We present new forensic tools that are capable of detecting traces of tampering in digital images without the use of watermarks or specialized hardware. These tools operate under the assumption that images contain natural properties from a variety...
The thesis is dedicated to the understanding and characterization of brittle compressive fracture of columnar S2 ice. The work quantifies the strength of fresh-water S2 ice and investigates its characteristic brittle failure modes under biaxial...
Large scale systems -- Mathematical models. Digital computer simulation. Parallel processing (Electronic computers). Computer algorithms.
Modeling real-world large-scale systems is inherently challenging due to their size and complexity. Detailed simulation of large-scale models requires tremendous amounts of computing power and memory space. Parallel discrete-event simulation...
We have a limited understanding of how an opinion is originated, how an opinion and information supporting and explaining it gets conveyed, and how the communicated opinion is perceived and processed by others. One direction of current research...
At the heart of computer games and computer generated films lies 3D content creation. A student wanting to learn how to create and edit 3D meshes can quickly find thousands of videos explaining the workflow process. These videos are a popular...
Although genome-wide association studies (GWAS) and other high-throughput initiatives have led to an information explosion in human genetics and genetic epidemiology, the mapping from genotype to phenotype remains challenging as most of the...
This thesis constitutes the first steps in the author's program to investigate the question of when a homotopy of 2-cocycles ω = {ω[subscript t]}[subscript t∊[0,1]] on a locally compact Hausdorff groupoid Ɠ induces an isomorphism of the...
We present aligned hierarchies, a novel solution to the dimension reduction problem, representing high-dimensional and noisy sequential data as a low-dimensional object that encodes relevant information. In this thesis, we motivate our presentation...
The multisubunit eukaryotic Mediator complex integrates diverse positive and negative gene regulatory signals and transmits them to the core transcription machinery. It is also involved in chromatin structure related epigenetic silencing through...
We prove the existence of nontrivial multiparameter isospectral deformations of metrics on the classical compact simple Lie groups SO (n) (n = 9, n ≥11), Spin(n) (n = 9, n ≥11), SU (n) (n ≥7), and Sp (n) (n ≥5). The proof breaks into three...
Solar (Computer architecture). ; Ubiquitous computing. Sensor networks. ; Detectors. ; User interfaces (Computer systems).
The complexity of developing context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. In this dissertation, we present a Context...
This thesis centers around a generalization of the classical discrete Fourier transform. We first present a general diagrammatic approach to the construction of efficient algorithms for computing the Fourier transform of a function on a finite...
'Orthogonal modular forms are algebraic modular forms arising from lattices in quadratic spaces. In this thesis, we define orthogonal modular forms, establish their basic properties, and then apply them to a case of ternary quadratic spaces to...
In this thesis, we present different approaches to tying knots using robots by enforcing different types of constraints. We attack the problem from three different directions; mechanical design, motion planning with simple control strategies, and...
There are no Vassiliev invariants of degree one for classical knots. A. Henrich proved the existence of a sequence of three Vassiliev invariants of degree one for virtual knots. The invariants get stronger and stronger, and the final invariant is...
Networks that model relationships in the real world have attracted much attention in the past few years. The "link prediction problem" plays a central role in the network area. In this thesis, we explore the link prediction problem in a...
Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
Arabidopsis -- Effect of metals on. ; Zinc -- Physiological transport. ; Iron -- Physiological transport. ; Plants -- Effect of iron on. ; Plants -- Effect of zinc on.
Iron and zinc deficiency commonly limit plant growth and crop yields. Furthermore, deficiencies in both of these micronutrients are common throughout the world, particularly in developing countries where people may only consume simple diets...
We describe a set of natural image statistics that are built upon two multi-scale image decompositions, the quadrature mirror filter pyramid decomposition and the local angular harmonic decomposition. These image statistics consist of first- and...
A mobile agent is an autonomous program that can migrate under its own control from machine to machine in a heterogeneous network. In other words, the program can suspend its execution at an arbitrary point, transport itself to another machine, and...
Shape modeling is an important area in computer vision and medical imaging. Shape models have proved valuable in the tasks of object representation, recognition, and classification. This thesis focuses on shape models of 3D surfaces extracted from...
Pervasive computing leads to an increased integration between the real world and the computational world, and many applications in pervasive computing adapt to the user's context, such as the location of the user and relevant devices, the presence...
Coding theory. Characters of groups. Error-correcting codes (Information theory). Polynomials.
We introduce vector-valued character theory, a higher dimensional generalization of character theory. We then use vector-valued characters to extend the MacWilliams equivalence theorem for linear codes to a class of additive codes, called...
The radio-frequency single-electron transistor (RF-SET) [1-3] has attracted significant interest as one of the fastest charge detectors known today. In this thesis, we show that by designing an on-chip superconducting LC matching network for the...
Agent-based policy learning in complex and uncertain environments is challenged by escalating computational complexity with the size of the task space (action choices and environmental states) as well as the number of agents. Nonetheless, there is...
Evolutionary Computation (EC) is one of the most advanced computational techniques. It has been frequently and successfully used to find good solutions to many complicated optimization problems with limited computational resources. EC is the...