Renewable energy sources are becoming increasingly important as sustainable alternatives to fossil fuels. One of these renewable sources, cellulosic biomass, is a relatively inexpensive and abundant resource that can be converted into liquid fuels...
Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
Stigma (Social psychology). Aging -- Psychological aspects. Cognition -- Age factors. Older people -- Attitudes.
Extensive research on aging has demonstrated that normal aging debilitates executive function, a system that is critical for regulating stereotypes. However, there is a paucity of research on whether age-related declines to executive function...
Outcome assessment (Medical care). ; Aortic valve -- Surgery -- Complications. ; Aortic valve -- Surgery -- New England. ; Cardiovascular instruments Implanted.
Aortic valve disease is a frequent and serious disorder. Although aortic valve replacement (AVR) is arguably the only effective treatment, important issues remain unresolved in the care of patients with this disease. Recent studies have focused...
Ionospheric radio wave propagation -- Observations. Hiss (Radio meteorology). Auroras -- Antarctica -- Observations.
A VersatIle Electromagnetic Waveform (VIEW) receiver was deployed at South Pole station in December 2002 in order to measure the fine structure of auroral radio emissions with high resolution and an unprecedented 500-1000 kHz bandwidth. Using this...
Robot hands -- Design and construction. Robots -- Motion -- Mathematical models. Manipulators (Mechanism) -- Design and construction. Textile fabrics. Knots and splices. String.
Flexible objects are a challenge to manipulate. Their motions are hard to predict, and the high number of degrees of freedom makes sensing, control, and planning difficult. Additionally, they have more complex friction and contact issues than rigid...
The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even...
Two auroral sounding rocket case studies, one in the dayside and one in the nightside, explore aspects of poleward boundary aurora. The nightside sounding rocket, Cascades-2 was launched on 20 March 2009 at 11:04:00 UT from the Poker Flat Research...
Computer security has come a long way since the days of the first Internet worm. With the spreading and commercialization of the Internet, the stakes have gotten higher. Viruses existed and spread before most computers were online, but as global...