Introduction. Nosocomial sepsis in extremely low birth weight (ELBW) infants 501-1000 grams is associated with increased mortality risk, prolonged hospitalization, and increased costs of care. Purpose. The purpose of this thesis was to evaluate the...
Quantitative Risk Analysis of Computer Networks (QSRA) addresses the problem of risk opacity of software in networks. It allows risk managers to get a detailed and comprehensive snapshot of the constitutive software on the network, assess its risk...
During our fieldwork with real-world organizations---including those in Public Key Infrastructure (PKI), network configuration management, and the electrical power grid---we repeatedly noticed that security policies and related security artifacts...
After decades of searching we have yet to find the progenitor systems for type Ia supernovae. In fact most of what we know about this homogeneous class of supernovae is from spectral features associated with the incinerated remains of the C+O white...
Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
This thesis explores practical and theoretical aspects of several privacy-providing technologies, including tools for anonymous web-browsing, verifiable electronic voting schemes, and private information retrieval from databases. State-of-art...
Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...
Wireless communication systems. Computer networks. Routers (Computer networks).
A mesh network is a network of wireless routers that employ multi-hop routing and can be used to provide network access for mobile clients. Mobile mesh networks can be deployed rapidly to provide an alternate communication infrastructure for...
Since its discovery in the 1930's, the Cherenkov effect has been paramount in the development of high-energy physics research. It results in light emission from charged particles traveling faster than the local speed of light in a dielectric...
Air -- Pollution. ; Indoor air pollution. ; Air -- Pollution -- Measurement.
The polycyclic aromatic hydrocarbon (PAH) content of ambient air at several locations is described. The indoor sites examined included those having woodstoves, fireplaces, and kerosene heaters as supplements to oil heat, as well as one test home...
Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
Breast -- Magnetic resonance imaging. Breast -- Tomography. Near infrared spectroscopy. Optical tomography. Imaging systems -- Design and construction. Diagnostic imaging -- Mathematical models.
A mobile agent is an autonomous program that can migrate under its own control from machine to machine in a heterogeneous network. In other words, the program can suspend its execution at an arbitrary point, transport itself to another machine, and...
Light scattering from tissue originates from the fluctuations in intra-cellular and extra-cellular components, so it is possible that macroscopic scattering spectroscopy could be used to quantify sub-microscopic structures. Both electron microscopy...
Nurses -- Health and hygiene. Employee health promotion.
Background. Worksite health promotion programs (HPP) support employees' health behaviors to prevent downstream diseases. Maximizing participation can optimize program impact. Objectives. To assess staff nurses' participation in three HPP - flu...
Electronic mail systems -- Security measures. Electronic mail systems -- Social aspects. Trust.
A secure system that cannot be used by real users to secure real-world processes is not really secure at all. While many believe that usability and security are diametrically opposed, a growing body of research from the field of Human-Computer...
Community mental health services -- Decision making. Mentally ill -- Care -- Decision making. Psychotherapist and patient.
Background. Electronic decision support systems (EDSS) using a shared decision making framework may be a new technology to facilitate service planning in public sector mental health care. The case management context is a ripe testing ground for...
The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even...
Two alloys, Fe 55 Mn 19 Al 26 and Fe 30 Ni 20 Mn 35 Al 15 , were studied in this research project. The yield stress anomaly (YSA) of Fe 55 Mn 19 Al 26 single crystal was observed with a yield stress peak at 700 K. In situ TEM straining revealed...
Background:
With the science and transparency of quality measurement unfolding, and economic forces changing, hospital leaders seek to aggressively improve their systems' care quality. Successful organizational transformations will engage everyone...