HETEROZYGOSITY AND DEVELOPMENTAL STABILITY: ANOTHER LOOK
نویسندگان
چکیده
منابع مشابه
Another look at Bank Consolidation and Financial Stability
In this paper we show that a non-monotonic relationship links certain structural characteristics of the banking market to financial stability, including the number of banks in the market, the branching decisions and branch productivity. Using a non-dynamic panel threshold regression we explain how financial stability is affected by baking market power when market power is subject to one or more...
متن کاملVariable selection with error control: another look at stability selection
Stability selection was recently introduced by Meinshausen and Bühlmann as a very general technique designed to improve the performance of a variable selection algorithm. It is based on aggregating the results of applying a selection procedure to subsamples of the data. We introduce a variant, called complementary pairs stability selection, and derive bounds both on the expected number of varia...
متن کاملPentaquark masses: another look
We refine theoretical estimates of the masses of the Θ and other pentaquark states. For the Karliner-Lipkin model, it is noted that for the qqq̄ triquark, proper incorporation of the colour-spin SU(6) symmetry has not been made in the literature. We address this lacuna, make a small generalization in the hyperfine interaction couplings used hitherto, and incorprate flavour symmetry breaking. Aft...
متن کاملAnother look at HMQV
The HMQV protocols are ‘hashed variants’ of the MQV key agreement protocols. They were introduced at CRYPTO 2005 by Krawczyk, who claimed that the HMQV protocols have very significant advantages over their MQV counterparts: (i) security proofs under reasonable assumptions in the (extended) Canetti-Krawczyk model for key exchange; and (ii) superior performance in some situations. In this paper w...
متن کاملAnother Look at Tightness
We examine a natural, but non-tight, reductionist security proof for deterministic message authentication code (MAC) schemes in the multi-user setting. If security parameters for the MAC scheme are selected without accounting for the non-tightness in the reduction, then the MAC scheme is shown to provide a level of security that is less than desirable in the multi-user setting. We find similar ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Evolution
سال: 1979
ISSN: 0014-3820
DOI: 10.1111/j.1558-5646.1979.tb04693.x