Computer input-output equipment. ; Computational grids (Computer systems). ; High performance computing. ; Electronic data processing -- Distributed processing.
High-performance computing increasingly occurs on computational grids composed of heterogeneous and geographically distributed systems of computers, networks, and storage devices that collectively act as a single virtual computer. A key challenge...
Partially ordered sets. ; Convex polytopes. ; Representations of groups.
This thesis deals with geometric representations of ordered sets. In a geometric representation, each element of the ordered set is assigned a geometric object, with two elements incomparable in the ordered set if and only if the corresponding...
Motivated by the goal of investigating the dynamics of the electroweak phase transition in the early Universe, a study of dynamical aspects of nonlinear field-theoretical systems is performed. Symmetric and asymmetric double-well potentials in the...
Background. The development and implementation of emergency response technologies have relied on two independent and rarely integrated processes. Initially, research labs develop technologies without systematic consideration of the special needs...
We expect wireless body-area networks of pervasive wearable devices will enable in situ health monitoring, personal assistance, entertainment personalization, and home automation. As these devices become ubiquitous, we also expect them to...
Molecular optical imaging in vivo has potential for functional assessment of tumor tissue at the cellular and subcellular level. Advances in biological understanding of genomics and proteomics have increased the knowledge of possible cellular...
A new type of analytic expansion for use in stability calculations is presented and applied to the question of the stability of laminar solutions of the Navier-Stokes equation. This leads in a natural way to a model of the transition from laminar...
Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
Recent years have witnessed a new class of monitoring applications that need to continuously collect information from remote data sources. Those data sources, such as web click-streams, stock quotes, and sensor data, are often characterized as...
Annual screening mammograms are recommended for all women above 40 years of age for early detection of breast cancer, and are known to improve cancer mortality rates. However, mammography is hampered by low sensitivity and a high rate of false...
Opinion dynamics is a complex procedure that entails a cognitive process when it deals with how a person integrates influential opinions to form revised opinion. Early research on opinion formation and social influence can be traced back to the...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
The focus of this thesis is the study of nuclearity and exactness for groupoid crossed product C*-algebras. In particular, we present generalizations of two well-known facts from group dynamical systems and crossed products to the groupoid setting....
In this thesis, we consider several problems relating to cyclic subgroups of the group [mathematical equation]. Each element of [mathematical equation] has a unique representative in one of the two intervals [mathematical equation] and...
In Chapter 2 we look at the distribution of permutation statistics in the context of pattern-avoiding permutations. The first part of this chapter deals with a recursively defined bijection of Robertson [37] between 123- and 132-avoiding...
This thesis comprises two separate but related studies, dealing with two strongly interacting nanoscale systems on the border between the quantum and classical domains. In Part 1, we use a Born-Markov approximated master equation approach to study...
Fir waves are spatially and temporally repeating patterns of stand development and destruction in subalpine, balsam fir-dominated forests of the northeastern United States, perpetuated by downwind migration of strips of dying trees, "dieback...
Through a series of case studies, signal processing and statistical tools, analyses of dynamic sea ice processes of drift, deformation, and ice pack expansion and decay are investigated for the Weddell Sea region during 1992. Cavitating fluid (CAV)...