In Fall of 2006, Provost Sabah Randhawa convened the University IT Committee (UITC) to review OSU’s information infrastructure and develop a shared institutional vision for the teaching, research and administrative needs of OSU for the next decade that helps the university achieve its long-term goals. The UITC will help the...
Razor clams are found in isolated areas all along the Oregon coast. However, 90% of the harvest takes place on the Clatsop Countty beaches. Along the rest of the coast, digging is sporadic and of minor importance. This report summarizes the data for 1967 for several beaches south of Seaside....
As part of the Willamette Basin Geographic Initiative Program, the Environmental Protection Agency (EPA) funded The Nature Conservancy of Oregon to inventory, classify, and map native wetland and riparian plant communities and their threatened biota in the Willamette Valley. Between October 1994 and September 1996, we evaluated 172 wetland and...
The California vernal pool-endemic grasses Orcuttia tenuis and Tuctoria greenei, both listed under the U.S. Endangered Species Act, were recently found in Modoc County, California, a short distance south of the Oregon border. This prompted searches in suitable habitats in adjacent portions of the Klamath Basin in Oregon, in the...
The report describes the results of model calibration and validation, and evaluates the extent to which runoff response to timber harvesting and increased road densities in East Fork Lobster Creek Basin can be simulated, using Precipitation-Runoff Modeling System (PRMS), a deterministic, destributed-parameter-modeling system.
One of the most popular topologies is the hypercube, that has n = 2ᵏ processors, numbered 0 to 2ᵏ -1 and connected in such a way that there is a link between any two if and only if they differ in one bit. Its popularity is due to the fact...
Authentication is a means of developing an electronic signature that works like a written signature. It assumes that your data is publicly known but nevertheless ensures that the message is not tampered with and that you have an audit trail.
This project discusses the techniques and concepts used to design...