• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,017
Next 10 →

Vascular permeability factor (vascular endothelial growth factor gene is expressed differentially in normal tissues, macrophages and tumors

by F. Brown, Kiangteck Yeo, Brygida Berse, Tet-kin Yeo, Donald R Senger, Harold F. Dvorak, Livingston Van De - MA BiA Cell. 3:211 , 1992
"... Persistent microvascular hyperpermeability to plasma proteins even after the cessation of injury is a characteristic but poorly understood feature of normal wound healing. It results in extravasation of fibrinogen that clots to form fibrin, which serves as a provisional matrix and promotes angiogene ..."
Abstract - Cited by 367 (9 self) - Add to MetaCart
angiogenesis and scar formation. We present evidence indicating that vascular permeability factor (VPF; also known as vascular endothelial growth factor) may be responsible for the hyperpermeable state, as well as the angiogenesis, that are characteristic of healing wounds. Hyperpermeable blood vessels were

Democracy, technocracy, and the secret state of medicines control: expert and nonexpert perspectives

by John Abraham - Science, Technology, & Human Values , 1997
"... This article explores the social frameworks guiding expert and nonexpert perspectives on medicines safety in the U.K. Scientific experts from the Committee on the Safety of Medicines and the Medicines Commission were interviewed, and three nonexpertgroups, including patients and health professionals ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
that there is substantial divergence between expert and nonexpert perspectives on medicines regulation, and that this derives as much from value differences as from any informational deficits. However, there seems to be some scope for shared values between some experts and some nonexperts, especially as regards state

2005 ), ‘ Secret State, Transparent Subject: The Australian Security Intelligence Organisation

by Jude Mcculloch, Joo-cheong Tham - in the Age of Terror ’ , Australian and New Zealand Journal of Criminology , 38 : 400 – 15
"... This article describes the secrecy provisions embodied in the AustralianSecurity Intelligence Organisation Legislation Amendment Act 2003 (Cwlth). The article explains how these provisions curb freedom of speech and remove ASIO’s activities from the domain of public scrutiny. It argues that by effec ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
that the increase in state secrecy and its impact are part of a continuing shift in the relative distrib-ution of power between state and subject in liberal democracies; a shift that signals a move to more repressive or authoritarian forms of rule. The ‘war on terror ’ and its pursuit abroad and in the ‘homeland

Weaknesses in the Key Scheduling Algorithm of RC4

by Scott Fluhrer, Itsik Mantin, Adi Shamir - PROCEEDINGS OF THE 4TH ANNUAL WORKSHOP ON SELECTED AREAS OF CRYPTOGRAPHY , 2001
"... In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance. We identify a large number of weak keys, in which knowledge of a small number of key bits suffices to determine many state and output bits with non-negligible probabilit ..."
Abstract - Cited by 270 (1 self) - Add to MetaCart
In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance. We identify a large number of weak keys, in which knowledge of a small number of key bits suffices to determine many state and output bits with non

Adipose tissue, inflammation, and cardiovascular disease. Circ Res

by Anders H. Berg, Circ Res, Anders H. Berg
"... Abstract—Mounting evidence highlights the role of adipose tissue in the development of a systemic inflammatory state that contributes to obesity-associated vasculopathy and cardiovascular risk. Circulating mediators of inflammation participate in the mechanisms of vascular insult and atheromatous ch ..."
Abstract - Cited by 215 (0 self) - Add to MetaCart
Abstract—Mounting evidence highlights the role of adipose tissue in the development of a systemic inflammatory state that contributes to obesity-associated vasculopathy and cardiovascular risk. Circulating mediators of inflammation participate in the mechanisms of vascular insult and atheromatous

Secure communication over fading channels

by Yingbin Liang, H. Vincent Poor, Shlomo Shamai (Shitz) , 2007
"... The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from rec ..."
Abstract - Cited by 186 (21 self) - Add to MetaCart
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from

Dimensions and Principles of Declassification

by Andrei Sabelfeld , David Sands , 2005
"... Computing systems often deliberately release (or declassify) sensitive information. A principal security concern for systems permitting information release is whether this release is safe: is it possible that the attacker compromises the information release mechanism and extracts more secret informa ..."
Abstract - Cited by 142 (16 self) - Add to MetaCart
Computing systems often deliberately release (or declassify) sensitive information. A principal security concern for systems permitting information release is whether this release is safe: is it possible that the attacker compromises the information release mechanism and extracts more secret

Leakage-resilient cryptography

by Stefan Dziembowski, La Sapienza, Krzysztof Pietrzak - In Proceedings of the 49th IEEE Symposium on Foundation of Computer Science , 2008
"... We construct a stream-cipher S whose implementation is secure even if a bounded amount of arbitrary (adversarially chosen) information on the internal state of S is leaked dur-ing computation. This captures all possible side-channel attacks on S where the amount of information leaked in a given peri ..."
Abstract - Cited by 143 (9 self) - Add to MetaCart
given K1,...,Kℓ−1, f1(τ1),..., fℓ−1(τℓ−1) and also the complete internal state of S after Kℓ has been computed (i.e. S is forward-secure). The construction is based on alternating extraction (used in the intrusion-resilient secret-sharing scheme from FOCS’07). We move this concept to the computational

UPPAAL Implementation Secrets

by Gerd Behrmann, Johan Bengtsson, Alexandre David, Kim G. Larsen, Paul Pettersson, Wang Yi , 2002
"... In this paper we present the continuous and on-going development of datastructures and algorithms underlying the veri cation engine of the tool Uppaal. In particular, we review the datastructures of Dierence Bounded Matrices, Minimal Constraint Representation and Clock Dierence Diagrams used in ..."
Abstract - Cited by 44 (14 self) - Add to MetaCart
in symbolic state-space representation and-analysis for real-time systems.

Quantum secret sharing,

by Mark Hillery , Vladimír Bužek , André Berthiaume - Physical Review A, , 1999
"... Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. We show how this procedure can be implemented using GreenbergerHorne-Zeilinger ͑GHZ͒ states. In the quantum case the presence of an eavesdrop ..."
Abstract - Cited by 35 (0 self) - Add to MetaCart
Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. We show how this procedure can be implemented using GreenbergerHorne-Zeilinger ͑GHZ͒ states. In the quantum case the presence
Next 10 →
Results 1 - 10 of 3,017
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University