...

    Niels W Hanson, Kishori M Konwar, Alyse K Hawley, Tomer Altman in BMC Genomics (2014)

  3. No Access

    Chapter and Conference Paper

    Dependable Decentralized Cooperation with the Help of Reliability Estimation

    Internet supercomputing aims to solve large partitionable computational problems by using vast numbers of computers. Here we consider the abstract version of the problem, where n processors perform t independent ...

    Seda Davtyan, Kishori M. Konwar in Stabilization, Safety, and Security of Dis… (2014)

  4. Article

    Open Access

    MetaPathways: a modular pipeline for constructing pathway/genome databases from environmental sequence information

    A central challenge to understanding the ecological and biogeochemical roles of microorganisms in natural and human engineered ecosystems is the reconstruction of metabolic interaction networks from environmen...

    Kishori M Konwar, Niels W Hanson, Antoine P Pagé, Steven J Hallam in BMC Bioinformatics (2013)

  5. Article

    Open Access

    Expanding the boundaries of local similarity analysis

    Pairwise comparison of time series data for both local and time-lagged relationships is a computationally challenging problem relevant to many fields of inquiry. The Local Similarity Analysis (LSA) statistic i...

    W Evan Durno, Niels W Hanson, Kishori M Konwar, Steven J Hallam in BMC Genomics (2013)

  6. No Access

    Chapter and Conference Paper

    An Improved Stemming Approach Using HMM for a Highly Inflectional Language

    Stemming is a common method for morphological normalization of natural language texts. Modern information retrieval systems rely on such normalization techniques for automatic document processing tasks. High q...

    Navanath Saharia, Kishori M. Konwar in Computational Linguistics and Intelligent … (2013)

  7. No Access

    Chapter and Conference Paper

    Self-stabilizing Resource Discovery Algorithm

    Massive distributed cooperative computing in networks involves marshaling large collections of network nodes possessing the necessary computational resources. In order for the willing nodes to act in a concert...

    Seda Davtyan, Kishori M. Konwar in Principles of Distributed Systems (2013)

  8. No Access

    Article

    Microbial ecology of expanding oxygen minimum zones

  9. Oxygen minimum zones (OMZs) are oxygen-starved regions of the ocean that are currently expanding owing to the warming of the water column that is induced by gl...

  10. Jody J. Wright, Kishori M. Konwar, Steven J. Hallam in Nature Reviews Microbiology (2012)

  11. No Access

    Chapter and Conference Paper

    Robust Network Supercomputing without Centralized Control

    Internet supercomputing provides means for harnessing the power of a vast number of interconnected computers. With this come the challenges of marshaling distributed resources and dealing with failures. Tradit...

    Seda Davtyan, Kishori M. Konwar in Principles of Distributed Systems (2011)

  12. No Access

    Chapter and Conference Paper

    Node Discovery in Networks

    This paper abstracts the problem of network nodes discovering one another in a network of unknown size using all-to-all gossip. The problem is studied in terms of evolving directed graphs where vertices repres...

    Kishori M. Konwar, Dariusz Kowalski in Principles of Distributed Systems (2006)

  13. No Access

    Chapter and Conference Paper

    Robust Network Supercomputing with Malicious Processes

    Internet supercomputing is becoming a powerful tool for harnessing massive amounts of computational resources. However in typical master-worker settings the reliability of computation crucially depends on the ...

    Kishori M. Konwar, Sanguthevar Rajasekaran in Distributed Computing (2006)