Results 1  10
of
351,592
dn d e
"... Polyurea (PU) is the generic term for the block copolymer formed from reaction of diisocyanates with polyamines. Commercialized in 1989, PU can exhibit a wide range of mechanical properties, from soft rubber to hard plastic depending on ..."
Abstract
 Add to MetaCart
Polyurea (PU) is the generic term for the block copolymer formed from reaction of diisocyanates with polyamines. Commercialized in 1989, PU can exhibit a wide range of mechanical properties, from soft rubber to hard plastic depending on
dn d w
"... rm structures in which sulfur is infused into porous TiS2 foams. In galvanostatic electrochemical cycling ..."
Abstract
 Add to MetaCart
rm structures in which sulfur is infused into porous TiS2 foams. In galvanostatic electrochemical cycling
An Optimal Algorithm for Approximate Nearest Neighbor Searching in Fixed Dimensions
 ACMSIAM SYMPOSIUM ON DISCRETE ALGORITHMS
, 1994
"... Consider a set S of n data points in real ddimensional space, R d , where distances are measured using any Minkowski metric. In nearest neighbor searching we preprocess S into a data structure, so that given any query point q 2 R d , the closest point of S to q can be reported quickly. Given any po ..."
Abstract

Cited by 983 (32 self)
 Add to MetaCart
positive real ffl, a data point p is a (1 + ffl)approximate nearest neighbor of q if its distance from q is within a factor of (1 + ffl) of the distance to the true nearest neighbor. We show that it is possible to preprocess a set of n points in R d in O(dn log n) time and O(dn) space, so that given a
Paml 4: Phylogenetic analysis by maximum likelihood
 Mol. Biol. Evol
, 2007
"... PAML, currently in version 4, is a package of programs for phylogenetic analyses of DNA and protein sequences using maximum likelihood (ML). The programs may be used to compare and test phylogenetic trees, but their main strengths lie in the rich repertoire of evolutionary models implemented, which ..."
Abstract

Cited by 1161 (26 self)
 Add to MetaCart
can be used to estimate parameters in models of sequence evolution and to test interesting biological hypotheses. Uses of the programs include estimation of synonymous and nonsynonymous rates (dN and dS) between two proteincoding DNA sequences, inference of positive Darwinian selection through
Identification of programmed cell death in situ via specific labeling of nuclear DNA fragmentation
 J. Cell
, 1992
"... Abstract. Programmed cell death (PCD) plays a key role in developmental biology and in maintenance of the steady state in continuously renewing tissues. Currently, its existence is inferred mainly from gel electrophoresis of a pooled DNA extract as PCD was shown to be associated with DNA fragmentati ..."
Abstract

Cited by 656 (0 self)
 Add to MetaCart
fragmentation. Based on this observation, we describe here the development of a method for the in situ visualization of PCD at the singlecell level, while preserving tissue architecture. Conventional histological sections, pretreated with protease, were nick end labeled with biotinylated poly dU, introduced
KodairaSpencer theory of gravity and exact results for quantum string amplitudes
 Commun. Math. Phys
, 1994
"... We develop techniques to compute higher loop string amplitudes for twisted N = 2 theories with ĉ = 3 (i.e. the critical case). An important ingredient is the discovery of an anomaly at every genus in decoupling of BRST trivial states, captured to all orders by a master anomaly equation. In a particu ..."
Abstract

Cited by 545 (60 self)
 Add to MetaCart
’ of holomorphic curves of higher genus curves in Calabi–Yau manifolds. It is shown that topological amplitudes can also be reinterpreted as computing corrections to superpotential terms appearing in the effective 4d theory resulting from compactification of standard 10d superstrings on the corresponding N = 2
The Google File System
 ACM SIGOPS Operating Systems Review
"... We have designed and implemented the Google File System, a scalable distributed file system for large distributed dataintensive applications. It provides fault tolerance while running on inexpensive commodity hardware, and it delivers high aggregate performance to a large number of clients. While ..."
Abstract

Cited by 1470 (2 self)
 Add to MetaCart
applications, discuss many aspects of our design, and report measurements from both microbenchmarks and real world use. Categories and Subject Descriptors D [4]: 3—Distributed file systems
The irreducibility of the space of curves of given genus
 Publ. Math. IHES
, 1969
"... Fix an algebraically closed field k. Let Mg be the moduli space of curves of genus g over k. The main result of this note is that Mg is irreducible for every k. Of course, whether or not M s is irreducible depends only on the characteristic of k. When the characteristic s o, we can assume that k ~ ..."
Abstract

Cited by 512 (2 self)
 Add to MetaCart
~ (1, and then the result is classical. A simple proof appears in EnriquesChisini [E, vol. 3, chap. 3], based on analyzing the totality of coverings of p1 of degree n, with a fixed number d of ordinary branch points. This method has been extended to char. p by William Fulton [F], using specializations
Domain Theory
 Handbook of Logic in Computer Science
, 1994
"... Least fixpoints as meanings of recursive definitions. ..."
Abstract

Cited by 546 (25 self)
 Add to MetaCart
Least fixpoints as meanings of recursive definitions.
A Digital Signature Scheme Secure Against Adaptive ChosenMessage Attacks
, 1995
"... We present a digital signature scheme based on the computational diculty of integer factorization. The scheme possesses the novel property of being robust against an adaptive chosenmessage attack: an adversary who receives signatures for messages of his choice (where each message may be chosen in a ..."
Abstract

Cited by 985 (43 self)
 Add to MetaCart
We present a digital signature scheme based on the computational diculty of integer factorization. The scheme possesses the novel property of being robust against an adaptive chosenmessage attack: an adversary who receives signatures for messages of his choice (where each message may be chosen in a way that depends on the signatures of previously chosen messages) can not later forge the signature of even a single additional message. This may be somewhat surprising, since the properties of having forgery being equivalent to factoring and being invulnerable to an adaptive chosenmessage attack were considered in the folklore to be contradictory. More generally, we show how to construct a signature scheme with such properties based on the existence of a "clawfree" pair of permutations  a potentially weaker assumption than the intractibility of integer factorization. The new scheme is potentially practical: signing and verifying signatures are reasonably fast, and signatures are compact.
Results 1  10
of
351,592