The Border Gateway Protocol (BGP) that manages inter-domain routing on the Internet lacks security. Protective measures using public key cryptography introduce complexities and costs. To support authentication and other security functionality in...
Solar (Computer architecture). ; Ubiquitous computing. Sensor networks. ; Detectors. ; User interfaces (Computer systems).
The complexity of developing context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. In this dissertation, we present a Context...
Van Allen radiation belts -- Mathematical models. ; Magnetosphere -- Mathematical models. ; Magnetohydrodynamics -- Mathematical models.
The physics of geomagnetically-trapped radiation has been a topic of interest since the discovery of the Van Allen belts in 1958. As the energetic particles comprising these belts can pose a hazard to human activity in space, considerable effort...
A fiber can transmit around 25 Tbit/s, but electronic signal processing today is performed at much slower speeds, usually 1-10 Gbit/s. To avoid this "bottleneck" in optical fiber communication systems, all signal processing will have to be done...
Van Allen radiation belts -- Mathematical models. Electrons -- Diffusion -- Mathematical models. Magnetohydrodynamic waves -- Mathematical models.
It is becoming increasingly important to understand the dynamics of radiation belt energetic particles given their potentially hazardous effects on satellites and our ever-increasing dependence on those satellites. There is a need to determine...
Stark-geometry photorefractive multiple quantum well (PR-MQW) spatial light modulators (SLMs) show promise for several optoelectronic applications such as high-speed image correlation and real-time 3-D holographic imaging. Their performance is...
A mobile agent is an autonomous program that can migrate under its own control from machine to machine in a heterogeneous network. In other words, the program can suspend its execution at an arbitrary point, transport itself to another machine, and...
Coding theory. Characters of groups. Error-correcting codes (Information theory). Polynomials.
We introduce vector-valued character theory, a higher dimensional generalization of character theory. We then use vector-valued characters to extend the MacWilliams equivalence theorem for linear codes to a class of additive codes, called...
Computer generated 3-D images are proving useful in a wide variety of applications including data visualization, computer animation, virtual reality, telepresence and terrain generation. High-end applications in these fields require images to be...
Background:
With the science and transparency of quality measurement unfolding, and economic forces changing, hospital leaders seek to aggressively improve their systems' care quality. Successful organizational transformations will engage everyone...