Recently, the millwork industry in Oregon, an important consumer
of pine lumber produced in this region, has undergone a series of changes which have seemingly affected its structure and marketing organization.
The principal purpose of this study is to explain these changes in terms of economic analysis and to find...
This compilation of theses and dissertations (a part of the OSU Bibliographic Series) for the period 1970-1977 reflects this university's emphasis on research and graduate study. It may be viewed as an indicator of the contributions made to the state of Oregon through graduate study and research at Oregon State...
One of the pervasive problems arising in our modern, digital world surrounds data breaches where an adversary, through zero-day exploitations, phishing, or old-fashioned social engineering attacks, gains access to a service’s data stores. Our society increasingly relies on these cloud-based services for everything from our taxes to personal communication. As...
For over 30 years, the Implicit Monte Carlo (IMC) method has been used to
solve challenging problems in thermal radiative transfer. These problems are typically optically thick and di ffusive, as a consequence of the high degree of "pseudo-scattering" introduced to model the absorption and reemission of photons from a...
The advent of deep learning models leads to a substantial improvement in a wide range of NLP tasks, achieving state-of-art performances without any hand-crafted features. However, training deep models requires a massive amount of labeled data. Labeling new data as a new task or domain emerges consumes time and efforts...
Private matching (PM) is a key cryptographic primitive in secure computation that allows several parties to jointly compute some functions depending on their private inputs. Indeed, this primitive has many practical applications. For instance, in online advertising, two companies may wish to find their common customers for a joint marketing...
In this thesis, I present the variational database management system, a formal framework and its implementation for representing variation in relational databases and managing variational information needs. A variational database is intended to support any kind of variation in a database. Specific kinds of variation in databases have already been...
The scarcity of wireless spectrum resources and the overwhelming demand for wireless broadband resources have prompted industry, government agencies and academia within the wireless communities to develop and come up with effective solutions that can make additional spectrum available for broadband data. As part of these ongoing efforts, cognitive radio...
A secret sharing scheme allows a dealer to distribute a secret with a set of parties, such that only a certain subset of parties can collaborate and learn the shared secret. Traditional secret sharing schemes have been used as building blocks in various subdomains of cryptography. Recently, two new extensions...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...