We have a limited understanding of how an opinion is originated, how an opinion and information supporting and explaining it gets conveyed, and how the communicated opinion is perceived and processed by others. One direction of current research...
The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even...
Protein complexes play vital roles in cellular processes within living organisms. They are formed by interactions between either different proteins (hetero-oligomers) or identical proteins (homo-oligomers). In order to understand the functions of...
As the visual effect and movie industries are striving for realism and high fidelity images, physically based lighting, global illumination, realistic materials, and highly tessellated geometry are gradually accepted and used in movie and game...
Si/SiGe quantum dots (QDs) are promising candidates for spin-based quantum bits (qubits) as a result of the reduced spin-orbit coupling as well as the Si isotopes with zero nuclear spin. Meanwhile qubit readout is a challenge related to...
Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
Constructibility (Set theory). Trees (Graph theory).
This thesis investigates possible initial segments of the degrees of constructibility. Specifically, we completely characterize the structure of degrees in generic extensions of the constructible universe L via forcing with Souslin trees. Then we...
This thesis contains material relating to two separate subjects. The first section determines when the C*-algebra affiliated to a directed graph has continuous trace. We use groupoid methods and the focus is on producing conditions on a graph that...
This project focuses on the development of research tools and methods that are used to study the relationship between neural activity and subsequent hemodynamic responses in the human brain. This relationship, referred to as neurovascular coupling,...
Opinion dynamics is a complex procedure that entails a cognitive process when it deals with how a person integrates influential opinions to form revised opinion. Early research on opinion formation and social influence can be traced back to the...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
The focus of this thesis is the study of nuclearity and exactness for groupoid crossed product C*-algebras. In particular, we present generalizations of two well-known facts from group dynamical systems and crossed products to the groupoid setting....
Proteins are ubiquitous in cells and are essential to a wide range of biological processes. Since existing proteins occupy only a small portion of the space of possible amino acid composition, understanding their sequence-structure-function...
In this thesis, we characterize and enumerate the permutations which are realized by the orbits of signed shifts, a family of discrete dynamical systems on words. The permutations, which are called patterns of the signed shifts, are given by the...
In Chapter 2 we look at the distribution of permutation statistics in the context of pattern-avoiding permutations. The first part of this chapter deals with a recursively defined bijection of Robertson [37] between 123- and 132-avoiding...
Chemical sensing and separation is a constant challenge intriguing many scientists. Through numerous efforts, revolutionary techniques and innovative materials have been successfully developed to solve this old problem. However, a practical but...
The multisubunit eukaryotic Mediator complex integrates diverse positive and negative gene regulatory signals and transmits them to the core transcription machinery. It is also involved in chromatin structure related epigenetic silencing through...
This thesis comprises two separate but related studies, dealing with two strongly interacting nanoscale systems on the border between the quantum and classical domains. In Part 1, we use a Born-Markov approximated master equation approach to study...
Robustness to genetic perturbations is a fundamental property of all living things. The genetic code is degenerate, RNA secondary structure is robust to sequence changes, and protein structure is robust to amino acid substitutions. Complex systems...
Digital integrated circuits -- Testing. Digital integrated circuits -- Testing -- Mathematical models. Digital integrated circuits -- Design and construction.
Robots -- Control systems -- Design and construction. Mobile robots. Robots -- Dynamics.
This thesis examines the issues of vehicle and information dynamics in the control of a multi-robot system using a radial-basis potential function controller. Distributed control of multi-robot systems requires each robot to communicate state...
Partially ordered sets. ; Convex polytopes. ; Representations of groups.
This thesis deals with geometric representations of ordered sets. In a geometric representation, each element of the ordered set is assigned a geometric object, with two elements incomparable in the ordered set if and only if the corresponding...
Computer input-output equipment. ; Computational grids (Computer systems). ; High performance computing. ; Electronic data processing -- Distributed processing.
High-performance computing increasingly occurs on computational grids composed of heterogeneous and geographically distributed systems of computers, networks, and storage devices that collectively act as a single virtual computer. A key challenge...
Information retrieval -- Mathematical models. ; Electronic information resource searching. ; Computer algorithms. ; Decision making -- Data processing. ; Mathematical optimization.
This thesis presents a unified method for simultaneous solution of three problems in Information Retrieval--metasearch (the fusion of ranked lists returned by retrieval systems to elicit improved performance), efficient system evaluation (the...
Earlier work has suggested that various neurological or neuropsychiatric disorders may result in characteristic spatial patterns in brain activation, potentially allowing their detection from maps of brain activity under different conditions....
Operating systems and low-level applications are usually written in languages like C and assembly, which provide access to low-level abstractions. These languages have unsafe type systems that allow many bugs to slip by programmers. For example, in...
Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...
Solar (Computer architecture). ; Ubiquitous computing. Sensor networks. ; Detectors. ; User interfaces (Computer systems).
The complexity of developing context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. In this dissertation, we present a Context...