Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 631 - 660 of 7321

Full-Text Articles in Physical Sciences and Mathematics

Inside Unlv, Shane Bevell, Tony Allen, Karen Sharp, Mamie Peers, Cate Weeks Nov 2008

Inside Unlv, Shane Bevell, Tony Allen, Karen Sharp, Mamie Peers, Cate Weeks

Inside UNLV

No abstract provided.


Genetic Markers Of Igg Influence The Outcome Of Infection With Hepatitis C Virus, Janardan P. Pandey, Aryan M. Namboodiri, Yuqun Luo, Yuping Wu, Robert C. Elston, David L. Thomas, Hugo R. Rosen, James J. Goedert Nov 2008

Genetic Markers Of Igg Influence The Outcome Of Infection With Hepatitis C Virus, Janardan P. Pandey, Aryan M. Namboodiri, Yuqun Luo, Yuping Wu, Robert C. Elston, David L. Thomas, Hugo R. Rosen, James J. Goedert

Mathematics and Statistics Faculty Publications

We examined the role that immunoglobulin GM and KM allotypes—genetic markers of γ and κ chains, respectively—play in the outcome of hepatitis C virus (HCV) infection in white Americans. A total of 119 persons who had cleared HCV and 111 with persistent HCV infection were genotyped for the presence of several GM and KM determinants. Persistent HCV infection was more than three times as likely (odds ratio, 3.50; P = .01) in subjects who were carriers of the GM3 allele than in those who were noncarriers. These results show that particular GM alleles may be important determinants of the outcome …


Magnetic Field Measurements Of O Stars With Fors 1 At The Vlt., S. Hubrig, M. Schöller, R. Schnerr, J. González, Richard Ignace, H. Henrichs Nov 2008

Magnetic Field Measurements Of O Stars With Fors 1 At The Vlt., S. Hubrig, M. Schöller, R. Schnerr, J. González, Richard Ignace, H. Henrichs

ETSU Faculty Works

Context.The presence of magnetic fields in O-type stars has been suspected for a long time. The discovery of these fields would explain a wide range of well documented enigmatic phenomena in massive stars, in particular cyclical wind variability, Hα emission variations, chemical peculiarity, narrow X-ray emission lines, and non-thermal radio/X-ray emission. Aims.To investigate the incidence of magnetic fields in O stars, we acquired 38 new spectropolarimetric observations with FORS 1 (FOcal Reducer low dispersion Spectrograph) mounted on the 8-m Kueyen telescope of the VLT. Methods.Spectropolarimetric observations were obtained at different phases for a sample of 13 O …


Two-Factor Mutual Authentication Based On Smart Cards And Passwords, Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng Nov 2008

Two-Factor Mutual Authentication Based On Smart Cards And Passwords, Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng

Research Collection School Of Computing and Information Systems

One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart-card and password. A scheme of this type is called a smart-card-based password authentication scheme. The core feature of such a scheme is to enforce two-factor authentication in the sense that the client must have the smart-card and know the password in order to gain access to the server. In this paper, we scrutinize the security requirements of this kind of schemes, and propose a new scheme and a generic construction framework for smart-card-based password authentication. We show that a secure password based key exchange protocol …


Model-Driven Remote Attestation: Attesting Remote System From Behavioral Aspect, Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei Nov 2008

Model-Driven Remote Attestation: Attesting Remote System From Behavioral Aspect, Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei

Research Collection School Of Computing and Information Systems

Remote attestation was introduced in TCG specifications to determine whether a remote system is trusted to behave in a particular manner for a specific purpose; however, most of the existing approaches attest only the integrity state of a remote system and hence have a long way to go in achieving the above attestation objective. Behavior-based attestation and semantic attestation were recently introduced as solutions to approach the TCG attestation objective. In this paper, we extend behavior-based attestation to a model-driven remote attestation to prove that a remote system is trusted as defined by TCG. Our model-driven remote attestation verifies two …


Observations Of Clustering Inside Oceanic Bubble Clouds And The Effect On Short-Range Acoustic Propagation, Thomas C. Weber Nov 2008

Observations Of Clustering Inside Oceanic Bubble Clouds And The Effect On Short-Range Acoustic Propagation, Thomas C. Weber

Center for Coastal and Ocean Mapping

It has recently been shown [Weber, T. C. et al. (Year: 2007). “Acoustic propagation through clustered bubble clouds,” IEEE J. Ocean. Eng.32, 513–523] that gas bubble clustering plays a role in determining the acoustic field characteristics of bubbly fluids. In particular, it has been shown that clustering changes the bubble-induced attenuation as well as the ping-to-ping variability in the acoustic field. The degree to which bubble clustering exists in nature, however, is unknown. This paper describes a method for quantifying bubble clustering using a high frequency (400kHz) multibeam sonar, and reports on observations of near-surface bubbleclustering during a storm ( …


Multiwavelength Analysis Of The Intriguing Grb 061126: The Reverse Shock Scenario And Magnetization, A. Gomboc, S. Kobayashi, C. Guidorzi, A. Melandri, V. Mangano, B. Sbarufatti, C. G. Mundell, P. Schady, R. J. Smith, A C. Updike, D A. Kann, K Misra, E Rol, A Pozanenko, A J. Castro-Tirado, G C. Anupama, D Bersier, M F. Bode, D Carter, P Curran, A Fruchter, J Graham, Dieter H. Hartmann, M Ibrahimov, A Levan, A Monfardini, C J. Mottram, P T. O'Brien, P Prema, D K. Sahu, I A. Steele, N R. Tanvir, K Wiersema Nov 2008

Multiwavelength Analysis Of The Intriguing Grb 061126: The Reverse Shock Scenario And Magnetization, A. Gomboc, S. Kobayashi, C. Guidorzi, A. Melandri, V. Mangano, B. Sbarufatti, C. G. Mundell, P. Schady, R. J. Smith, A C. Updike, D A. Kann, K Misra, E Rol, A Pozanenko, A J. Castro-Tirado, G C. Anupama, D Bersier, M F. Bode, D Carter, P Curran, A Fruchter, J Graham, Dieter H. Hartmann, M Ibrahimov, A Levan, A Monfardini, C J. Mottram, P T. O'Brien, P Prema, D K. Sahu, I A. Steele, N R. Tanvir, K Wiersema

Publications

We present a detailed study of the prompt and afterglow emission from Swift GRB 061126 using BAT, XRT, UVOT data and multicolor optical imaging from 10 ground-based telescopes. GRB 061126 was a long burst (T90 ¼191 s) with four overlapping peaks in its -ray light curve. The X-ray afterglow, observed from 26 minutes to 20 days after the burst, shows a simple power-law decay with X ¼1:290 Æ0:008. Optical observations presented here cover the time range from 258 s (Faulkes Telescope North) to 15 days (Gemini North) after the burst; the decay rate of the optical afterglow shows a steep-to-shallow …


Laser Channeling Of Bethe-Heitler Pairs, Erik Lotstedt, Ulrich D. Jentschura, Christoph H. Keitel Nov 2008

Laser Channeling Of Bethe-Heitler Pairs, Erik Lotstedt, Ulrich D. Jentschura, Christoph H. Keitel

Physics Faculty Research & Creative Works

Electron-positron pair creation is analyzed for an arrangement involving three external fields: a high-frequency gamma photon, the Coulomb field of a nucleus, and a strong laser wave. The frequency of the incoming gamma photon is assumed to be larger than the threshold for pair production in the absence of a laser, and the peak electric field of the laser is assumed to be much weaker than Schwinger's critical field. The total number of pairs produced is found to be essentially unchanged by the laser field, while the differential cross section is drastically modified. We show that the laser can channel …


What Is Ccs?, University Of North Dakota. Energy And Environmental Research Center Nov 2008

What Is Ccs?, University Of North Dakota. Energy And Environmental Research Center

EERC Brochures and Fact Sheets

Fact sheet about carbon capture and storage (CCS) and the Plains CO2 Reduction (PCOR) Partnership. Outlines the three phases of U.S. Department of Energy (DOE) National Energy Technology Laboratory’s Regional Carbon Sequestration Partnership (RCSP) program.


Turbulent Dispersion In Cloudy Boundary Layers, Remco A. Verzijlbergh, Harmen J.J. Jonker, Thijs Heus, J. Vilà-Guerau De Arellano Nov 2008

Turbulent Dispersion In Cloudy Boundary Layers, Remco A. Verzijlbergh, Harmen J.J. Jonker, Thijs Heus, J. Vilà-Guerau De Arellano

Physics Faculty Publications

Compared to dry boundary layers, dispersion in cloud-topped boundary layers has received less attention. In this LES based numerical study we investigate the dispersion of a passive tracer in the form of Lagrangian particles for four kinds of atmospheric boundary layers: 1) a dry convective boundary layer (for reference), 2) a "smoke" cloud boundary layer in which the turbulence is driven by radiative cooling, 3) a stratocumulus topped boundary layer and 4) a shallow cumulus topped boundary layer. We show that the dispersion characteristics of the smoke cloud boundary layer as well as the stratocumulus situation can be well understood …


A New Framework For The Design And Analysis Of Identity-Based Identification Schemes, Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang Nov 2008

A New Framework For The Design And Analysis Of Identity-Based Identification Schemes, Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang

Research Collection School Of Computing and Information Systems

Constructing an identification scheme is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify himself to a public verifier who knows only the claimed identity of the prover and some public information. In this paper, we propose a new framework for both the design and analysis of IBI schemes. Our approach works in an engineering way. We first identify an IBI scheme as the composition of two building blocks, and then show that, with different security properties of these building blocks, the corresponding IBI schemes can …


Beyond Semantic Search: What You Observe May Not Be What You Think, Chong-Wah Ngo, Yu-Gang Jiang, Xiaoyong Wei, Wanlei Zhao, Feng Wang, Xiao Wu, Hung-Khoon Tan Nov 2008

Beyond Semantic Search: What You Observe May Not Be What You Think, Chong-Wah Ngo, Yu-Gang Jiang, Xiaoyong Wei, Wanlei Zhao, Feng Wang, Xiao Wu, Hung-Khoon Tan

Research Collection School Of Computing and Information Systems

This paper presents our approaches and results of the four TRECVID 2008 tasks we participated in: high-level feature extraction, automatic video search, video copy detection, and rushes summarization


Market Liquidity Provision For On-Demand Computing, Zhiling Guo Nov 2008

Market Liquidity Provision For On-Demand Computing, Zhiling Guo

Research Collection School Of Computing and Information Systems

This paper focuses on a market intermediary’s role of liquidity provision to support on-demand computing in a dynamic market trading environment. We outline a framework in which a number of distributed agents sell and buy assets based on their changing utilities over time and a service provider acts as a market maker performing market intervention. We present benchmark models based on socially optimal liquidity provision and a brokerage framework. We then examine the benefits and the dealer’s incentives to provide market liquidity.


Profile-Guided Program Simplification For Effective Testing And Analysis, Lingxiao Jiang, Zhendong Su Nov 2008

Profile-Guided Program Simplification For Effective Testing And Analysis, Lingxiao Jiang, Zhendong Su

Research Collection School Of Computing and Information Systems

Many testing and analysis techniques have been developed for inhouse use. Although they are effective at discovering defects before a program is deployed, these techniques are often limited due to the complexity of real-world code and thus miss program faults. It will be the users of the program who eventually experience failures caused by the undetected faults. To take advantage of the large number of program runs carried by the users, recent work has proposed techniques to collect execution profiles from the users for developers to perform post-deployment failure analysis. However, in order to protect users' privacy and to reduce …


Visualizing A Fourth Dimension: Hypercubic Resistor Networks, Andrew J. Nelson '08 Nov 2008

Visualizing A Fourth Dimension: Hypercubic Resistor Networks, Andrew J. Nelson '08

Honors Projects

A booming field in physics research today is the search for extra dimensions. This is something that has been thought about and discussed in both the scientific and non-scientific world for a long time. Many physicists are currently attempting to answer the question: "is our world really four dimensional?" The purpose of this research, however, is not to answer that question. The purpose of this work is to help reveal four-dimensional artifacts in our perceived three-dimensional world in order to help a student, even a non-physicist, to understand and visualize how the extra spatial dimensionality, if present, might reveal itself …


Ubi-App: A Ubiquitous Application For Universal Access From Handheld Devices, Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed Nov 2008

Ubi-App: A Ubiquitous Application For Universal Access From Handheld Devices, Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed

Mathematics, Statistics and Computer Science Faculty Research and Publications

Universal access from a handheld device (such as a PDA, cell phone) at any time or anywhere is now a reality. Ubicomp Assistant (UA) (Sharmin et al. in Proceedings of the 21st annual ACM symposium on applied computing (ACM SAC 2006), Dijon, France, pp 1013–1017, 2006) is an integral service of MARKS (Sharmin et al. in Proceedings of the third international conference on information technology: new generations (ITNG 2006), Las Vegas, Nevada, USA, pp 306–313, 2006). It is a middleware developed for handheld devices, and has been designed to accommodate different types of users (e.g., education, healthcare, marketing, or business). …


Kinetic And Spectroscopic Analysis Of The Catalytic Role Of H79 In The Methionine Aminopeptidase From Escherichia Coli, Sarah J. Watterson, Sanghamitra Mitra, Sabina I. Swierczek, Brian Bennett, Richard C. Holz Nov 2008

Kinetic And Spectroscopic Analysis Of The Catalytic Role Of H79 In The Methionine Aminopeptidase From Escherichia Coli, Sarah J. Watterson, Sanghamitra Mitra, Sabina I. Swierczek, Brian Bennett, Richard C. Holz

Physics Faculty Research and Publications

To gain insight into the role of the strictly conserved histidine residue, H79, in the reaction mechanism of the methionyl aminopeptidase from Escherichia coli (EcMetAP-I), the H79A mutated enzyme was prepared. Co(II)-loaded H79A exhibits an overall >7000-fold decrease in specific activity. The almost complete loss of activity is primarily due to a >6000-fold decrease in kcat. Interestingly, the Km value obtained for Co(II)-loaded H79A was approximately half the value observed for wild-type (WT) EcMetAP-I. Consequently, kcat/Km values decreased only 3000-fold. On the other hand, the observed specific activity of Mn(II)-loaded …


Revisiting Unitarity Corrections For Electromagnetic Processes In Collisions Of Relativistic Nuclei, Ulrich D. Jentschura, Kai Hencken, Valery G. Serbo Nov 2008

Revisiting Unitarity Corrections For Electromagnetic Processes In Collisions Of Relativistic Nuclei, Ulrich D. Jentschura, Kai Hencken, Valery G. Serbo

Physics Faculty Research & Creative Works

Unitarity corrections to several electromagnetic processes in collisions of relativistic heavy nuclei are considered. They are due to the unitarity requirement for the S-matrix and correspond to the exchange of a light-by-light scattering block between colliding nuclei. We obtain improved results for the corrections to e+ e- and μ+ μ- pair production as well as new results for unitarity corrections to the production of photons via virtual Compton and virtual Delbrück scattering. These corrections can be numerically large; e.g., the μ+ μ- pair production cross section is reduced by about 50% and nuclear bremsstrahlung …


Multicolor Conjugated Polymer Dots For Biological Fluorescence Imaging, Changfeng Wu, Barbara Bull, Craig Szymanski, Kenneth Christensen, Jason Mcneill Nov 2008

Multicolor Conjugated Polymer Dots For Biological Fluorescence Imaging, Changfeng Wu, Barbara Bull, Craig Szymanski, Kenneth Christensen, Jason Mcneill

Publications

Highly fluorescent conjugated polymer dots were developed for demanding applications such as fluorescence imaging in live cells. These nanoparticles exhibit small particle diameters, extraordinary fluorescence brightness, and excellent photostability. Single particle fluorescence imaging and kinetic studies indicate much higher emission rates (∼108 s−1) and little or no blinking of the nanoparticles as compared to typical results for single dye molecules and quantum dots. Analysis of single particle photobleaching trajectories reveals excellent photostability—as many as 109 or more photons emitted per nanoparticle prior to irreversible photobleaching. The superior figures of merit of these new fluorescent probes, together …


Localizing Sensor Networks In Un-Friendly Environments, Sriram Chellappan, Vamsi Paruchuri, Dylan Mcdonald, Arjan Durresi Nov 2008

Localizing Sensor Networks In Un-Friendly Environments, Sriram Chellappan, Vamsi Paruchuri, Dylan Mcdonald, Arjan Durresi

Computer Science Faculty Research & Creative Works

In this paper, we study the issue of defending against a wireless sensor network (WSN) that has been deployed by a malicious enemy agent in an area of interest to us. While there can be many approaches to defend against maliciously deployed WSNs, we propose the design of a localization centric approach. Specifically, the problem we address is: given an enemy deployed WSN in an area of interest to us, how can we determine locations of the sensors without co-operating with the sensors themselves during localization. In our approach, we employ a physically mobile agent called the localizer (e.g., a …


City Of Chesapeake, Virginia Shoreline Inventory Report Methods And Guidelines, Marcia Berman, Harry Berquist, Sharon Killeen, Carl Hershner, Karinna Nunez, Karen Reay, Tamia Rudnicky, Daniel Schatt, Dave Weiss Nov 2008

City Of Chesapeake, Virginia Shoreline Inventory Report Methods And Guidelines, Marcia Berman, Harry Berquist, Sharon Killeen, Carl Hershner, Karinna Nunez, Karen Reay, Tamia Rudnicky, Daniel Schatt, Dave Weiss

Reports

This shoreline inventory is developed as a tool for assessing conditions along the tidal shoreline in the City of Chesapeake. Field data were collected between June and July 2002. Conditions are reported for three zones within the immediate riparian river area: riparian land use, bank and buffers, and the shoreline. A series of maps and tabular data are published to illustrate and quantify results of an extensive shoreline survey. Shorelines of the western, southern and eastern branches of the Elizabeth River including small tributaries were surveyed for this inventory. Small sections were coded using remote sensing techniques because the shoreline …


Lifestyle Of Shellmound Builders In Brazil (Galley Proofs), Sabine Eggers, C. C. Petronilho, K. Brandt, J. Filippini, Karl J. Reinhard Nov 2008

Lifestyle Of Shellmound Builders In Brazil (Galley Proofs), Sabine Eggers, C. C. Petronilho, K. Brandt, J. Filippini, Karl J. Reinhard

School of Natural Resources: Faculty Publications

The contact of inland and coastal prehistoric groups in Brazil is believed to have been restricted to regions with no geographical barrier, as is the case in the Ribeira de Iguape valley. The inland osteological collection from the riverine shellmound Moraes (5800–4500 BP) represents a unique opportunity to test this assumption for this region. Despite cultural similarities between riverine and coastal shellmounds, important ecological and site distribution differences are expected to impact on lifestyle. The purpose of this study is thus to document and interpret health and lifestyle indicators in Moraes in comparison to coastal shellmound groups. Specifically we test …


Analyzing The Catalytic Mechanism Of The Fe-Type Nitrile Hydratase From Comamonas Testosteroni Ni1, Saroja Rao, Richard C. Holz Nov 2008

Analyzing The Catalytic Mechanism Of The Fe-Type Nitrile Hydratase From Comamonas Testosteroni Ni1, Saroja Rao, Richard C. Holz

Chemistry Faculty Research and Publications

In order to gain insight into the catalytic mechanism of Fe-type nitrile hydratases (NHase), the pH and temperature dependence of the kinetic parameters kcat, Km, and kcat/Km along with the solvent isotope effect were examined for the Fe-type NHase from Comamonas testosteroni Ni1 (CtNHase). CtNHase was found to exhibit a bell-shaped curve for plots of relative activity vs pH over pH values 4−10 for the hydration of acrylonitrile and was found to display maximal activity at pH ∼7.2. Fits of these data provided a pKES1 value of …


Search For Gravitational-Wave Bursts From Soft Gamma Repeaters, B. P. Abbott, R. Abbott, Mario C. Diaz, R. Grosso, K. Hayama, Soma Mukherjee, Soumya Mohanty, Joseph D. Romano, Robert Stone Nov 2008

Search For Gravitational-Wave Bursts From Soft Gamma Repeaters, B. P. Abbott, R. Abbott, Mario C. Diaz, R. Grosso, K. Hayama, Soma Mukherjee, Soumya Mohanty, Joseph D. Romano, Robert Stone

Physics and Astronomy Faculty Publications and Presentations

We present a LIGO search for short-duration gravitational waves (GWs) associated with soft gamma ray repeater (SGR) bursts. This is the first search sensitive to neutron star f modes, usually considered the most efficient GW emitting modes. We find no evidence of GWs associated with any SGR burst in a sample consisting of the 27 Dec. 2004 giant flare from SGR 1806−20 and 190 lesser events from SGR 1806−20 and SGR 1900+14. The unprecedented sensitivity of the detectors allows us to set the most stringent limits on transient GW amplitudes published to date. We find upper limit estimates on the …


Bias And Controversy In Evaluation Systems, Hady Wirawan Lauw, Ee Peng Lim, Ke Wang Nov 2008

Bias And Controversy In Evaluation Systems, Hady Wirawan Lauw, Ee Peng Lim, Ke Wang

Research Collection School Of Computing and Information Systems

Evaluation is prevalent in real life. With the advent of Web 2.0, online evaluation has become an important feature in many applications that involve information (e.g., video, photo, and audio) sharing and social networking (e.g., blogging). In these evaluation settings, a set of reviewers assign scores to a set of objects. As part of the evaluation analysis, we want to obtain fair reviews for all the given objects. However, the reality is that reviewers may deviate in their scores assigned to the same object, due to the potential bias of reviewers or controversy of objects. The statistical approach of averaging …


Modality Mixture Projections For Semantic Video Event Detection, Jialie Shen, Dacheng Tao, Xuelong Li Nov 2008

Modality Mixture Projections For Semantic Video Event Detection, Jialie Shen, Dacheng Tao, Xuelong Li

Research Collection School Of Computing and Information Systems

Event detection is one of the most fundamental components for various kinds of domain applications of video information system. In recent years, it has gained a considerable interest of practitioners and academics from different areas. While detecting video event has been the subject of extensive research efforts recently, much less existing approach has considered multimodal information and related efficiency issues. In this paper, we use a subspace selection technique to achieve fast and accurate video event detection using a subspace selection technique. The approach is capable of discriminating different classes and preserving the intramodal geometry of samples within an identical …


A Catalog Of Outer Ejecta Knots In The Cassiopeia A Supernova Remnant, Molly C. Hammell, Robert A. Fesen Nov 2008

A Catalog Of Outer Ejecta Knots In The Cassiopeia A Supernova Remnant, Molly C. Hammell, Robert A. Fesen

Dartmouth Scholarship

Hubble Space Telescope images of the core-collapse supernova remnant Cassiopeia A are used to identify high-velocity knots of ejecta located outside the remnant's main emission shell of expanding debris. These ejecta fragments are found near or ahead of the remnant's forward shock front and mostly lie from 120'' to 300'' in radial distance from the remnant's center of expansion. Filter flux ratios when correlated with published spectra show that these knots can be divided into three emission classes: (1) knots dominated by [N II] λλ6548, 6583 emissions, (2) knots dominated by [O II] λλ7319, 7330 emissions, and (3) …


Managing Gambel Oak In Southwestern Ponderosa Pine Forests: The Status Of Our Knowledge, Scott R. Abella Nov 2008

Managing Gambel Oak In Southwestern Ponderosa Pine Forests: The Status Of Our Knowledge, Scott R. Abella

Public Policy and Leadership Faculty Publications

Gambel oak (Quercus gambelii) is a key deciduous species in southwestern ponderosa pine (Pinus ponderosa) forests and is important for wildlife habitat, soil processes, and human values. This report (1) summarizes Gambel oak’s biological characteristics and importance in ponderosa pine forests, (2) synthesizes literature on changes in tree densities and fire frequencies since Euro-American settlement in pine-oak forests, (3) suggests management prescriptions for accomplishing various oak management objectives (for example, increasing diameter growth or acorn production), and (4) provides an appendix containing 203 Gambel oak literature citations organized by subject. Nine studies that reconstructed Gambel oak density changes since settlement …


Irrelevance, Polymorphism, And Erasure In Type Theory, Richard Nathan Mishra-Linger Nov 2008

Irrelevance, Polymorphism, And Erasure In Type Theory, Richard Nathan Mishra-Linger

Dissertations and Theses

Dependent type theory is a proven technology for verified functional programming in which programs and their correctness proofs may be developed using the same rules in a single formal system. In practice, large portions of programs developed in this way have no computational relevance to the ultimate result of the program and should therefore be removed prior to program execution. In previous work on identifying and removing irrelevant portions of programs, computational irrelevance is usually treated as an intrinsic property of program expressions. We find that such an approach forces programmers to maintain two copies of commonly used datatypes: a …


2d Regional Correlation Analysis Of Single-Molecule Time Trajectories, Xuefei Wang, H. Peter Lu Nov 2008

2d Regional Correlation Analysis Of Single-Molecule Time Trajectories, Xuefei Wang, H. Peter Lu

Chemistry Faculty Publications

We report a new approach of 2D regional correlation analysis capable of analyzing fluctuation dynamics of complex multiple correlated and anticorrelated fluctuations under a noncorrelated noise background. Using this new method, by changing and scanning the start time and end time along a pair of fluctuation trajectories, we are able to map out any defined segments along the fluctuation trajectories and determine whether they are correlated, anticorrelated, or noncorrelated; after which, a cross-correlation analysis can be applied for each specific segment to obtain a detailed fluctuation dynamics analysis. We specifically discuss an application of this approach to analyze single-molecule fluorescence …