We study the bijective combinatorics of reduced words. These are fundamental objects in the study of Coxeter groups. We restrict our focus to reduced words of permutations and signed permutations. Our results can all be situated within the context...
Manifolds (Mathematics) Geodesics (Mathematics) Space and time.
We investigate weak and strong refocusing of light rays in a space-time and related concepts. A strongly causal space-time ( X^ n +1 , g ) is emphstrongly refocusing at x ∈ X if there is a point y ≠ x such that all null-geodesics through y pass...
This thesis contains material relating to two separate subjects. The first section determines when the C*-algebra affiliated to a directed graph has continuous trace. We use groupoid methods and the focus is on producing conditions on a graph that...
Earlier in our laboratory, a facile synthesis of the 2- and 3-nitroindoles was realized. These compounds showed promise as powerful intermediates in the synthesis of novel structures and natural products. The reactivity of 2- and 3-nitroindoles...
Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
Let K be the function field over a finite field of odd order, and let H be a definite quaternion algebra over K. If Α is an order of level M in H , we define theta series for each ideal I of Α using the reduced norm on H. Using harmonic analysis...
In this thesis we review the methods for computation of cosmological correlations in the early universe known as the in-in formalism which are then applied to the problem of magnetogenesis from inflation. For this computation, a power-law single...
The purpose of this thesis is to describe methods for detecting hidden crevasses on glaciers in Polar regions. Crevasses form in ice sheets as a result of forces imposed upon the brittle ice. The crevasses are hidden from view by bridges of soft...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
In this thesis, we characterize and enumerate the permutations which are realized by the orbits of signed shifts, a family of discrete dynamical systems on words. The permutations, which are called patterns of the signed shifts, are given by the...
Medical imaging methods have become increasingly important in diagnosing diseases and assisting therapeutic treatment. In particular, early detection of breast cancer is considered as a critical factor in reducing the mortality rate of women....
We prove the existence of nontrivial multiparameter isospectral deformations of metrics on the classical compact simple Lie groups SO (n) (n = 9, n ≥11), Spin(n) (n = 9, n ≥11), SU (n) (n ≥7), and Sp (n) (n ≥5). The proof breaks into three...
The problem of moving rigid bodies efficiently is of particular interest in robotics because the simplest model of a mobile robot or of a manipulated object is often a rigid body. Path planning, controller design and robot design may all benefit...
Polynomials. Finite fields (Algebra). Algebraic functions. Number theory.
The ring of univariate polynomials over a finite field shares many foundational arithmetic properties with the ring of rational integers. This similarity makes it possible for many problems in elementary number theory to be translated 'through the...