Abstract (Summary) Chapter One. Platinum-Catalyzed Asymmetric Alkylation of Bis(secondary) Phosphines. Efficient Screening and the Synthesis of an Enantiomerically Pure C 2 -Symmetric Diphosphine . Platinum-catalyzed asymmetric alkylation of...
We examine variations of cops and robbers games on graphs. Our goals are to introduce some randomness into their study, and to estimate (expected) capture time. We show that a cop chasing a random walker can capture him in expected time n + o(n)....
Robustness to genetic perturbations is a fundamental property of all living things. The genetic code is degenerate, RNA secondary structure is robust to sequence changes, and protein structure is robust to amino acid substitutions. Complex systems...
Most current multiprocessor file systems are designed to use multiple disks in parallel, using the high aggregate bandwidth to meet the growing I/O requirements of parallel scientific applications. Most multiprocessor file systems provide...
This thesis describes the synthesis of sulfobetaines having the general structure $\rm RN\sp{+}(CH\sb3)\sb2(CH\sb2)\sb{x}SO\sb{3\sp{-}}$ as novel inhibitors of squalene synthase. Squalene synthase reductively couples two molecules of farnesyl...
In order to most effectively investigate protein structure and improve protein function, it is necessary to carefully plan appropriate experiments. The combinatorial number of possible experiment plans demands effective criteria and efficient...
I. (3 + 2) Cycloaddition Reactions of Oxyallyl Cationic Intermediates with Indoles Cyclopenta- and cyclohexa[b]indolines are ubiquitous molecular skeletons in natural products and pharmaceutical agents. We have developed (3 + 2) cycloaddition...
This thesis describes a new synthesis of substituted (3H)-1,2-dithiole-3-thiones (dithiolethiones) from readily available starting materials. Dithiolethiones have a wide variety of industrial and pharmaceutical applications. These include use as...
A mobile agent is an autonomous program that can migrate under its own control from machine to machine in a heterogeneous network. In other words, the program can suspend its execution at an arbitrary point, transport itself to another machine, and...
During our fieldwork with real-world organizations---including those in Public Key Infrastructure (PKI), network configuration management, and the electrical power grid---we repeatedly noticed that security policies and related security artifacts...
Telecommunication -- Traffic -- Measurement -- Statistical methods. IEEE 802.11 (Standard). Universities and colleges -- Computer networks -- New Hampshire -- Hanover -- Case studies.
The edge of the Internet is increasingly wireless. Enterprises large and small, homeowners, and even whole cities have deployed Wi-Fi networks for their users, and many users never need to--or never bother to--use the wired network. With the advent...
Breast cancer is the most common cancer in women. The discovery of breast tumor subtypes and the subsequent development of treatments aimed at them has allowed a reduction in the mortality of breast cancer. However, tumors with similar...
The overarching goal of this thesis was two-fold. First, to determine if the effects of chronic anabolic androgenic steroid (AAS) treatment on anxiety-like behaviors are sex-specific and second to determine how different environmental modulators...
In this thesis, we characterize and enumerate the permutations which are realized by the orbits of signed shifts, a family of discrete dynamical systems on words. The permutations, which are called patterns of the signed shifts, are given by the...
Quantitative Risk Analysis of Computer Networks (QSRA) addresses the problem of risk opacity of software in networks. It allows risk managers to get a detailed and comprehensive snapshot of the constitutive software on the network, assess its risk...
Robots -- Control systems -- Design and construction. Mobile robots. Robots -- Dynamics.
This thesis examines the issues of vehicle and information dynamics in the control of a multi-robot system using a radial-basis potential function controller. Distributed control of multi-robot systems requires each robot to communicate state...
Information retrieval -- Mathematical models. ; Electronic information resource searching. ; Computer algorithms. ; Decision making -- Data processing. ; Mathematical optimization.
This thesis presents a unified method for simultaneous solution of three problems in Information Retrieval--metasearch (the fusion of ranked lists returned by retrieval systems to elicit improved performance), efficient system evaluation (the...
Medical imaging methods have become increasingly important in diagnosing diseases and assisting therapeutic treatment. In particular, early detection of breast cancer is considered as a critical factor in reducing the mortality rate of women....
The accelerated expansion of space in the Universe has been known for two decades. However, finding a plausible theory that describes this expansion is more difficult: Taking general relativity for granted requires us to stipulate the existence of...
The performance of machine learning algorithms largely depends on data representation. As a critical step in machine learning, representation learning (feature learning) learns a transformation of training data to give a new representation that can...
The Border Gateway Protocol (BGP) that manages inter-domain routing on the Internet lacks security. Protective measures using public key cryptography introduce complexities and costs. To support authentication and other security functionality in...
Interaction with aromatic π systems has become recognized as an important mode of stabilization of carbocation intermediates in biological reactions. To gain insight into such carbocation-π interactions, we have undertaken a study of...
The furanosteroids are a special class of natural products that feature a furan ring fused to the steroid nucleus at C-4 and C-6. In 1945, viridin, the parent member of this group, was isolated by Grove and coworkers from the fungas Gliocladium...
Coding theory. Characters of groups. Error-correcting codes (Information theory). Polynomials.
We introduce vector-valued character theory, a higher dimensional generalization of character theory. We then use vector-valued characters to extend the MacWilliams equivalence theorem for linear codes to a class of additive codes, called...
In the late 1960s, Ihara began work that led to the Ihara zeta function, a zeta function which is defined on a finite graph. This function is an interesting graph invariant which gives information on expansion properties of the graph. It also...