Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
In the late 1960s, Ihara began work that led to the Ihara zeta function, a zeta function which is defined on a finite graph. This function is an interesting graph invariant which gives information on expansion properties of the graph. It also...
Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
Constructibility (Set theory). Trees (Graph theory).
This thesis investigates possible initial segments of the degrees of constructibility. Specifically, we completely characterize the structure of degrees in generic extensions of the constructible universe L via forcing with Souslin trees. Then we...
This thesis contains material relating to two separate subjects. The first section determines when the C*-algebra affiliated to a directed graph has continuous trace. We use groupoid methods and the focus is on producing conditions on a graph that...
In the past few years there has been a tremendous growth in the usage of digital images. Users can now access millions of photos, a fact that poses the need of having methods that can efficiently and effectively search the visual information of...
In this thesis, we consider several problems relating to cyclic subgroups of the group [mathematical equation]. Each element of [mathematical equation] has a unique representative in one of the two intervals [mathematical equation] and...
For many scientific applications, the data set cannot entirely fit in main memory. The data must reside out-of-core, i.e., on parallel disks. For many basic data-movement operations such as permuting, if the programmer does not design efficient...
Wireless communication systems. Computer networks. Routers (Computer networks).
A mesh network is a network of wireless routers that employ multi-hop routing and can be used to provide network access for mobile clients. Mobile mesh networks can be deployed rapidly to provide an alternate communication infrastructure for...
Polynomials. Finite fields (Algebra). Algebraic functions. Number theory.
The ring of univariate polynomials over a finite field shares many foundational arithmetic properties with the ring of rational integers. This similarity makes it possible for many problems in elementary number theory to be translated 'through the...
In this thesis we look at several problems that lie in the intersection between combinatorial and multiplicative number theory. A common theme of many of these problems are estimates for and properties of the smooth numbers, those integers not...
Boundary integral methods have long been used to solve boundary value problems for elliptic partial differential equations with piecewise constant coefficients, since they have several numerical advantages over conventional volume discretization....
Some biomacromolecules require a metal co-factor to stabilize their physiologically active three-dimensional structure. The fundamental thermodynamic values of the binding of metal ions, particularly Zn2+, to a set of biomacromolecules have been...
This thesis centers around a generalization of the classical discrete Fourier transform. We first present a general diagrammatic approach to the construction of efficient algorithms for computing the Fourier transform of a function on a finite...
Si-based quantum devices, including Si/SiGe quantum dots (QD), are promising candidates for spin-based quantum bits (quits), which are a potential platform for quantum information processing [1]. Meanwhile, qubit readout remains a challenging task...
Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
Plant genetic engineering. ; Plants -- Effect of cadmium on. ; Cadmium -- Physiological transport.
Iron plays a central role in key biological processes in both plants and animals. Lack of available iron commonly limits plant growth and nutritional value. Worldwide, dietary iron is primarily obtained from plant sources and, despite our best...
Automatic control -- Sensitivity. Structural control (Engineering). Strains and stresses -- Computer simulation. Structural analysis (Engineering). Engineering models.
Autonomous damage detection in engineering structures is critically important as the demands placed upon those structures are increased. It has been well established that damage detection can be done through monitoring the modal frequencies of the...
The present work examines the cognitive structure of the self-concept. Improving upon established measures of self-complexity (H -statistic), cognitive complexity of the self-concept is measured in terms of the number of self-aspects and the...
In this thesis we review the methods for computation of cosmological correlations in the early universe known as the in-in formalism which are then applied to the problem of magnetogenesis from inflation. For this computation, a power-law single...
Many of today's communication and imaging technologies share the common challenge of signal deterioration due to water's large absorption coefficient. As an example, it is water molecules that contaminate the fused silica of optical fibers and...
We present a number of findings concerning groupoid dynamical systems and groupoid crossed products. The primary result is an identification of the spectrum of the groupoid crossed product when the groupoid has continuously varying abelian...
Automated trust negotiation is a new approach to access control and authentication for the open systems such as the Internet, where sensitive interactions sometimes occur among entities with no prior knowledge of each other. Trust negotiation...
The field of proteomics aims to identify and quantify the protein contents of a biological sample. The mass spectrometer is the instrument of choice to characterize these proteins. In the typical proteomics experiment, mass spectra are collected...
A variety of forensic methods have been developed to identify falsified photos, each unified by the ability to estimate and detect properties of a photo that are perturbed by forgery. There exist, however, many photos in which the required...