2000 | Grier, Rebecca | A model for the onset of tumor angiogenesis | Levine | |
2000 | Peterson, Brock | Modeling of constrained-layer beams | Hansen | |
2000 | Stellmacher, Anneke | Internet Voting | Bergman | |
2001 | Calhoun-Lopez, Marcus | Numerical solutions of hyperbolic conservation laws: Incorporating multi-resolution viscosity methods into the finite element framework | Gunzburger | Peterson |
2001 | Calhoun-Lopez, Marcus | Numerical simulation of superconducting rings using a Ginzburg-Landau model | Gunzburger | |
2001 | Flemisch, Bernd | The Alternating Schwarz Method: Mathematical Foundation and Parallel Implementation | Pigozzi | |
2001 | Rajan, Dileep | | Pigozzi | |
2001 | Wu, Shiquan | Algorithms for optimal recombination problems | Wu, Z. | |
2002 | Gross, Gregory | Truncated polynomials in the NTRU cryptosystem | Bergman | |
2002 | Hammon, Kerstin | Some results in the theory of dynamic storage allocation with policy | Weerasinghe | |
2002 | McClure, Chris | How Damping affects Newton's basins | Hou, S. | |
2002 | Nordstrom, Sandra | The nonnegative P-O-matrix completion problem: classification of patterns for 4 by 4 matrices | Hogben | |
2002 | Rothbauer, Stefan | Enriching representable functors | Bergman | |
2002 | Rubenstein, Kenneth N. | Generator theory of classical Lie algebra of type | D'Alessandro | |
2002 | Volfovicz-Leon, Roberto | Analysis of a Mathematical model in forest sciences | Smith, JDH | |
2003 | Bibi, Tauqir | MTMM: A Matlab Toolbox for Macromolecular Modeling | Wu, Z. | |
2003 | Campbell Lenarz, Jessie | Sphere packing bounds for edit metric codes | Ashlock | |
2003 | Leeds, Daniel | | Hansen | |
2003 | Njue, John Njeru | Nodel point data for inverse Sturm-Liouville problems | Sethuraman | Sacks |
2003 | Rajaram, Rajeev | Moment Method in Distributed Control Theory | Hansen | |
2003 | Sargsyan, Seyran Samveli | Entropy maximization problems | Smith, JDH | |
2003 | Swanstrom, Ryan | Linear cryptanalysis of Baby Rijndael | Bergman | |
2003 | Tucker, Anna | A Mathematical model for the onset of avasculaar tumor growth response to the loss of p53 function | Levine | Nilsen-Hamilton |
2004 | Alm, Jeremy | On sets of first-order formulas axiomatizing representable relation algebras | Maddux | |
2004 | Alturk, Ahmet | Matrix-valued wavelets | Keinert | |
2004 | Crabtree, David | An Equivalence of Categories | Smith, JDH | |
2004 | Dagli, Mehmet | Levi Decomposition of Lie Algebras: Algorithms for its Computation | D'Alessandro | Smith, JDH |
2004 | Drignei, Michaela Christina | Regularization strategies for linear operator equations | Sacks | |
2004 | Meng, Qiang | Optimal Investment Strategies with Transaction Costs | Weerasinghe | |
2004 | Murray, Lori Ann | | Davidson | |
2004 | Oftelie, Jessica | Simulation of Floral Specialization in Bees | Ashlock | |
2004 | Pang, Xiyi | Neural Networks—Noise Tolerant Information Modeling Algorithms for market Information Analysis | Davidson | |
2004 | Powers, Bradley James | The Effects of Tags on Non-local Adaptation | Ashlock | Moloney |
2004 | Ray, Douglas Wayne, Jr. | A greedy algorithm enhancing cage search | Ashlock | |
2004 | Rice, Theodore A. | Greedy Quasigroups & Combinatorial Games | Smith, JDH | |
2004 | Shuster, Christie Marie | Identity Based Encryption Using Multiple Trust Authorities in Ad Hoc Networks | Bergman | Daniels |
2005 | Ahmed, Haseena Sulthana-Ameer | A feedback control strategy using the Lyapunov method for quantum systems | D'Alessandro | |
2005 | Blabac, Eric Michael | Iterating Analytic Complex Maps | | |
2005 | Dewey, Timothy | An Evaluation of the Klimov-Shamir Keystream Generator | Bergman | |
2005 | Kleiman, Elizabeth | The XL and XSL Attacks on Baby Rijndael | Bergman | |
2005 | Mukhopadhyay, Kriti | NMR refinement of under-determined loop regions of the E200K variant of the human prion protein using database-driven distance constraints | Wu, Z. | |
2005 | Rodriguez-Pedraza, Ricardo | Optimal portfolio allocatiaon for long-term growth in the presence of transaction costs | Weerasinghe | |
2005 | Stanley, Christy Ann | Pairs of values and the chi-squared attack | Bergman | |
2006 | Gillen, Tyler | A survey of modern methods of biological modeling | Smiley | |
2006 | Go, Jin-Young | The most recent common ancestor of two descendants from the nth generation in branching processes | Athreya | Liu, H. |
2006 | Liu, Kunlun | Existence of strong solution for a class of nonlinear parabolic systems | Weber | |
2006 | Murphy, Shane | A discussion of the application of fuzzy sets to game theory | Maddux | |
2006 | O'Leary, Alison Jo | The hyperbolic metric and two-point distortion theorems for univalent functions | Johnston, E. | Lieberman |
2006 | Smith, Matthew Christian | A model of the short rate with regime shifts and reflecting barriers | Weerasinghe | |
2006 | Wengerhoff, Daniel | Using the singular value decomposition for image steganography | Davidson | |
2006 | Wimmer, Maximilian B. | A law of large numbers and central limit theorem for the leaves in a random graph model | Sethuraman | |
2006 | YoonAnn, EunMee | Branch and Bound Algorithm for Binary Quadratic Programming with Application in Wireless Network Communications | Wu, Z. | |
2007 | Baldwin, Morgan | Stochastic Analysis of Marotzke and Stone Climate Model | Kliemann | |
2007 | Hansen, Eric | Analysis of the Singular Value Decomposition in Data Hiding | Martin | |
2007 | Regenscheid, Andrew | An Algebraic Hash Function Based on SL2 | Bergman | |
2007 | Ruff, Olga | The Jordan Canonical Forms of orthogonal and skew-symmetric matrices: characterization and examples | Hogben | |
2007 | Scott, Karin | Employing the umbral algebra to prove the Faa di Formula. | Johnston | |
2007 | Zick, Timothy | On the Equipollence of Lxr and Lx | Maddux | |
2008 | Allen, Bryce | Implementing several attacks on plain ElGamal encryption | Bergmann | |
2008 | Ayala, Jose Manuel | Global behavior of graph dynamis with applications to Markov chains | Kliemann | |
2008 | Khemphet, Anchalee | The extreme points of symmetric norms on R2 | Peters | |
2008 | Li, Zhen | Numerical computation of an optimal control problem with homogenization in one-dimensional case | Hou | |
2008 | Park, Jun Koo | Normal mode analysis and Gaussian network model | Wu, Z. | |
2008 | Walters, Laura | Investigation of the use of finite frame theory in cryptography | Martin | |
2009 | Batchelor, John | A study of permutation groups and coherent configurations | Song | |
2009 | DeLoss, Laura Leigh | Results on minimum skew rank of matrices described by a graph | Hogben | |
2009 | Gillespie, John Michael | The Galois Connection between sequences and ideals | Smith | |
2009 | Raasch, Jan Martin | Commutators and associators in Catalan Loops | Smith | |
2009 | Tong, Lin | Pricing mortgages with default and prepayment | Hou | |
2009 | Wrolstad, Jonathan | A differential cryptanalysis of Baby Rijndael | Bergman | |