Every moment of our waking lives, our brains filter large quantities of sensory data for goal relevant information. This ability to modulate our sensitivity to incoming inputs is critical in the face of an otherwise overwhelming world, and...
Black-throated blue warbler -- Habitat. Black-throated blue warbler -- Behavior. Black-throated blue warbler -- Food. Black-throated blue warbler -- Nests.
Thermodynamics, and the classic balance between entropy and enthalpy, provides a proverbial zoo of exotic phase behaviour that chemists can harness to create new materials out of simple liquids and polymers. The diversity of self-assembling...
Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...
There are no Vassiliev invariants of degree one for classical knots. A. Henrich proved the existence of a sequence of three Vassiliev invariants of degree one for virtual knots. The invariants get stronger and stronger, and the final invariant is...
Goldman and Turaev constructed a Lie bialgebra structure on the free Z-module generated by free homotopy classes of loops on an oriented surface. Turaev conjectured that the cobracket of A is zero if and only if A is a power of a simple class. Chas...
During our fieldwork with real-world organizations---including those in Public Key Infrastructure (PKI), network configuration management, and the electrical power grid---we repeatedly noticed that security policies and related security artifacts...
Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
In a variety of applications spanning mobile devices, performance computing, and even renewable energy and automotive, power management and power delivery are an increasing bottleneck in reducing size and cost, improving reliability, and even...
This thesis investigates a notion of Turing reducibility introduced by Winkler [8] that is total on all computably enumerable oracles. Groszek and Weber show in [7] that this is a new notion of reducibility and it is not transitive. They give su...
Psychopaths. Personality and emotions. Emotions and cognition.
Research investigating clinical and criminal psychopaths is quite extensive. Though it has evolved in terminology over the years, the basic premise and description of psychopathy has maintained deficits associated with emotional interpretation and...
This thesis focuses on the emergence of universal dynamical scaling in quantum critical spin systems driven out of equilibrium, with emphasis on quench dynamics which involves isolated standard critical points, multi-critical points, and...
We begin with a result on the refocussing of null geodesics in space-times. We show that all oriented refocussing 2-dimensional Lorentz manifolds are also strongly refocussing. We also introduce a theory of virtual Legendrian knots. We show that...
RNA binding proteins are fundamental components of crucial biological processes in all domains of life. The development of techniques to study RNA binding protein complexes is, therefore, broadly impactful. I employed multiple genome-wide...
Proteins are ubiquitous in cells and are essential to a wide range of biological processes. Since existing proteins occupy only a small portion of the space of possible amino acid composition, understanding their sequence-structure-function...
Wireless communication systems. Computer network protocols.
We evaluate mobility predictors in wireless networks. Handoff prediction in wireless networks has long been considered as a mechanism to improve the quality of service provided to mobile wireless users. Most prior studies, however, were based on...
How is concrete conceptual information represented in the brain? Little is known about the neural organization for details of concrete objects when presented as words. The goal of the first two studies was to investigate this. In the third study,...
Quantitative Risk Analysis of Computer Networks (QSRA) addresses the problem of risk opacity of software in networks. It allows risk managers to get a detailed and comprehensive snapshot of the constitutive software on the network, assess its risk...
Robots -- Control systems -- Design and construction. Mobile robots. Robots -- Dynamics.
This thesis examines the issues of vehicle and information dynamics in the control of a multi-robot system using a radial-basis potential function controller. Distributed control of multi-robot systems requires each robot to communicate state...
Operating systems and low-level applications are usually written in languages like C and assembly, which provide access to low-level abstractions. These languages have unsafe type systems that allow many bugs to slip by programmers. For example, in...
This thesis explores practical and theoretical aspects of several privacy-providing technologies, including tools for anonymous web-browsing, verifiable electronic voting schemes, and private information retrieval from databases. State-of-art...
Polynomials. Finite fields (Algebra). Algebraic functions. Number theory.
The ring of univariate polynomials over a finite field shares many foundational arithmetic properties with the ring of rational integers. This similarity makes it possible for many problems in elementary number theory to be translated 'through the...
Coherent states. Quantum field theory. Nonlinear theories.
In this thesis we study the properties of time-dependent, nontopological configurations and their effect on the macroscopic properties of a system described by a nonlinear field theory. These structures seem to be ubiquitous in relativistic field...
For ordinary knots in R 3 , there are no degree one Vassiliev invariants. For virtual knots, however, the space of degree one Vassiliev invariants is infinite dimensional. We introduce a sequence of three degree one Vassiliev invariants of virtual...
The new APM South Equatorial Strip Catalog $({-}17\sp\circ.5<\delta<2\sp\circ.5)$ is used to select a sample of early-type galaxies in three directions: (1) 15h10-16h10; (2) 20h30-21h50; (3) 00h10-01h30. The distances and peculiar motions of...
In this thesis, we present different approaches to tying knots using robots by enforcing different types of constraints. We attack the problem from three different directions; mechanical design, motion planning with simple control strategies, and...