Computer input-output equipment. ; Computational grids (Computer systems). ; High performance computing. ; Electronic data processing -- Distributed processing.
High-performance computing increasingly occurs on computational grids composed of heterogeneous and geographically distributed systems of computers, networks, and storage devices that collectively act as a single virtual computer. A key challenge...
Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...
This research has established feasibility of surface temperature characterization using ruby fluorescence. Study was performed in pin-on-disk geometry, with balls made of different plastics sliding against the sapphire disk. Fluorescence signal was...
Chapter 1: Munchnones and mesoionic heterocycles The reactivity, regioselectivity, and synthetic applications of munchnones (1,3-oxazolium-5-olates) is a common theme which runs through Chapters 2-5. The definition, structure, and reactivity of...
Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
This thesis contains material relating to two separate subjects. The first section determines when the C*-algebra affiliated to a directed graph has continuous trace. We use groupoid methods and the focus is on producing conditions on a graph that...
Casimir effect. Zero-point field. Electric conductivity. Quantum electrodynamics.
The Casimir force arises from an alteration of boundary condition in vacuum and is often regarded as a manifestation of quantum zero point energy. Considerable progress has been made in the last decade with an impressive achievement of experimental...
Wireless communication systems. Computer network protocols.
We evaluate mobility predictors in wireless networks. Handoff prediction in wireless networks has long been considered as a mechanism to improve the quality of service provided to mobile wireless users. Most prior studies, however, were based on...
The multisubunit eukaryotic Mediator complex integrates diverse positive and negative gene regulatory signals and transmits them to the core transcription machinery. It is also involved in chromatin structure related epigenetic silencing through...
Quantitative Risk Analysis of Computer Networks (QSRA) addresses the problem of risk opacity of software in networks. It allows risk managers to get a detailed and comprehensive snapshot of the constitutive software on the network, assess its risk...
This study presents δ18O analyses of garnets microsampled by laser fluorination from two localities in the deep seated, Barrovian metamorphic terrane of eastern Vermont. The broad goals of the research were to constrain further the amount,...
Solar (Computer architecture). ; Ubiquitous computing. Sensor networks. ; Detectors. ; User interfaces (Computer systems).
The complexity of developing context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. In this dissertation, we present a Context...
I. Markovnikov-Selective Hydrothiolation of Styrenes: Application to the Synthesis of Stereodefined Olefins There have been few reports in the literature describing Lewis Acid-catalyzed hydrothiolations that furnish Markovnikov-selective C–S bond...
The ability to resist highly tempting reward impulses is a struggle that all humans face on a daily basis, one that gives rise to many societal problems such as obesity and drug addiction. This form of self-regulation involves a critical balance...
The advent of hypervisors revolutionized the computing industry in terms of malware prevention and detection, secure virtual machine managers, and cloud resilience. However, this has resulted in a disjointed response to handling known threats...
Recent technological advances have fostered the emergence of Wireless Sensor Networks (WSNs), which consist of tiny, wireless, battery-powered nodes that are expected to revolutionize the ways in which we understand and construct complex physical...
I. (3 + 2) Cycloaddition Reactions of Oxyallyl Cationic Intermediates with Indoles Cyclopenta- and cyclohexa[b]indolines are ubiquitous molecular skeletons in natural products and pharmaceutical agents. We have developed (3 + 2) cycloaddition...
The ionosphere is the primary source for heavy ions which are ubiquitous in the terrestrial magnetosphere. Low-altitude energization in the auroral ionosphere results in bulk heating and transverse acceleration of ions, which begin to upwell and/or...
Earlier in our laboratory, a facile synthesis of the 2- and 3-nitroindoles was realized. These compounds showed promise as powerful intermediates in the synthesis of novel structures and natural products. The reactivity of 2- and 3-nitroindoles...
Modern distributed systems scatter sensors, storage, and computation throughout the environment. Ideally these devices communicate and share resources, but there is seldom motivation for a device''s owner to yield control to another user. We...
The Border Gateway Protocol (BGP) that manages inter-domain routing on the Internet lacks security. Protective measures using public key cryptography introduce complexities and costs. To support authentication and other security functionality in...
Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
Steep terrain produces a topographic effect in digital satellite data that can make it difficult to distinguish changes in vegetation species or health from changes in illumination geometry. A multiple linear regression analysis of direct solar...
The synthesis of macrocyclic tetrapyrroles continues to be an area of vigorous research due to their application to a wide range of fields spanning the physical sciences. Only recently have general syntheses for the reduced systems, such as...
A mobile agent is an autonomous program that can migrate under its own control from machine to machine in a heterogeneous network. In other words, the program can suspend its execution at an arbitrary point, transport itself to another machine, and...
The furanosteroids are a special class of natural products that feature a furan ring fused to the steroid nucleus at C-4 and C-6. In 1945, viridin, the parent member of this group, was isolated by Grove and coworkers from the fungas Gliocladium...
The furanosteroids are an important class of natural products that have been found to effectively inhibit various biologically important enzymes. These enzymes include the phosphoinositide-3-kinase (PI3K) family and the polo-like kinase (PLK1)...