This thesis considers the two special sensor networks for future sensor network design: mobile sensor networks and hybrid network of sensors and robots. To investigate two types of networks, we abstract two most important aspects that are ingrained...
Thermodynamics, and the classic balance between entropy and enthalpy, provides a proverbial zoo of exotic phase behaviour that chemists can harness to create new materials out of simple liquids and polymers. The diversity of self-assembling...
Sorting very large datasets is a key subroutine in almost any application that is built on top of a large database. Two ways to sort out-of-core data dominate the literature: merging-based algorithms and partitioning-based algorithms. Within these...
A polynomial is a product of distinct cyclotomic polynomials if and only if it is a divisor over [Special characters omitted.] [x ] of xn - 1 for some positive integer n. In this thesis, we will examine two natural questions concerning the divisors...
This thesis investigates the embedding theory of orders in central simple algebras, placing a particular emphasis on the role that the phenomenon known as selectivity plays in the theory. Although the notion of selectivity is completely algebraic,...
Siegel domains. Modular groups. Hecke algebras. Forms
In the 1960s Satake proved the existence of an isomorphism between the local Hecke algebra and the ring of polynomials invariant under the action of the signed permutation group W n (the Weyl group associated to Sp n over a local field)....
Sensor networks are used in many realtime applications for collecting information from monitored environments and objects, such as moving vehicle tracking, battlefield reconnaissance, and habitat monitoring. Sensor networks are often deployed in...
As the visual effect and movie industries are striving for realism and high fidelity images, physically based lighting, global illumination, realistic materials, and highly tessellated geometry are gradually accepted and used in movie and game...
The Euler '-function and Carmichael -function are extremely important in modern number theory, and much work has been devoted to studying the distribution and arithmetic properties of the values of each function. One interesting unresolved question...
The Border Gateway Protocol (BGP) that manages inter-domain routing on the Internet lacks security. Protective measures using public key cryptography introduce complexities and costs. To support authentication and other security functionality in...
Friction severely limits performance in precise positioning systems. This thesis investigates one possible approach to counter friction related performance losses, friction cancellation. In this method a friction observer is used to estimate...
The reversible elimination reactions of beta acyloxyketone 1 and beta alkoxyketone 2 were studied by monitering formation of the product enones in the UV spectra, and, in the case of 2, by using ('13)C NMR to follow deuterium incorporation into the...
Automated trust negotiation is a new approach to access control and authentication for the open systems such as the Internet, where sensitive interactions sometimes occur among entities with no prior knowledge of each other. Trust negotiation...
Leucocytes -- Pathophysiology. Immunosuppression. Ovaries -- Cancer -- Pathophysiology. Peritoneum -- Cancer -- Pathophysiology. Medical Term Ovarian Neoplasms -- physiopathology. Peritoneal Neoplasms -- physiopathology.
Immunosuppressive leukocytes are emerging as a critical factor in facilitating tumor progression. These leukocytes are converted by the tumor microenvironment to become tolerogenic, facilitate metastasis, and to aid in neo-vascularization. The...
This thesis focuses on the emergence of universal dynamical scaling in quantum critical spin systems driven out of equilibrium, with emphasis on quench dynamics which involves isolated standard critical points, multi-critical points, and...
Production of fuel ethanol from cellulosic materials is a potentially attractive way to meet sustainability, energy security, and environmental goals. However, the high cost of processing using current technology has thus far prevented...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
In this thesis, we consider several problems relating to cyclic subgroups of the group [mathematical equation]. Each element of [mathematical equation] has a unique representative in one of the two intervals [mathematical equation] and...
Proteins are ubiquitous in cells and are essential to a wide range of biological processes. Since existing proteins occupy only a small portion of the space of possible amino acid composition, understanding their sequence-structure-function...
Molecular imaging of cancer features is a critical part of advancing better tools for oncology management and drug discovery, yet it is still evolving as a useful tool. Diffuse Fluorescence Tomography (FT) is one approach to molecular imaging, used...
Candida albicans is a fungal species that naturally exists as a commensal member of the human microbiota, but can assume a pathogenic lifestyle and subsequently induce life-threatening systemic infections. The ability of the fungus to grow in...
Drosophila melanogaster is a model organism often used when studying the complex processes of neuronal signaling and neurodegeneration. The short life cycle, malleable genetics, amenability to in vivo electrophysiological assays and sensitivity to...
The problem of moving rigid bodies efficiently is of particular interest in robotics because the simplest model of a mobile robot or of a manipulated object is often a rigid body. Path planning, controller design and robot design may all benefit...
Aneuploidy is frequently detected in human cancers and is implicated in carcinogenesis. Pharmacological targeting of aneuploidy is an attractive therapeutic strategy, as this would preferentially eliminate malignant over normal cells. Our prior...
The transmissible spongiform encephalopathies (TSEs), also known as the prion diseases, are a unique group of fatal neurodegenerative diseases affecting humans and other mammals that have infectious, inherited and sporadic etiologies. A central...
Motivated by quantum mechanics and geometric optics, it is a long-standing problem whether the length spectrum of a compact Riemannian manifold can be recovered from its Laplace spectrum. One route to proving that the length spectrum depends on the...
In this thesis, we present different approaches to tying knots using robots by enforcing different types of constraints. We attack the problem from three different directions; mechanical design, motion planning with simple control strategies, and...
Partially ordered sets and permutations are combinatorial structures having vast applications in theoretical computer science. In this thesis, we study various computational and algorithmic problems related to these structures. The first chapter of...
Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
This thesis presents technologies for the design, fabrication, operation, and control of electrostatic MEMS micro-robots. It describes prototype micro-robots, with dimensions of 60 μm by 250 μm by 10 μm, that are capable of controllable...