Computer input-output equipment. ; Computational grids (Computer systems). ; High performance computing. ; Electronic data processing -- Distributed processing.
High-performance computing increasingly occurs on computational grids composed of heterogeneous and geographically distributed systems of computers, networks, and storage devices that collectively act as a single virtual computer. A key challenge...
A fiber can transmit around 25 Tbit/s, but electronic signal processing today is performed at much slower speeds, usually 1-10 Gbit/s. To avoid this "bottleneck" in optical fiber communication systems, all signal processing will have to be done...
A new type of analytic expansion for use in stability calculations is presented and applied to the question of the stability of laminar solutions of the Navier-Stokes equation. This leads in a natural way to a model of the transition from laminar...
For ordinary knots in R 3 , there are no degree one Vassiliev invariants. For virtual knots, however, the space of degree one Vassiliev invariants is infinite dimensional. We introduce a sequence of three degree one Vassiliev invariants of virtual...
This thesis investigates a notion of Turing reducibility introduced by Winkler [8] that is total on all computably enumerable oracles. Groszek and Weber show in [7] that this is a new notion of reducibility and it is not transitive. They give su...
Over the past decade, a pair of instructions called load-linked (LL) and store-conditional (SC) have emerged as the most suitable synchronization instructions for the design of lock-free algorithms. However, current architectures do not support...
Pervasive computing leads to an increased integration between the real world and the computational world, and many applications in pervasive computing adapt to the user's context, such as the location of the user and relevant devices, the presence...
Computer generated 3-D images are proving useful in a wide variety of applications including data visualization, computer animation, virtual reality, telepresence and terrain generation. High-end applications in these fields require images to be...
Predictive control. Adaptive control systems -- Design. Airplanes -- Control systems.
A direct method to design data-based model predictive controllers is presented. The design method uses system identification techniques to identify model predictive controller gains directly from a set of excitation input and disturbance corrupted...
Brain -- Physiology -- Mathematical models.
Brain stem -- Effect of chemicals on.
Basal ganglia -- Physiology.
Understanding how the brain works remains one of the toughest problems in science, despite the progress in scientific technology available for its study. The difficulty lies in the fact that the brain is a dynamic system, while the body of facts...
As the visual effect and movie industries are striving for realism and high fidelity images, physically based lighting, global illumination, realistic materials, and highly tessellated geometry are gradually accepted and used in movie and game...
During our fieldwork with real-world organizations---including those in Public Key Infrastructure (PKI), network configuration management, and the electrical power grid---we repeatedly noticed that security policies and related security artifacts...
Constructibility (Set theory). Trees (Graph theory).
This thesis investigates possible initial segments of the degrees of constructibility. Specifically, we completely characterize the structure of degrees in generic extensions of the constructible universe L via forcing with Souslin trees. Then we...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
Although genome-wide association studies (GWAS) and other high-throughput initiatives have led to an information explosion in human genetics and genetic epidemiology, the mapping from genotype to phenotype remains challenging as most of the...
In the past few years there has been a tremendous growth in the usage of digital images. Users can now access millions of photos, a fact that poses the need of having methods that can efficiently and effectively search the visual information of...
Proteins are ubiquitous in cells and are essential to a wide range of biological processes. Since existing proteins occupy only a small portion of the space of possible amino acid composition, understanding their sequence-structure-function...
In this thesis, we characterize and enumerate the permutations which are realized by the orbits of signed shifts, a family of discrete dynamical systems on words. The permutations, which are called patterns of the signed shifts, are given by the...
In Chapter 2 we look at the distribution of permutation statistics in the context of pattern-avoiding permutations. The first part of this chapter deals with a recursively defined bijection of Robertson [37] between 123- and 132-avoiding...
For many scientific applications, the data set cannot entirely fit in main memory. The data must reside out-of-core, i.e., on parallel disks. For many basic data-movement operations such as permuting, if the programmer does not design efficient...
Through a series of case studies, signal processing and statistical tools, analyses of dynamic sea ice processes of drift, deformation, and ice pack expansion and decay are investigated for the Weddell Sea region during 1992. Cavitating fluid (CAV)...
Operating systems and low-level applications are usually written in languages like C and assembly, which provide access to low-level abstractions. These languages have unsafe type systems that allow many bugs to slip by programmers. For example, in...
Solar (Computer architecture). ; Ubiquitous computing. Sensor networks. ; Detectors. ; User interfaces (Computer systems).
The complexity of developing context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. In this dissertation, we present a Context...
Wireless communication systems. Computer networks. Routers (Computer networks).
A mesh network is a network of wireless routers that employ multi-hop routing and can be used to provide network access for mobile clients. Mobile mesh networks can be deployed rapidly to provide an alternate communication infrastructure for...
In this thesis we look at several problems that lie in the intersection between combinatorial and multiplicative number theory. A common theme of many of these problems are estimates for and properties of the smooth numbers, those integers not...
Boundary integral methods have long been used to solve boundary value problems for elliptic partial differential equations with piecewise constant coefficients, since they have several numerical advantages over conventional volume discretization....
In the past decade, the use of ordinal patterns in the analysis of time series and dynamical systems has become an important tool. Ordinal patterns (otherwise known as a permutation patterns) are found in time series by taking n data points at...