نتایج جستجو برای: adelman lipton model

تعداد نتایج: 2104804  

2003
Jun Xu Qi Zhao

Packet scheduling is an important mechanism for providing QoS guarantees in data networks. A scheduling algorithm in general consists of two functions: one estimates how the GPS (General Processor Sharing) clock progresses with respect to the real time, and the other decides the order of serving the packets based on the estimation of their GPS start/finish times. In this work, we answer importa...

2004
Amin Saberi Yan Z. Ding Dana Randall Richard Duke Vangelis Markakis Christos Gkantsidis Nikhil Devanur Aranyak Mehta Parikshit Gopalan

ACKNOWLEDGEMENTS First, I would like to thank my advisors, Milena Mihail and Vijay Vazirani, for all I have learned from them and for sharing their insights with me which was invaluable during these four years. I also thank Dana Randall, Dick Lipton and other faculty of the ACO and College of Computing. I have also been very lucky to have wonderful colleagues and As a final note, I would like t...

2005
Masao Sako

Masao Sako (KIPAC/Stanford), Roger Romani (Stanford), Josh Frieman (Fermilab/U. Chicago), Jen Adelman-McCarthy (Fermilab), Andrew Becker (U. Washington), Fritz DeJongh (Fermilab), Ben Dilday (U. Chicago), Juan Estrada (Fermilab), John Hendry (Fermilab), Jon Holtzman (NMSU), Jared Kaplan (Stanford), Rick Kessler (U. Chicago), Hubert Lampeitl (Fermilab), John Marriner (Fermilab), Gajus Miknaitis ...

2013
Junqiu Yang Huanghe Yang Xiaohui Sun Kelli Delaloye Xiao Yang Alyssa Moller Jingyi Shi Jianmin Cui

The large conductance, voltageand Ca-activated K (BK) channel plays important roles in many physiological processes, such as muscle contraction, neural transmission, and circadian pacemaker output (Brayden and Nelson, 1992; Robitaille et al., 1993; Meredith et al., 2006). A functional BK channel is composed of four Slo1 subunits, each of which comprises multiple structural modules (Fig. 1, A an...

2005
Boaz Barak

Digital signatures complete this picture by giving a public key analog of message authentication codes. Digital signatures were suggested by Diffie and Hellman in their seminal paper, but unlike the case of public key encryption schemes (where they had a key exchange protocol that could be made into a probabilistic encryption scheme) they did not have a reasonable candidate for such signatures ...

2010
Boaz Barak

Definition of digital signatures. Recall that we had the following picture: Private Key Public Key Secrecy Private Key Encryption Public key Encryption Integrity Message Authentication Codes (MAC) ?? Digital signatures complete this picture by giving a public key analog of message authentication codes. Digital signatures were suggested by Diffie and Hellman in their seminal paper, but unlike th...

2010
Christopher Shelley Xiaowei Niu Yanyan Geng Karl L. Magleby

Large conductance Ca-activated K (BK) channels are activated by membrane depolarization and intracellular Ca and Mg (Latorre and Brauchi, 2006; Lu et al., 2006; Salkoff et al., 2006; Cui et al., 2009; for review see Magleby, 2003). Once activated, the K efflux through the opened channel drives the membrane potential in the negative direction. Through this mechanism, BK channels sense both depol...

1999
linda taylor

Systemic reform in education is changing how schools address mental health and psychosocial concerns and is redefining the role of pupil service personnel in the process. This paper (a) highlights how schools currently address mental health, (b) discusses new directions that build on emerging reform themes and reframe prevailing reform models, and (c) outlines ways pupil-service professionals c...

Journal: :Discrete Mathematics & Theoretical Computer Science 2011
Thomas P. Hayes

For every positive integer k, we construct an explicit family of functions f : {0, 1}n → {0, 1} which has (k+ 1)-party communication complexity O(k) under every partition of the input bits into k + 1 parts of equal size, and k-party communication complexity Ω ( n k42k ) under every partition of the input bits into k parts. This improves an earlier hierarchy theorem due to V. Grolmusz. Our const...

2011
Eli Biham Adi Shamir

In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to nd cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES). In this paper...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید