Recent technological advances have fostered the emergence of Wireless Sensor Networks (WSNs), which consist of tiny, wireless, battery-powered nodes that are expected to revolutionize the ways in which we understand and construct complex physical...
As the visual effect and movie industries are striving for realism and high fidelity images, physically based lighting, global illumination, realistic materials, and highly tessellated geometry are gradually accepted and used in movie and game...
We begin with a result on the refocussing of null geodesics in space-times. We show that all oriented refocussing 2-dimensional Lorentz manifolds are also strongly refocussing. We also introduce a theory of virtual Legendrian knots. We show that...
We present aligned hierarchies, a novel solution to the dimension reduction problem, representing high-dimensional and noisy sequential data as a low-dimensional object that encodes relevant information. In this thesis, we motivate our presentation...
Computer input-output equipment. ; Computational grids (Computer systems). ; High performance computing. ; Electronic data processing -- Distributed processing.
High-performance computing increasingly occurs on computational grids composed of heterogeneous and geographically distributed systems of computers, networks, and storage devices that collectively act as a single virtual computer. A key challenge...
This thesis explores practical and theoretical aspects of several privacy-providing technologies, including tools for anonymous web-browsing, verifiable electronic voting schemes, and private information retrieval from databases. State-of-art...
I investigated the effects of two contemporary disturbances to soil systems: forest clearing in the northeastern U.S. and climate-driven plant succession in the Arctic. To test the effects of clear-cutting forests on mineral soil carbon (C)...
In the past decade, the use of ordinal patterns in the analysis of time series and dynamical systems has become an important tool. Ordinal patterns (otherwise known as a permutation patterns) are found in time series by taking n data points at...
For ordinary knots in R 3 , there are no degree one Vassiliev invariants. For virtual knots, however, the space of degree one Vassiliev invariants is infinite dimensional. We introduce a sequence of three degree one Vassiliev invariants of virtual...
There are no Vassiliev invariants of degree one for classical knots. A. Henrich proved the existence of a sequence of three Vassiliev invariants of degree one for virtual knots. The invariants get stronger and stronger, and the final invariant is...
In this thesis we develop a theory of Fourier analysis and fast Fourier transforms (FFTs) for finite inverse semigroups. Our results generalize results in the theory of Fourier analysis for finite groups. There is a general method for generating...
Plant genetic engineering. ; Plants -- Effect of cadmium on. ; Cadmium -- Physiological transport.
Iron plays a central role in key biological processes in both plants and animals. Lack of available iron commonly limits plant growth and nutritional value. Worldwide, dietary iron is primarily obtained from plant sources and, despite our best...
In the Firefighter Problem, a fire starts at a vertex of a graph, and in discrete time units, it spreads from burned vertices to their neighbors, unless they are protected by one of the f firefighters that are deployed every turn. Once burned or...
Little is known about the emergence of life from nonliving precursors. A key missing- piece is the origin of homochirality: nearly all life is characterized by exclusively dextrorotary sugars and levorotary amino acids. The research presented in...
Experimental and theoretical aspects of macroscopic and mesoscopic elastic instability are investigated in this thesis. For the theoretical investigations we utilize a Lagrangian formulation of nonlinear continuum elasticity theory, the novel...
A polynomial is a product of distinct cyclotomic polynomials if and only if it is a divisor over [Special characters omitted.] [x ] of xn - 1 for some positive integer n. In this thesis, we will examine two natural questions concerning the divisors...
Strong evidence exists showing that stellar evolution models are unable to accurately predict the fundamental properties of low-mass stars. Observations of low-mass stars in detached eclipsing binaries (DEBs) indicate that stellar models...
Magnetic resonance elastography (MRE) is a technique to produce images of the mechanical properties of tissue, which are indicative of a variety of diseases. Tissue motions measured using MRI are used to solve an inverse problem to recover...
We examine variations of cops and robbers games on graphs. Our goals are to introduce some randomness into their study, and to estimate (expected) capture time. We show that a cop chasing a random walker can capture him in expected time n + o(n)....
The demand for novel molecularly targeted drugs will continue to rise as we make progress toward personalizing cancer treatments to the molecular signatures of individual tumors. While the collection and analysis of genomic data has become routine,...
Thermodynamics, and the classic balance between entropy and enthalpy, provides a proverbial zoo of exotic phase behaviour that chemists can harness to create new materials out of simple liquids and polymers. The diversity of self-assembling...
We have a limited understanding of how an opinion is originated, how an opinion and information supporting and explaining it gets conveyed, and how the communicated opinion is perceived and processed by others. One direction of current research...
The purpose of this thesis is to describe methods for detecting hidden crevasses on glaciers in Polar regions. Crevasses form in ice sheets as a result of forces imposed upon the brittle ice. The crevasses are hidden from view by bridges of soft...
During our fieldwork with real-world organizations---including those in Public Key Infrastructure (PKI), network configuration management, and the electrical power grid---we repeatedly noticed that security policies and related security artifacts...