Showing 1 - 15 of 24

Exhaled breath condensate proteomics represent a low-cost, non-invasive alternative for examining upper respiratory health. EBC has previously been used for the discovery and validation of detected exhaled volatiles and non-volatile biomarkers of disease related to upper respiratory system distress...

"Visualizing the Hidden Half: Plant-Microbe Interactions in the Rhizosphere" Plant roots and the associated rhizosphere constitute a dynamic environment that fosters numerous intra- and interkingdom interactions, including metabolite exchange between plants and soil mediated by root exudates and the...

HDF5 file containing 10,000 hydraulic transmissivity inputs and the corresponding hydraulic pressure field outputs for a two-dimensional saturated flow model of the Hanford Site. The inputs are generated by sampling a 1,000-dimensional Kosambi-Karhunen-Loève (KKL) model of the transmissivity field...

This data is a model of synthetic adversarial activity surrounded by noise and was funded by DARPA. The various versions include gradually more complex networks of activities.

  1. Datasets

    1
This data is a model of synthetic adversarial activity surrounded by noise and was funded by DARPA. The various versions include gradually more complex networks of activities. This data was generated by PNNL. Activities can be phone calls, transactions, or any other type of communications. Most of...
  1. Datasets

    7
The VAST Challenge 2019 presents three mini-challenges and a grand challenge for you to apply your visual analytics research and technologies to help a city grapple with the aftermath of an earthquake that damages their nuclear power plant. These challenges are open to participation by individuals...
  1. Datasets

    1

This data is a model of synthetic adversarial activity surrounded by noise and was funded by DARPA. The various versions include gradually more complex networks of activities.

  1. Datasets

    1
The Biomedical Resilience & Readiness in Adverse Operating Environments (BRAVE) Project develop new capabilities to improve health and performance of first responders in adverse operating environments common to national defense. The BRAVE project analyze biological samples, collect physiological...
  1. Datasets

    1

Short Biography Caroline (Carrie) Harwood received her Ph.D. in microbiology from the University of Massachusetts and completed postdoctoral work at Yale University. She held academic appointments at Cornell University and the University of Iowa before moving to the University of Washington in 2005...

Washington State University Distinguished Graduate Research Program Program: Chemical Engineering WSU-PNNL Advisor: Aaron Wright

This data was generated by the organization IvySys. Activities can be phone calls, transactions, or any other type of communications. Most of the files are of the type .edges, .rdf, or .csv; but all can be opened in a text editor. A good introduction to this data can be found in \Tutorial1\MAA...

Dataset The dataset will consist of: About 1200 news stories from the Alderwood Daily News plus a few other items collected by the previous investigators A few photos A few maps of Alderwood and vicinity (in bitmap image form) A few files with other mixed materials, e.g. a spreadsheet with voter...

It is Fall of 2004 and one of your analyst colleagues has been called away from her current tasks to an emergency. The boss has given you the assignment of picking up her investigation and completing her task. She has been asked to pursue a line of investigation into some unexpected activities...

Mini Challenge 1: Wiki Editors The Paraiso movement is controversial and is having considerable social impact in a specific area of the world. We have extracted a segment of the Paraiso (the movement) Wikipedia edits page. Please note this is not the Paraiso Manifesto Wiki page which is part of the...

The VAST 2009 Challenge scenario concerned a fictitious, cyber security event. An employee leaked important information from an embassy to a criminal organization. Participants were asked to discover the identity ofthe employee and the structure of the criminal organization. Participants were...