منابع مشابه
Secretion: Dense-core vesicles can kiss-and-run too
New measurements show that the entire transmitter contents of a dense-core vesicle can be released within a second through a narrow fusion pore that opens transiently. With other results, this raises the possibility that some dense core vesicles may, like small synaptic vesicles, undergo immediate recycling.
متن کاملKISS: A Simple Prefix Search Scheme in P2P Networks
Prefix search is a fundamental operation in information retrieval, but it is difficult to implement in a peer-to-peer (P2P) network. Existing techniques for prefix search suffer from several problems: increased storage/index costs, unbalanced load, fault tolerance, hot spot, and lack of some ranking mechanism. In this paper, we present KISS (Keytokenbased Index and Search Scheme), a simple and ...
متن کاملA Bit Too Precise? Bounded Verification of Quantized Digital Filters
Digital filters are simple yet ubiquitous components of a wide variety of digital processing and control systems. Errors in the filters can be catastrophic. Traditionally digital filters have been verified using methods from control theory and extensive testing. We study two alternative verification techniques: bitprecise analysis and real-valued error approximations. In this paper, we empirica...
متن کاملManagement of urticaria: not too complicated, not too simple
In spite of being an old disease and apparently easy to diagnose, chronic spontaneous urticaria (CSU) is still perceived as an uncontrollable and difficult to manage disease. The perception of the patient is that his/her condition is not well understood and that is suffering from a disorder with hidden causes that doctors are not able to tackle. Sometimes patients go through a number of clinici...
متن کاملKISS: "Key It Simple and Secure" Corporate Key Management
Deploying a corporate key management system faces fundamental challenges, such as fine-grained key usage control and secure system administration. None of the current commercial systems (either based on software or hardware security modules) or research proposals adequately address both challenges with small and simple Trusted Computing Base (TCB). This paper presents a new key management archi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cryptography and Communications
سال: 2017
ISSN: 1936-2447,1936-2455
DOI: 10.1007/s12095-017-0225-x