Oregon's estuaries are important ecosystems for scientific study. Consequently, knowledge of what research has been conducted helps us identify benchmarks and plan new projects. A comprehensive bibliography of published research, technical reports, local documents, and data sets is one means of recording this knowledge. For these reasons, the Guin Library...
Oregon's estuaries are important ecosystems for scientific study. Consequently, knowledge of what research has been conducted helps us identify benchmarks and plan new projects. A comprehensive bibliography of published research, technical reports, local documents, and data sets is one means of recording this knowledge. For these reasons, the Guin Library...
Oregon's estuaries are important ecosystems for scientific study. Consequently, knowledge of what research has been conducted helps us identify benchmarks and plan new projects. A comprehensive bibliography of published research, technical reports, local documents, and data sets is one means of recording this knowledge. For these reasons, the Guin Library...
One of the pervasive problems arising in our modern, digital world surrounds data breaches where an adversary, through zero-day exploitations, phishing, or old-fashioned social engineering attacks, gains access to a service’s data stores. Our society increasingly relies on these cloud-based services for everything from our taxes to personal communication. As...
A secret sharing scheme allows a dealer to distribute a secret with a set of parties, such that only a certain subset of parties can collaborate and learn the shared secret. Traditional secret sharing schemes have been used as building blocks in various subdomains of cryptography. Recently, two new extensions...
Over time, Open Source Software (OSS) has become indispensable in the creation and upkeep of software products, serving as the fundamental building block for widely used solutions in our daily lives, including applications that enable communication, entertainment, and productivity. A sustainable OSS ecosystem is one that attracts and retains a...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...
The focus of this thesis is to design, characterize, and apply novel computational methods and molecular systems to interrogate heterogeneous human gut microbiome-related phenomena. In Chapter 2, I design, implement, and characterize a method for embedding co-occurrence patterns derived from massive 16s amplicon datasets. I use this method to 1....
Iterative algorithms are simple yet efficient in solving large-scale optimization problems in practice. With a surge in the amount of data in past decades, these methods have become increasingly important in many application areas including matrix/tensor recovery, deep learning, data mining, and reinforcement learning. To optimize or improve iterative algorithms,...
Previous research has shown that traveling in a work zone involves a higher risk of crashing compared to normal (non-work zone) driving conditions. Research further suggests that the severity of work zone crashes is greater on average than non-work zone crashes. The period of time in which the traffic control...