skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Smith, Geoffrey"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available April 1, 2026
  2. Free, publicly-accessible full text available March 1, 2026
  3. ABSTRACT There is great interspecific variation in the nutritional composition of natural diets, and the varied nutritional content is physiologically tolerated because of evolutionarily based balances between diet composition and processing ability. However, as a result of landscape change and human exposure, unnatural diets are becoming widespread among wildlife without the necessary time for evolutionary matching between the diet and its processing. We tested how a controlled, unnatural high glucose diet affects glucose tolerance using captive green iguanas, and we performed similar glucose tolerance tests on wild Northern Bahamian rock iguanas that are either frequently fed grapes by tourists or experience no such supplementation. We evaluated both short and longer-term blood glucose responses and corticosterone (CORT) concentrations as changes have been associated with altered diets. Experimental glucose supplementation in the laboratory and tourist feeding in the wild both significantly affected glucose metabolism. When iguanas received a glucose-rich diet, we found greater acute increases in blood glucose following a glucose challenge. Relative to unfed iguanas, tourist-fed iguanas had significantly lower baseline CORT, higher baseline blood glucose, and slower returns to baseline glucose levels following a glucose challenge. Therefore, unnatural consumption of high amounts of glucose alters glucose metabolism in laboratory iguanas with short-term glucose treatment and free-living iguanas exposed to long-term feeding by tourists. Based on these results and the increasing prevalence of anthropogenically altered wildlife diets, the consequences of dietary changes on glucose metabolism should be further investigated across species, as such changes in glucose metabolism have health consequences in humans (e.g. diabetes). 
    more » « less
  4. Abstract In this paper, we investigate an arithmetic analogue of the gonality of a smooth projective curve $$C$$ over a number field $$k$$: the minimal $$e$$ such that there are infinitely many points $$P \in C(\bar{k})$$ with $$[k(P):k] \leqslant e$$. Developing techniques that make use of an auxiliary smooth surface containing the curve, we show that this invariant can take any value subject to constraints imposed by the gonality. Building on work of Debarre–Klassen, we show that this invariant is equal to the gonality for all sufficiently ample curves on a surface $$S$$ with trivial irregularity. 
    more » « less
  5. In order to protect user data while maintaining application functionality, encrypted databases can use specialized cryptography such as property-revealing encryption, which allows a property of the underlying plaintext values to be computed from the ciphertext. One example is deterministic encryption which ensures that the same plaintext encrypted under the same key will produce the same ciphertext. This technology enables clients to make queries on sensitive data hosted in a cloud server and has considerable potential to protect data. However, the security implications of deterministic encryption are not well understood. We provide a leakage analysis of deterministic encryption through the application of the framework of quantitative information flow. A key insight from this framework is that there is no single "right" measure by which leakage can be quantified: information flow depends on the operational scenario and different operational scenarios require different leakage measures. We evaluate leakage under three operational scenarios, modeled using three different gain functions, under a variety of prior distributions in order to bring clarity to this problem. 
    more » « less