Molecular optical imaging in vivo has potential for functional assessment of tumor tissue at the cellular and subcellular level. Advances in biological understanding of genomics and proteomics have increased the knowledge of possible cellular...
A new type of analytic expansion for use in stability calculations is presented and applied to the question of the stability of laminar solutions of the Navier-Stokes equation. This leads in a natural way to a model of the transition from laminar...
Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
Recent years have witnessed a new class of monitoring applications that need to continuously collect information from remote data sources. Those data sources, such as web click-streams, stock quotes, and sensor data, are often characterized as...
Annual screening mammograms are recommended for all women above 40 years of age for early detection of breast cancer, and are known to improve cancer mortality rates. However, mammography is hampered by low sensitivity and a high rate of false...
Opinion dynamics is a complex procedure that entails a cognitive process when it deals with how a person integrates influential opinions to form revised opinion. Early research on opinion formation and social influence can be traced back to the...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
The focus of this thesis is the study of nuclearity and exactness for groupoid crossed product C*-algebras. In particular, we present generalizations of two well-known facts from group dynamical systems and crossed products to the groupoid setting....
In this thesis, we consider several problems relating to cyclic subgroups of the group [mathematical equation]. Each element of [mathematical equation] has a unique representative in one of the two intervals [mathematical equation] and...
In Chapter 2 we look at the distribution of permutation statistics in the context of pattern-avoiding permutations. The first part of this chapter deals with a recursively defined bijection of Robertson [37] between 123- and 132-avoiding...
This thesis comprises two separate but related studies, dealing with two strongly interacting nanoscale systems on the border between the quantum and classical domains. In Part 1, we use a Born-Markov approximated master equation approach to study...
Fir waves are spatially and temporally repeating patterns of stand development and destruction in subalpine, balsam fir-dominated forests of the northeastern United States, perpetuated by downwind migration of strips of dying trees, "dieback...
Through a series of case studies, signal processing and statistical tools, analyses of dynamic sea ice processes of drift, deformation, and ice pack expansion and decay are investigated for the Weddell Sea region during 1992. Cavitating fluid (CAV)...
Computer input-output equipment. ; Computational grids (Computer systems). ; High performance computing. ; Electronic data processing -- Distributed processing.
High-performance computing increasingly occurs on computational grids composed of heterogeneous and geographically distributed systems of computers, networks, and storage devices that collectively act as a single virtual computer. A key challenge...
Information retrieval -- Mathematical models. ; Electronic information resource searching. ; Computer algorithms. ; Decision making -- Data processing. ; Mathematical optimization.
This thesis presents a unified method for simultaneous solution of three problems in Information Retrieval--metasearch (the fusion of ranked lists returned by retrieval systems to elicit improved performance), efficient system evaluation (the...
Optical tomography. ; Near infrared spectroscopy. ; Image analysis -- Mathematical models. ; Imaging systems -- Image quality -- Mathematical models. ; Image reconstruction -- Mathematical models. ; Least squares. Breast -- Tomography.
Diffuse optical tomography (DOT) has the potential to become a non-invasive and non-ionizing diagnostic imaging technique for breast cancer imaging. DOT uses near-infrared (NIR) light to illuminate the breast, generally through the use of fiber...
Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...