نتایج جستجو برای: adelman lipton model
تعداد نتایج: 2104804 فیلتر نتایج به سال:
Packet scheduling is an important mechanism for providing QoS guarantees in data networks. A scheduling algorithm in general consists of two functions: one estimates how the GPS (General Processor Sharing) clock progresses with respect to the real time, and the other decides the order of serving the packets based on the estimation of their GPS start/finish times. In this work, we answer importa...
ACKNOWLEDGEMENTS First, I would like to thank my advisors, Milena Mihail and Vijay Vazirani, for all I have learned from them and for sharing their insights with me which was invaluable during these four years. I also thank Dana Randall, Dick Lipton and other faculty of the ACO and College of Computing. I have also been very lucky to have wonderful colleagues and As a final note, I would like t...
Masao Sako (KIPAC/Stanford), Roger Romani (Stanford), Josh Frieman (Fermilab/U. Chicago), Jen Adelman-McCarthy (Fermilab), Andrew Becker (U. Washington), Fritz DeJongh (Fermilab), Ben Dilday (U. Chicago), Juan Estrada (Fermilab), John Hendry (Fermilab), Jon Holtzman (NMSU), Jared Kaplan (Stanford), Rick Kessler (U. Chicago), Hubert Lampeitl (Fermilab), John Marriner (Fermilab), Gajus Miknaitis ...
The large conductance, voltageand Ca-activated K (BK) channel plays important roles in many physiological processes, such as muscle contraction, neural transmission, and circadian pacemaker output (Brayden and Nelson, 1992; Robitaille et al., 1993; Meredith et al., 2006). A functional BK channel is composed of four Slo1 subunits, each of which comprises multiple structural modules (Fig. 1, A an...
Digital signatures complete this picture by giving a public key analog of message authentication codes. Digital signatures were suggested by Diffie and Hellman in their seminal paper, but unlike the case of public key encryption schemes (where they had a key exchange protocol that could be made into a probabilistic encryption scheme) they did not have a reasonable candidate for such signatures ...
Definition of digital signatures. Recall that we had the following picture: Private Key Public Key Secrecy Private Key Encryption Public key Encryption Integrity Message Authentication Codes (MAC) ?? Digital signatures complete this picture by giving a public key analog of message authentication codes. Digital signatures were suggested by Diffie and Hellman in their seminal paper, but unlike th...
Large conductance Ca-activated K (BK) channels are activated by membrane depolarization and intracellular Ca and Mg (Latorre and Brauchi, 2006; Lu et al., 2006; Salkoff et al., 2006; Cui et al., 2009; for review see Magleby, 2003). Once activated, the K efflux through the opened channel drives the membrane potential in the negative direction. Through this mechanism, BK channels sense both depol...
Systemic reform in education is changing how schools address mental health and psychosocial concerns and is redefining the role of pupil service personnel in the process. This paper (a) highlights how schools currently address mental health, (b) discusses new directions that build on emerging reform themes and reframe prevailing reform models, and (c) outlines ways pupil-service professionals c...
For every positive integer k, we construct an explicit family of functions f : {0, 1}n → {0, 1} which has (k+ 1)-party communication complexity O(k) under every partition of the input bits into k + 1 parts of equal size, and k-party communication complexity Ω ( n k42k ) under every partition of the input bits into k parts. This improves an earlier hierarchy theorem due to V. Grolmusz. Our const...
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to nd cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES). In this paper...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید