Operating systems and low-level applications are usually written in languages like C and assembly, which provide access to low-level abstractions. These languages have unsafe type systems that allow many bugs to slip by programmers. For example, in...
We study motion planning problems, finding trajectories that connect two configurations of a system, from two different perspectives: optimality and survivability. For the problem of finding optimal trajectories, we provide a model in which the...
Circadian rhythms. ; Light -- Physiological effect. ; Temperature -- Physiological effect. ; Photoreceptors. ; Arabidopsis thaliana -- Effect of light on. ; Arabidopsis thaliana -- Effect of temperature on. ; Arabidopsis thaliana -- Genetics. ;...
The synchronization of a circadian clock to the outside environment is a crucial step in the daily life of most organisms. Light and temperature signals help an organism reset its circadian clock. In the model plant Arabidopsis thaliana, a number...
For a local field K, we study the affine buildings Ξ n and Δ n naturally associated to SL n ( K ) and Sp n ( K ), respectively. Since Sp n ( K ) is a subgroup of SL 2 n ( K ), we investigate properties of a natural embedding of Δ n in Ξ 2 n ....
As methicillin-resistant Staphylococcus aureus (MRSA) hospitalizations keep increasing, the understanding of the characteristics that make one isolate more successful over another is paramount. Strain variations among Staphylococcus aureus observed...
Recent years have witnessed a new class of monitoring applications that need to continuously collect information from remote data sources. Those data sources, such as web click-streams, stock quotes, and sensor data, are often characterized as...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
Metal ions confer structural stability and reactivity to a large number of proteins that use the amino acids histidine (His) and cysteine (Cys) to form stable metal-ligand complexes. The stability of metal-His and metal-Cys interactions and their...
Wireless communication systems. Computer network protocols.
We evaluate mobility predictors in wireless networks. Handoff prediction in wireless networks has long been considered as a mechanism to improve the quality of service provided to mobile wireless users. Most prior studies, however, were based on...
In Chapter 2 we look at the distribution of permutation statistics in the context of pattern-avoiding permutations. The first part of this chapter deals with a recursively defined bijection of Robertson [37] between 123- and 132-avoiding...
G protein coupled receptors (GPCRs) make up somewhere between 30-50% of all current drug targets, yet the structural characterization of these receptors has been moderate at best. Until recently, structural data were almost nonexistent and...
Digital integrated circuits -- Testing. Digital integrated circuits -- Testing -- Mathematical models. Digital integrated circuits -- Design and construction.
The Euler '-function and Carmichael -function are extremely important in modern number theory, and much work has been devoted to studying the distribution and arithmetic properties of the values of each function. One interesting unresolved question...
In order to most effectively investigate protein structure and improve protein function, it is necessary to carefully plan appropriate experiments. The combinatorial number of possible experiment plans demands effective criteria and efficient...
Earlier work has suggested that various neurological or neuropsychiatric disorders may result in characteristic spatial patterns in brain activation, potentially allowing their detection from maps of brain activity under different conditions....
Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...
Polynomials. Finite fields (Algebra). Algebraic functions. Number theory.
The ring of univariate polynomials over a finite field shares many foundational arithmetic properties with the ring of rational integers. This similarity makes it possible for many problems in elementary number theory to be translated 'through the...
APETALA3 ( AP3 ) and PISTILLATA ( PI ) are floral organ identity genes that are necessary and sufficient for petal and stamen development. Surprisingly little is known about molecular mechanisms by which AP3 and PI proteins direct floral organ...
Since its discovery in the 1930's, the Cherenkov effect has been paramount in the development of high-energy physics research. It results in light emission from charged particles traveling faster than the local speed of light in a dielectric...
Some biomacromolecules require a metal co-factor to stabilize their physiologically active three-dimensional structure. The fundamental thermodynamic values of the binding of metal ions, particularly Zn2+, to a set of biomacromolecules have been...
In the past decade, the use of ordinal patterns in the analysis of time series and dynamical systems has become an important tool. Ordinal patterns (otherwise known as a permutation patterns) are found in time series by taking n data points at...
Multimodality imaging is becoming the standard of care for research and clinical studies. Such an approach is able to provide complementary information which can detect and characterize tumors. Advancing instrumentation for diffuse near-infrared...