Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
We study the bijective combinatorics of reduced words. These are fundamental objects in the study of Coxeter groups. We restrict our focus to reduced words of permutations and signed permutations. Our results can all be situated within the context...
Constructibility (Set theory). Trees (Graph theory).
This thesis investigates possible initial segments of the degrees of constructibility. Specifically, we completely characterize the structure of degrees in generic extensions of the constructible universe L via forcing with Souslin trees. Then we...
This thesis contains material relating to two separate subjects. The first section determines when the C*-algebra affiliated to a directed graph has continuous trace. We use groupoid methods and the focus is on producing conditions on a graph that...
Pseudomonas aeruginosa is a virulent opportunistic pathogen that is frequently cultured from infectious sites, and is estimated to cause ~12% of nosocomial infections worldwide [1]. P. aeruginosa infections occur in a majority of adults with the...
The focus of this thesis is the study of nuclearity and exactness for groupoid crossed product C*-algebras. In particular, we present generalizations of two well-known facts from group dynamical systems and crossed products to the groupoid setting....
We present aligned hierarchies, a novel solution to the dimension reduction problem, representing high-dimensional and noisy sequential data as a low-dimensional object that encodes relevant information. In this thesis, we motivate our presentation...
In Chapter 2 we look at the distribution of permutation statistics in the context of pattern-avoiding permutations. The first part of this chapter deals with a recursively defined bijection of Robertson [37] between 123- and 132-avoiding...
Cataclysmic variable stars (CVs) are close, interacting binary systems comprised of a white dwarf and a companion star, which is typically a late-type dwarf star. Their progenitor systems are post common envelope binaries (PCEBs) with a white dwarf...
G protein coupled receptors (GPCRs) make up somewhere between 30-50% of all current drug targets, yet the structural characterization of these receptors has been moderate at best. Until recently, structural data were almost nonexistent and...
Two experiments were designed to investigate the effects of brain damage on source monitoring. Source monitoring is the process of making decisions about the origins of memories. Previous research has demonstrated that source monitoring judgments...
Through a series of case studies, signal processing and statistical tools, analyses of dynamic sea ice processes of drift, deformation, and ice pack expansion and decay are investigated for the Weddell Sea region during 1992. Cavitating fluid (CAV)...
We prove the existence of nontrivial multiparameter isospectral deformations of metrics on the classical compact simple Lie groups SO (n) (n = 9, n ≥11), Spin(n) (n = 9, n ≥11), SU (n) (n ≥7), and Sp (n) (n ≥5). The proof breaks into three...
Does early and sustained experience with two languages in childhood modify how language is processed in the adult bilingual brain? Does extensive exposure to two languages influence language processing in the bilingual brain as compared to...
This thesis explores practical and theoretical aspects of several privacy-providing technologies, including tools for anonymous web-browsing, verifiable electronic voting schemes, and private information retrieval from databases. State-of-art...
Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...
Anabolic-androgenic steroids (AAS) are synthetic derivatives of the gonadal hormone, testosterone. Despite their many untoward side effects, AAS are wildly abused for their ergogenic properties. AAS have numerous effects on many organ systems,...
Overweight persons -- Attitudes. ; People with disabilities -- Attitudes. ; Obesity -- Public opinion. ; Stigma (Social psychology). ; Self-presentation.
In the last few years, a new perspective on the management of obesity has emerged. Instead of focusing on dieting and weight loss efforts, the new approach focuses on size acceptance. The concept of positively accepting one's deviant features has...
I investigate the kinematics and space densities of the local cataclysmic variable (CV) population. CVs are close binary star systems composed of a white dwarf that accretes matter from a less compact companion star in Roche lobe overflow....
Polynomials. Finite fields (Algebra). Algebraic functions. Number theory.
The ring of univariate polynomials over a finite field shares many foundational arithmetic properties with the ring of rational integers. This similarity makes it possible for many problems in elementary number theory to be translated 'through the...
Coherent states. Quantum field theory. Nonlinear theories.
In this thesis we study the properties of time-dependent, nontopological configurations and their effect on the macroscopic properties of a system described by a nonlinear field theory. These structures seem to be ubiquitous in relativistic field...
In the past decade, the use of ordinal patterns in the analysis of time series and dynamical systems has become an important tool. Ordinal patterns (otherwise known as a permutation patterns) are found in time series by taking n data points at...