Vulnerability metrics play a key role in the understanding of cascading failures and target/random attacks to a network. The graph fragmentation problem (GFP) is the result of a worst-case analysis of a random attack. We can choose a fixed number of indivi ...
We consider the problem of estimating the value of MAX-CUT in a graph in the streaming model of computation. At one extreme, there is a trivial 2-approximation for this problem that uses only O(log n) space, namely, count the number of edges and output hal ...
Bacteria are the most diverse and abundant kingdom of life and have adapted to survive and thrive in habitats around the globe. When provided with ample nutrients they grow and divide at staggering rates, increasing their population exponentially. Upon nut ...
Interlocking assemblies have a long history in the design of puzzles, furniture, architecture, and other complex geometric structures. The key defining property of interlocking assemblies is that all component parts are immobilized by their geometric arran ...
Interlocking assemblies have a long history in the design of puzzles, furniture, architecture, and other complex geometric structures. The key defining property of interlocking assemblies is that all component parts are immobilized by their geometric arran ...
We investigate the Rayleigh-Taylor instability of a thin viscous film coating the inside of a spherical substrate. The aim of this work is to find and characterize the instability pattern in this spherical geometry. In contrast to the Rayleigh-Taylor insta ...
In the first part of this thesis, we present and compare several approaches for the determination of the steady-state of large-scale Markov chains with an underlying low-rank tensor structure. Such structure is, in our context of interest, associated with ...