The Euler '-function and Carmichael -function are extremely important in modern number theory, and much work has been devoted to studying the distribution and arithmetic properties of the values of each function. One interesting unresolved question...
Multiresolution image transformations have become commonplace tools for analyzing images for a number of applications, including enhancement and restoration. Powerful models for these applications have been developed in the transform domain of...
Recent years have witnessed a new class of monitoring applications that need to continuously collect information from remote data sources. Those data sources, such as web click-streams, stock quotes, and sensor data, are often characterized as...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
Solar (Computer architecture). ; Ubiquitous computing. Sensor networks. ; Detectors. ; User interfaces (Computer systems).
The complexity of developing context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. In this dissertation, we present a Context...
Mitomycin C -- Mechanism of action. ; DNA -- Effect of mitomycin C on. ; Genetic expression -- Effect of mitomycin C on. ; DNA-protein interactions -- Effect of mitomycin C on.
Mitomycin C (MMC) is a chemotherapeutic drug that reacts with the N$\sp2$ of guanine to form monoadducts, interstrand and intrastrand crosslinks. These lesions, especially the interstrand crosslink, are believed to be responsible for the potent...
In this thesis we look at several problems that lie in the intersection between combinatorial and multiplicative number theory. A common theme of many of these problems are estimates for and properties of the smooth numbers, those integers not...
The performance of machine learning algorithms largely depends on data representation. As a critical step in machine learning, representation learning (feature learning) learns a transformation of training data to give a new representation that can...
Partially ordered sets and permutations are combinatorial structures having vast applications in theoretical computer science. In this thesis, we study various computational and algorithmic problems related to these structures. The first chapter of...
We study motion planning problems, finding trajectories that connect two configurations of a system, from two different perspectives: optimality and survivability. For the problem of finding optimal trajectories, we provide a model in which the...
Measurement of the ionospheric thermal particle population bridges the two different communities of ground-based radar and space-based rocket studies, which have the common goal of characterizing heavy ion transport in the cusp/cleft region. We...
Pervasive computing leads to an increased integration between the real world and the computational world, and many applications in pervasive computing adapt to the user's context, such as the location of the user and relevant devices, the presence...
Sensor networks are used in many realtime applications for collecting information from monitored environments and objects, such as moving vehicle tracking, battlefield reconnaissance, and habitat monitoring. Sensor networks are often deployed in...
Human behavior -- Mathematical models. ; Web usage mining. ; Internet users.
Whom we e-mail, where we browse, what we purchase, and the things we search for on the World Wide Web all leave identifiable traces of who we are as individuals. In today's technology focused landscape, cyberspace represents the new environment in...
In the late 1960s, Ihara began work that led to the Ihara zeta function, a zeta function which is defined on a finite graph. This function is an interesting graph invariant which gives information on expansion properties of the graph. It also...
The study of twin primes gives rise to several famously difficult problems in number theory--in fact, we still cannot definitively say whether there are infinitely many twin primes. In this work, we consider a related problem, namely: What is the...
Automated trust negotiation is a new approach to access control and authentication for the open systems such as the Internet, where sensitive interactions sometimes occur among entities with no prior knowledge of each other. Trust negotiation...