Results 1  10
of
6,861
ARTICLES Formation of asymmetric onesided
, 2005
"... metaltipped semiconductor nanocrystal dots and rods ..."
Dynamic programming algorithm optimization for spoken word recognition
 IEEE TRANSACTIONS ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING
, 1978
"... This paper reports on an optimum dynamic programming (DP) based timenormalization algorithm for spoken word recognition. First, a general principle of timenormalization is given using timewarping function. Then, two timenormalized distance definitions, ded symmetric and asymmetric forms, are der ..."
Abstract

Cited by 788 (3 self)
 Add to MetaCart
the relative superiority of either a symmetric form of DPmatching or an asymmetric one. In the asymmetric form, timenormalization is achieved by transforming the time axis of a speech pattern onto that of the other. In the symmetric form, on the other hand, both time axes are transformed onto a temporarily
A randomized protocol for signing contracts
, 1990
"... Two parties, A and B, want to sign a contract C over a communication network. To do so, they must “simultaneously” exchange their commitments to C. Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate simultaneity by exchanging partial commitments in pie ..."
Abstract

Cited by 599 (11 self)
 Add to MetaCart
in piece by piece manner. During such a protocol, one party or another may have a slight advantage; a “fair” protocol keeps this advantage within acceptable limits. We present a new protocol that is fair in the sense that, at any stage in its execution, the conditional probability that one party cannot
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
, 2003
"... An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance vec ..."
Abstract

Cited by 534 (8 self)
 Add to MetaCart
. In order to support use with nodes of limited CPU processing capability, and to guard against DenialofService attacks in which an attacker attempts to cause other nodes to consume excess network bandwidth or processing time, we use efficient oneway hash functions and do not use asymmetric cryptographic
The embryonic cell lineage of the nematode Caenorhabditis elegans
 Dev. Biol
, 1983
"... The number of nongonadal nuclei in the freeliving soil nematode Caenorhabditis elegans increases from about 550 in the newly hatched larva to about 810 in the mature hermaphrodite and to about 970 in the mature male. The pattern of cell divisions which leads to this increase is essentially invarian ..."
Abstract

Cited by 540 (19 self)
 Add to MetaCart
invariant among individuals; rigidly determined cell lineages generate a fixed number of progeny cells of strictly specified fates. These lineages range in length from one to eight sequential divisions and lead to significant developmental changes in the neuronal, muscular, hypodermal, and digestive systems
Optimal asymmetric onesided group sequential tests
 Biometrika
, 2002
"... We extend the optimal symmetric group sequential tests of Eales & Jennison (1992) to the broader class of asymmetric designs. Two forms of asymmetry are considered; unequal type I and type II error rates and different emphases on expected sample sizes at the null and alternative hypotheses. We d ..."
Abstract

Cited by 15 (10 self)
 Add to MetaCart
the easily implemented tests of Pampallona & Tsiatis are a little less efficient but still not far from optimal. Our results demonstrate that asymmetric designs can decrease the expected sample size under one hypothesis, but only at the expense of a significantly larger expected sample size under
Incentivecompatible debt contracts: The oneperiod problem
 Review of Economic Studies
, 1985
"... In a simple model of borrowing and lending with asymmetric information we show that the optimal, incentivecompatible debt contract is the standard debt contract. The secondbest level of investment never exceeds the firstbest and is strictly less when there is a positive probability of costly bank ..."
Abstract

Cited by 419 (9 self)
 Add to MetaCart
In a simple model of borrowing and lending with asymmetric information we show that the optimal, incentivecompatible debt contract is the standard debt contract. The secondbest level of investment never exceeds the firstbest and is strictly less when there is a positive probability of costly
The Asymmetric OneDimensional Constrained Ising Model: Rigorous Results
, 2008
"... We study a onedimensional spin (interacting particle) system, with product Bernoulli(p) stationary distribution, in which a site can flip only when its left neighbor is in state +1. Such models have been studied in physics as simple exemplars of systems exhibiting slow relaxation. In our “East” mod ..."
Abstract

Cited by 26 (1 self)
 Add to MetaCart
We study a onedimensional spin (interacting particle) system, with product Bernoulli(p) stationary distribution, in which a site can flip only when its left neighbor is in state +1. Such models have been studied in physics as simple exemplars of systems exhibiting slow relaxation. In our “East
Shape fluctuations and random matrices
, 1999
"... We study a certain random growth model in two dimensions closely related to the onedimensional totally asymmetric exclusion process. The results show that the shape fluctuations, appropriately scaled, converges in distribution to the TracyWidom largest eigenvalue distribution for the Gaussian Uni ..."
Abstract

Cited by 398 (11 self)
 Add to MetaCart
We study a certain random growth model in two dimensions closely related to the onedimensional totally asymmetric exclusion process. The results show that the shape fluctuations, appropriately scaled, converges in distribution to the TracyWidom largest eigenvalue distribution for the Gaussian
Asymmetry in the assembly of the RNAi enzyme complex. Cell 115
, 2003
"... A key step in RNA interference (RNAi) is assembly of the RISC, the proteinsiRNA complex that mediates target RNA cleavage. Here, we show that the two strands of an siRNA duplex are not equally eligible for assembly into RISC. Rather, both the absolute and relative stabilities of the base pairs at t ..."
Abstract

Cited by 405 (6 self)
 Add to MetaCart
at the 5 � ends of the two siRNA strands determine the degree to which each strand participates in the RNAi pathway. siRNA duplexes can be functionally asymmetric, with only one of the two strands able to trigger RNAi. Asymmetry is the hallmark of a related class of small, singlestranded, noncoding RNAs
Results 1  10
of
6,861