Operating systems and low-level applications are usually written in languages like C and assembly, which provide access to low-level abstractions. These languages have unsafe type systems that allow many bugs to slip by programmers. For example, in...
We expect wireless body-area networks of pervasive wearable devices will enable in situ health monitoring, personal assistance, entertainment personalization, and home automation. As these devices become ubiquitous, we also expect them to...
We study motion planning problems, finding trajectories that connect two configurations of a system, from two different perspectives: optimality and survivability. For the problem of finding optimal trajectories, we provide a model in which the...
The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even...
This thesis contains material relating to two separate subjects. The first section determines when the C*-algebra affiliated to a directed graph has continuous trace. We use groupoid methods and the focus is on producing conditions on a graph that...
In Chapter 2 we look at the distribution of permutation statistics in the context of pattern-avoiding permutations. The first part of this chapter deals with a recursively defined bijection of Robertson [37] between 123- and 132-avoiding...
Computer input-output equipment. ; Computational grids (Computer systems). ; High performance computing. ; Electronic data processing -- Distributed processing.
High-performance computing increasingly occurs on computational grids composed of heterogeneous and geographically distributed systems of computers, networks, and storage devices that collectively act as a single virtual computer. A key challenge...
Polynomials. Finite fields (Algebra). Algebraic functions. Number theory.
The ring of univariate polynomials over a finite field shares many foundational arithmetic properties with the ring of rational integers. This similarity makes it possible for many problems in elementary number theory to be translated 'through the...
Pervasive computing leads to an increased integration between the real world and the computational world, and many applications in pervasive computing adapt to the user's context, such as the location of the user and relevant devices, the presence...
Coding theory. Characters of groups. Error-correcting codes (Information theory). Polynomials.
We introduce vector-valued character theory, a higher dimensional generalization of character theory. We then use vector-valued characters to extend the MacWilliams equivalence theorem for linear codes to a class of additive codes, called...
We present a number of findings concerning groupoid dynamical systems and groupoid crossed products. The primary result is an identification of the spectrum of the groupoid crossed product when the groupoid has continuously varying abelian...
Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
This thesis constitutes the first steps in the author's program to investigate the question of when a homotopy of 2-cocycles Ï‰ = {Ï‰[subscript t]}[subscript tâˆŠ[0,1]] on a locally compact Hausdorff groupoid Æ“ induces an isomorphism of the...
In this thesis, we consider several problems relating to cyclic subgroups of the group [mathematical equation]. Each element of [mathematical equation] has a unique representative in one of the two intervals [mathematical equation] and...
Partially ordered sets. ; Convex polytopes. ; Representations of groups.
This thesis deals with geometric representations of ordered sets. In a geometric representation, each element of the ordered set is assigned a geometric object, with two elements incomparable in the ordered set if and only if the corresponding...
Earlier work has suggested that various neurological or neuropsychiatric disorders may result in characteristic spatial patterns in brain activation, potentially allowing their detection from maps of brain activity under different conditions....
Cytochrome P450 (CYP) 2E1 is considered the sole CYP responsible for APAP bioactivation leading to hepatotoxicity. CYP2E1 is also considered the alcohol-inducible CYP and therefore, the sole CYP responsible for alcohol-mediated increases in APAP...
Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...