We have a limited understanding of how an opinion is originated, how an opinion and information supporting and explaining it gets conveyed, and how the communicated opinion is perceived and processed by others. One direction of current research...
Casimir effect. Zero-point field. Electric conductivity. Quantum electrodynamics.
The Casimir force arises from an alteration of boundary condition in vacuum and is often regarded as a manifestation of quantum zero point energy. Considerable progress has been made in the last decade with an impressive achievement of experimental...
In this thesis we develop a theory of Fourier analysis and fast Fourier transforms (FFTs) for finite inverse semigroups. Our results generalize results in the theory of Fourier analysis for finite groups. There is a general method for generating...
We study motion planning problems, finding trajectories that connect two configurations of a system, from two different perspectives: optimality and survivability. For the problem of finding optimal trajectories, we provide a model in which the...
As the visual effect and movie industries are striving for realism and high fidelity images, physically based lighting, global illumination, realistic materials, and highly tessellated geometry are gradually accepted and used in movie and game...
Many organisms recognize and respond to categories: predator, prey, rival, or juvenile. Organisms recognize these ecologically-important categories by assessing diverse sensory stimuli. A primary focus of my research has been understanding how...
During our fieldwork with real-world organizations---including those in Public Key Infrastructure (PKI), network configuration management, and the electrical power grid---we repeatedly noticed that security policies and related security artifacts...
We present new forensic tools that are capable of detecting traces of tampering in digital images without the use of watermarks or specialized hardware. These tools operate under the assumption that images contain natural properties from a variety...
Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
We study the bijective combinatorics of reduced words. These are fundamental objects in the study of Coxeter groups. We restrict our focus to reduced words of permutations and signed permutations. Our results can all be situated within the context...
Floral nectar of many plant species is prone to colonization by microorganisms. Their presence and metabolism have the potential to modify a suite of traits important for pollinator attraction, including nectar quality and scent. However, studies...
Constructibility (Set theory). Trees (Graph theory).
This thesis investigates possible initial segments of the degrees of constructibility. Specifically, we completely characterize the structure of degrees in generic extensions of the constructible universe L via forcing with Souslin trees. Then we...
This thesis contains material relating to two separate subjects. The first section determines when the C*-algebra affiliated to a directed graph has continuous trace. We use groupoid methods and the focus is on producing conditions on a graph that...
Opinion dynamics is a complex procedure that entails a cognitive process when it deals with how a person integrates influential opinions to form revised opinion. Early research on opinion formation and social influence can be traced back to the...
This thesis constitutes the first steps in the author's program to investigate the question of when a homotopy of 2-cocycles ω = {ω[subscript t]}[subscript t∊[0,1]] on a locally compact Hausdorff groupoid Ɠ induces an isomorphism of the...
Gene set testing has become a critical tool for interpreting the results of high-throughput genomic experiments. Despite the development of robust statistical methods and extensive gene set collections, however, the results from gene set testing...
In this thesis, we consider several problems relating to cyclic subgroups of the group [mathematical equation]. Each element of [mathematical equation] has a unique representative in one of the two intervals [mathematical equation] and...
Sexual selection is a driver of biodiversity and creates spectacular forms of variation. However, only recently have we begun to understand how this variation operates on the postcopulatory level and how cryptic mechanisms affect male-male...
Proteins are ubiquitous in cells and are essential to a wide range of biological processes. Since existing proteins occupy only a small portion of the space of possible amino acid composition, understanding their sequence-structure-function...
In this thesis, we characterize and enumerate the permutations which are realized by the orbits of signed shifts, a family of discrete dynamical systems on words. The permutations, which are called patterns of the signed shifts, are given by the...
From deciding what to eat first or what stock to invest in, the order in which we prefer to experience events and the amount of risk we are willing to undertake are factors that influence our choices. However, the mechanisms underlying order and...
For many scientific applications, the data set cannot entirely fit in main memory. The data must reside out-of-core, i.e., on parallel disks. For many basic data-movement operations such as permuting, if the programmer does not design efficient...
Digital integrated circuits -- Testing. Digital integrated circuits -- Testing -- Mathematical models. Digital integrated circuits -- Design and construction.
Two experiments were designed to investigate the effects of brain damage on source monitoring. Source monitoring is the process of making decisions about the origins of memories. Previous research has demonstrated that source monitoring judgments...