Solar (Computer architecture). ; Ubiquitous computing. Sensor networks. ; Detectors. ; User interfaces (Computer systems).
The complexity of developing context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. In this dissertation, we present a Context...
Wireless communication systems. Computer networks. Routers (Computer networks).
A mesh network is a network of wireless routers that employ multi-hop routing and can be used to provide network access for mobile clients. Mobile mesh networks can be deployed rapidly to provide an alternate communication infrastructure for...
Telecommunication -- Traffic -- Measurement -- Statistical methods. IEEE 802.11 (Standard). Universities and colleges -- Computer networks -- New Hampshire -- Hanover -- Case studies.
The edge of the Internet is increasingly wireless. Enterprises large and small, homeowners, and even whole cities have deployed Wi-Fi networks for their users, and many users never need to--or never bother to--use the wired network. With the advent...
The Euler '-function and Carmichael -function are extremely important in modern number theory, and much work has been devoted to studying the distribution and arithmetic properties of the values of each function. One interesting unresolved question...
Cosmic acceleration could be an effect of a ""dark energy"" fluid pervading the Universe. It could also be an indication that general relativity is not the correct theory of gravity at cosmological length scales. Unfortunately, observations of the...
This thesis centers around a generalization of the classical discrete Fourier transform. We first present a general diagrammatic approach to the construction of efficient algorithms for computing the Fourier transform of a function on a finite...
We describe a set of natural image statistics that are built upon two multi-scale image decompositions, the quadrature mirror filter pyramid decomposition and the local angular harmonic decomposition. These image statistics consist of first- and...
Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...
Multisensor data fusion. Sensor networks. Plumes (Fluid dynamics). Automatic tracking. Signal processing -- Digital techniques -- Mathematics.
The work in this thesis deals with a novel approach for detecting and tracking chemical plumes in distributed sensor networks. The ultimate objective is solving the inverse location problem: given unknown sources released at unknown times, the...
Riemannian manifolds. Singularities (Mathematics). Laplacian operator. Spectral theory (Mathematics). Riemann surfaces. Curves on surfaces. Geometry
Historically, inverse spectral theory has been concerned with the relationship between the geometry and the spectrum of compact Riemannian manifolds, where spectrum means the eigenvalue spectrum of the Laplace operator as it acts on smooth...
Decompression sickness (DCS, or the "Bends") is a condition that afflicts hundreds of divers each year and is cause for concern for both the Navy, the Air Force, and NASA. Despite the fact that bubble formation is the purported cause of DCS...
Let K be the function field over a finite field of odd order, and let H be a definite quaternion algebra over K. If Α is an order of level M in H , we define theta series for each ideal I of Α using the reduced norm on H. Using harmonic analysis...
Spectral theory is the subfield of differential geometry which provided the solution to Kac''s famous question, "Can you hear the shape of a drum?" That is, can we use the Laplace spectrum of a manifold to draw conclusions about its geometry or...
Earlier work has suggested that various neurological or neuropsychiatric disorders may result in characteristic spatial patterns in brain activation, potentially allowing their detection from maps of brain activity under different conditions....
Graph algorithms. Nuclear magnetic resonance spectroscopy -- Data processing. Proteins -- Structure -- Mathematical models. Proteins -- Crosslinking -- Mathematical models. Protein folding -- Mathematical models.
The study of three-dimensional protein structures produces insights into protein function at the molecular level. Graphs provide a natural representation of protein structures and associated experimental data, and enable the development of graph...
RNA binding proteins are fundamental components of crucial biological processes in all domains of life. The development of techniques to study RNA binding protein complexes is, therefore, broadly impactful. I employed multiple genome-wide...
I consider the problem of extending certain invariants of subsets of natural numbers to their equivalents for subsets of larger cardinals. The two specific questions I will address are the extension of the off-branch number [Special characters...
The accelerated expansion of space in the Universe has been known for two decades. However, finding a plausible theory that describes this expansion is more difficult: Taking general relativity for granted requires us to stipulate the existence of...
This thesis focuses on the emergence of universal dynamical scaling in quantum critical spin systems driven out of equilibrium, with emphasis on quench dynamics which involves isolated standard critical points, multi-critical points, and...
Two localized spectroscopic imaging methods were investigated to detect and discriminate microscopic pathologies at the surface of excised breast tissues in order to improve resection completeness during breast conserving surgery. A scanning in...
Human behavior -- Mathematical models. ; Web usage mining. ; Internet users.
Whom we e-mail, where we browse, what we purchase, and the things we search for on the World Wide Web all leave identifiable traces of who we are as individuals. In today's technology focused landscape, cyberspace represents the new environment in...
Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
We expect wireless body-area networks of pervasive wearable devices will enable in situ health monitoring, personal assistance, entertainment personalization, and home automation. As these devices become ubiquitous, we also expect them to...
Coding theory. Characters of groups. Error-correcting codes (Information theory). Polynomials.
We introduce vector-valued character theory, a higher dimensional generalization of character theory. We then use vector-valued characters to extend the MacWilliams equivalence theorem for linear codes to a class of additive codes, called...
The Cerenkov Maser radiation is examined using linear and nonlinear theory. Linear theories for the gain in the single particle and the collective limits have been given previously. In this work, we show the connections between these two operating...
In the past few years there has been a tremendous growth in the usage of digital images. Users can now access millions of photos, a fact that poses the need of having methods that can efficiently and effectively search the visual information of...
The study of twin primes gives rise to several famously difficult problems in number theory--in fact, we still cannot definitively say whether there are infinitely many twin primes. In this work, we consider a related problem, namely: What is the...
We associate, to each positive integer n , a Cayley graph to the group PSL(2.Ζ[subscript n]). We then consider the isoperimetric numbers of these graphs. In chapter three we determine upper bounds for the isoperimetric number by a detailed...
Recent years have witnessed a new class of monitoring applications that need to continuously collect information from remote data sources. Those data sources, such as web click-streams, stock quotes, and sensor data, are often characterized as...
Multimedia systems -- Mathematical models. ; Information storage and retrieval systems. ; Machinery -- Alignment.
This thesis introduces multiple media correlation, a new technology for the automatic alignment of multiple media objects such as text, audio, and video. This research began with the question: what can be learned when multiple multimedia components...
The problem of moving rigid bodies efficiently is of particular interest in robotics because the simplest model of a mobile robot or of a manipulated object is often a rigid body. Path planning, controller design and robot design may all benefit...
For a long-lived metastable system, the decay of the survival probability is typically exponential. However, deviations are known to exist at short times (the quantum Zeno effect) and at long times (algebraic tails in classical hydrodynamic...