Results 1 - 10
of
12,624
Nanotubes, Controlled manner Correspondence to Author:
"... 5-ASA- 5-Aminosalicylic acid, Mc- Molar mass of the core, Mm- Molar mass of the branched monomer, Mt-Molar mass of the terminal groups, nc- Core multiplicity, nm- Branch-juncture multiplicity, G- Generation number, CMC- Critical micelle concentration, PEO- Poly (ethylene oxide) DNA- Di-ribo nucleic ..."
Abstract
- Add to MetaCart
5-ASA- 5-Aminosalicylic acid, Mc- Molar mass of the core, Mm- Molar mass of the branched monomer, Mt-Molar mass of the terminal groups, nc- Core multiplicity, nm- Branch-juncture multiplicity, G- Generation number, CMC- Critical micelle concentration, PEO- Poly (ethylene oxide) DNA- Di-ribo nucleic acid MWNTs- Multi-walled nanotubes, SWNTs- Single-walled nanotubes, EAD- Electric arc discharge, CVD- Chemical vapor deposition, LA- Laser ablation, CNTs- Carbon nanotubes, MD- Molecular dynamics, MEMS- Microelectro mechanical systems,
Universally composable security: A new paradigm for cryptographic protocols
, 2013
"... We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved ..."
Abstract
-
Cited by 833 (37 self)
- Add to MetaCart
, protocols are guaranteed to maintain their security in any context, even in the presence of an unbounded number of arbitrary protocol instances that run concurrently in an adversarially controlled manner. This is a useful guarantee, that allows arguing about the security of cryptographic protocols
A generalized processor sharing approach to flow control in integrated services networks: The single-node case
- IEEE/ACM TRANSACTIONS ON NETWORKING
, 1993
"... The problem of allocating network resources to the users of an integrated services network is investigated in the context of rate-based flow control. The network is assumed to be a virtual circuit, connection-based packet network. We show that the use of Generalized processor Sharing (GPS), when co ..."
Abstract
-
Cited by 2010 (5 self)
- Add to MetaCart
The problem of allocating network resources to the users of an integrated services network is investigated in the context of rate-based flow control. The network is assumed to be a virtual circuit, connection-based packet network. We show that the use of Generalized processor Sharing (GPS), when
On Augmenting Reactivity With Deliberation in a Controlled Manner
- In proceedings of the workshop on Balancing Reactivity and Social Deliberation in Multi-Agent Systems, Fourteenth European Conference on Artificial Intelligence
, 2000
"... . We argue that a reactive agent obeying the requirement of predictability imposed by a hard-real-time application domain cannot be equipped with an arbitrarily powerful deliberation capability as this would jeopardize the predictability of the agent's behaviour. Therefore such augmentation ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
such augmentation should be performed in a principled, controlled manner. We illustrate our line of thought with the example of Generic Layered Architecture used for creating reactive agents acting in dynamic environments requiring real-time responsiveness. 1 Introduction The interplay between reactivity
The program dependence graph and its use in optimization
- ACM Transactions on Programming Languages and Systems
, 1987
"... In this paper we present an intermediate program representation, called the program dependence graph (PDG), that makes explicit both the data and control dependence5 for each operation in a program. Data dependences have been used to represent only the relevant data flow relationships of a program. ..."
Abstract
-
Cited by 996 (3 self)
- Add to MetaCart
computationally related parts of the program, a single walk of these dependences is sufficient to perform many optimizations. The PDG allows transformations such as vectorization, that previ-ously required special treatment of control dependence, to be performed in a manner that is uniform for both control
Illusion and well-being: A social psychological perspective on mental health.
- Psychological Bulletin,
, 1988
"... Many prominent theorists have argued that accurate perceptions of the self, the world, and the future are essential for mental health. Yet considerable research evidence suggests that overly positive selfevaluations, exaggerated perceptions of control or mastery, and unrealistic optimism are charac ..."
Abstract
-
Cited by 988 (20 self)
- Add to MetaCart
Many prominent theorists have argued that accurate perceptions of the self, the world, and the future are essential for mental health. Yet considerable research evidence suggests that overly positive selfevaluations, exaggerated perceptions of control or mastery, and unrealistic optimism
Simplifying Discovered Process Models in a Controlled Manner
"... Process models discovered from a process log using process mining tend to be complex and have problems balancing between overfitting and underfitting. An overfitting model allows for too little behavior as it just permits the traces in the log and no other trace. An underfitting model allows for too ..."
Abstract
- Add to MetaCart
for too much behavior as it permits traces that are significantly different from the behavior seen in the log. This paper presents a post-processing approach to simplify discovered process models while controlling the balance between overfitting and underfitting. The discovered process model, expressed
Fundamental Design Issues for the Future Internet
- IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
, 1995
"... The Internet has been a startling and dramatic success. However, multimedia applications, with their novel traffic characteristics and service requirements, pose an interesting challenge to the technical foundations of the Internet. In this paper we address some of the fundamental architectural d ..."
Abstract
-
Cited by 471 (3 self)
- Add to MetaCart
design issues facing the future Internet. In particular, we discuss whether the Internet should adopt a new service model, how this service model should be invoked, and whether this service model should include admission control. These architectural issues are discussed in a nonrigorous manner
ADEPT flex - Supporting Dynamic Changes of Workflows Without Loosing Control
- Journal of Intelligent Information Systems
, 1998
"... . Today's workflow management systems (WFMSs) are only applicable in a secure and safe manner if the business process (BP) to be supported is well-structured and there is no need for ad hoc deviations at runtime. As only few BPs are static in this sense, this significantly limits the applicabil ..."
Abstract
-
Cited by 425 (112 self)
- Add to MetaCart
. Today's workflow management systems (WFMSs) are only applicable in a secure and safe manner if the business process (BP) to be supported is well-structured and there is no need for ad hoc deviations at runtime. As only few BPs are static in this sense, this significantly limits
Heart and mind in conflict: Interplay of affect and cognition in consumer decision making
- Journal of Consumer Research
, 1999
"... This article examines how consumer decision making is influenced by automat-ically evoked task-induced affect and by cognitions that are generated in a more controlled manner on exposure to alternatives in a choice task. Across two experiments respondents chose between two alternatives: one (chocola ..."
Abstract
-
Cited by 351 (4 self)
- Add to MetaCart
This article examines how consumer decision making is influenced by automat-ically evoked task-induced affect and by cognitions that are generated in a more controlled manner on exposure to alternatives in a choice task. Across two experiments respondents chose between two alternatives: one
Results 1 - 10
of
12,624