01.01.2015 Views

Vol 31, Part I - forums.sou.edu • Index page - Southern Oregon ...

Vol 31, Part I - forums.sou.edu • Index page - Southern Oregon ...

Vol 31, Part I - forums.sou.edu • Index page - Southern Oregon ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

WORKSHOPS<br />

II. WORKSHOPS<br />

Monday, 25 June 2012<br />

The following Monday workshops are sponsored by NORM<br />

12. AAASPD registrants are invited to attend these as interests<br />

dictate. Please refer to the NORM 12 program for details<br />

of each of these workshops.<br />

Planning Your Job Search<br />

Monday<br />

8:00 a.m. – 9:30 a.m.<br />

Preparing A Resumé<br />

Monday<br />

9:30 a.m. – 11:00 a.m.<br />

Effective Interviewing<br />

Monday<br />

11:00 a.m. – 12:30 p.m.<br />

A New Look at Spectrophotometry – And Some<br />

Other Things You can Do with Computers:<br />

Using Computers to Cut Costs<br />

and Buy Time for Inquiry<br />

Monday<br />

9:00 a.m. – Noon<br />

Strategies for Supporting STEM Student<br />

Learning with Process Oriented Guided<br />

Inquiry Learning (POGIL)<br />

Monday<br />

1:30 p.m. – 4:30 p.m.<br />

Tuesday, 26 June 2012<br />

Programmed Genome Remodeling<br />

in Ciliates and Computing<br />

ponderosa pines 1 & 2<br />

Tuesday<br />

1:30 p.m. – 4:20 p.m.<br />

Two hour workshop organized by Marion Scheepers (Department<br />

of Mathematics, Boise State University).<br />

Ciliates are single cell organisms that harbor two types<br />

of nuclei, one type an encrypted version of the other. Certain<br />

events trigger replacement of the current nuclei by decryption<br />

of the encrypted versions. The remodeling processes<br />

performing the decryption solve very complex combinatorial<br />

problems. Experimental evidence suggests that the decryption<br />

can be reliably manipulated to yield results different<br />

from the standard. This workshop will present an overview of<br />

the ciliate decryption process, with special emphasis on the<br />

programmable aspects of the process, and the computational<br />

capabilities of the process. <strong>Part</strong>icipants will learn about the<br />

cryptographic relationship between the two types of nuclei<br />

per ciliate, how information can be encoded in DNA and<br />

how to reprogram the ciliate decryption program. The workshop<br />

will span three hours with a ten minute break between<br />

hours. After this workshop, participants will be in a position<br />

to appreciate the known mathematical findings regarding this<br />

living computing environment, and the untapped potential<br />

of this in vivo computing environment. No fee other than<br />

meeting registration. Limited to twenty-five (25) participants.<br />

NOTE: This workshop is part of the Mathematics program<br />

for this meeting, which includes the symposium, Computability<br />

and Complexity in Mathematics (see <strong>page</strong> 24 of<br />

these Proceedings for information); contributed oral papers<br />

given on Monday morning (see <strong>page</strong> 39), Tuesday afternoon<br />

(in the middle of this workshop – see <strong>page</strong> 40) and on Wednesday<br />

morning (see <strong>page</strong> 41); and a poster presented on Monday<br />

afternoon (see <strong>page</strong> 45). Additionally, at the end of the contributed<br />

oral presentations on Wednesday will be a Graduate<br />

School Panel Discussion.<br />

35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!