skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Attention:

The NSF Public Access Repository (PAR) system and access will be unavailable from 10:00 PM ET on Friday, February 6 until 10:00 AM ET on Saturday, February 7 due to maintenance. We apologize for the inconvenience.


Search for: All records

Creators/Authors contains: "Childs, Kevin"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Sharing high-quality research data specifically for reuse in future work helps the scientific community progress by enabling researchers to build upon existing work and explore new research questions without duplicating data collection efforts. Because current discussions about research artifacts in Computer Security focus on reproducibility and availability of source code, the reusability of data is unclear. We examine data sharing practices in Computer Security and Measurement to provide resources and recommendations for sharing reusable data. Our study covers five years (2019–2023) and seven conferences in Computer Security and Measurement, identifying 948 papers that create a dataset as one of their contributions. We analyze the 265 accessible datasets, evaluating their under-standability and level of reuse. Our findings reveal inconsistent practices in data sharing structure and documentation, causing some datasets to not be shared effectively. Additionally, reuse of datasets is low, especially in fields where the nature of the data does not lend itself to reuse. Based on our findings, we offer data-driven recommendations and resources for improving data sharing practices in our community. Furthermore, we encourage authors to be intentional about their data sharing goals and align their sharing strategies with those goals. 
    more » « less
  2. A rapidly emerging research community at the intersection of sport and human-computer interaction (SportsHCI) explores how technology can support physically active humans, such as athletes. At highly competitive levels, coaching staff play a central role in the athlete experience by using data to enhance performance, reduce injuries, and foster team success. However, little is known about the practices and needs of these coaching staff. We conducted five focus groups with 17 collegiate coaching staff across three women’s teams and two men’s teams at an elite U.S. university. Our findings show that coaching staff selectively use data with the goal of balancing performance goals, athlete emotional well-being, and privacy. This paper contributes design recommendations to support coaching staff in operating across the data life cycle through gathering, sharing, deciding, acting, and assessing data as they aim to support team success and foster the well-being of student-athletes. 
    more » « less
  3. Abstract Key MessageTheC. roseus ZCTsare jasmonate-responsive, can be induced by CrMYC2a, and can act as significant regulators of the terpenoid indole alkaloid pathway when highly expressed. AbstractCatharanthus roseusis the sole known producer of the anti-cancer terpenoid indole alkaloids (TIAs), vinblastine and vincristine. While the enzymatic steps of the pathway have been elucidated, an understanding of its regulation is still emerging. The present study characterizes an important subgroup of Cys2-His2 zinc finger transcription factors known asZinc fingerCatharanthusTranscription factors (ZCTs).We identified three new ZCT members (named ZCT4, ZCT5, and ZCT6) that clustered with the putative repressors of the TIA pathway, ZCT1, ZCT2, and ZCT3. We characterized the role of these six ZCTs as potential redundant regulators of the TIA pathway, and their tissue-specific and jasmonate-responsive expression. These ZCTs share high sequence conservation in their two Cys2-His2 zinc finger domains but differ in the spacer length and sequence between these zinc fingers. The transient overexpression ofZCTsin seedlings significantly repressed the promoters of the terpenoid (pLAMT) and condensation branch (pSTR1) of the TIA pathway, consistent with that previously reported for ZCT1, ZCT2, and ZCT3. In addition, ZCTs significantly repressed and indirectly activated several promoters of the vindoline pathway (not previously studied). TheZCTsdiffered in their tissue-specific expression but similarly increased with jasmonate in a dosage-dependent manner (except forZCT5). We showed significant activation of thepZCT1andpZCT3promoters by the de-repressed CrMYC2a, suggesting that the jasmonate-responsive expression of theZCTscan be mediated by CrMYC2a. In summary, theC. roseus ZCTsare jasmonate-responsive, can be induced by CrMYC2a, and can act as significant regulators of the TIA pathway when highly expressed. 
    more » « less
  4. In 2022, the Anti-Phishing Working Group reported a 70% increase in SMS and voice phishing attacks. Hard data on SMS phishing is hard to come by, as are insights into how SMS phishers operate. Lack of visibility prevents law enforcement, regulators, providers, and researchers from understanding and confronting this growing problem. In this paper, we present the results of extracting phishing messages from over 200 million SMS messages posted over several years on 11 public SMS gateways on the web. From this dataset we identify 67,991 phishing messages, link them together into 35,128 campaigns based on sharing near-identical content, then identify related campaigns that share infrastructure to identify over 600 distinct SMS phishing operations. This expansive vantage point enables us to determine that SMS phishers use commodity cloud and web infrastructure in addition to self-hosted URL shorteners, their infrastructure is often visible days or weeks on certificate transparency logs earlier than their messages, and they reuse existing phishing kits from other phishing modalities. We are also the first to examine in-place network defenses and identify the public forums where abuse facilitators advertise openly. These methods and findings provide industry and researchers new directions to explore to combat the growing problem of SMS phishing. 
    more » « less
  5. Eric von Wettberg (Ed.)
    Dry beans (Phaseolus vulgarisL.) are a nutritious food, but their lengthy cookingrequirements are barriers to consumption. Presoaking is one strategy to reduce cook-ing time. Soaking allows hydration to occur prior to cooking, and enzymatic changesto pectic polysaccharides also occur during soaking that shorten the cooking time ofbeans. Little is known about how gene expression during soaking influences cook-ing times. The objectives of this study were to (1) identify gene expression patternsthat are altered by soaking and (2) compare gene expression in fast-cooking andslow-cooking bean genotypes. RNA was extracted from four bean genotypes at fivesoaking time points (0, 3, 6, 12, and 18 h) and expression abundances were detectedusing Quant-seq. Differential gene expression analysis and weighted gene coexpres-sion network analysis were used to identify candidate genes within quantitative traitloci for water uptake and cooking time. Genes related to cell wall growth and devel-opment as well as hypoxic stress were differentially expressed between the fast- andslow-cooking beans due to soaking. Candidate genes identified in the slow-cookingbeans included enzymes that increase intracellular calcium concentrations and cellwall modification enzymes. The expression of cell wall-strengthening enzymes inthe slow-cooking beans may increase their cooking time and ability to resist osmoticstress by preventing cell separation and water uptake in the cotyledon. 
    more » « less
  6. Tribble, C (Ed.)
    Abstract The majority of sequenced genomes in the monocots are from species belonging to Poaceae, which include many commercially important crops. Here, we expand the number of sequenced genomes from the monocots to include the genomes of 4 related cyperids: Carex cristatella and Carex scoparia from Cyperaceae and Juncus effusus and Juncus inflexus from Juncaceae. The high-quality, chromosome-scale genome sequences from these 4 cyperids were assembled by combining whole-genome shotgun sequencing of Nanopore long reads, Illumina short reads, and Hi-C sequencing data. Some members of the Cyperaceae and Juncaceae are known to possess holocentric chromosomes. We examined the repeat landscapes in our sequenced genomes to search for potential repeats associated with centromeres. Several large satellite repeat families, comprising 3.2–9.5% of our sequenced genomes, showed dispersed distribution of large satellite repeat clusters across all Carex chromosomes, with few instances of these repeats clustering in the same chromosomal regions. In contrast, most large Juncus satellite repeats were clustered in a single location on each chromosome, with sporadic instances of large satellite repeats throughout the Juncus genomes. Recognizable transposable elements account for about 20% of each of the 4 genome assemblies, with the Carex genomes containing more DNA transposons than retrotransposons while the converse is true for the Juncus genomes. These genome sequences and annotations will facilitate better comparative analysis within monocots. 
    more » « less