نتایج جستجو برای: anastomostic leakage
تعداد نتایج: 30781 فیلتر نتایج به سال:
Conventional leakage reduction techniques focus primarily on sub-threshold leakage mitigation, while neglecting the effect of gate leakage current. This work focuses on understanding gate leakage current and developing circuit techniques for total leakage minimization. We present an efficient technique for gate leakage of CMOS circuits. Input vector control and circuit reconfiguration technique...
ost people consider unaccounted-for water and leakage to be the same thing. They are not. Leakage is a part, and sometimes a large part, of unaccounted-for water, but it is just one piece of the puzzle. Unaccounted-for water is the difference between the amount of water produced, or purchased, and the amount of water sold to all customers. Unaccounted-for water includes underground leakage; una...
Modeling and Evaluating Information Leakage Caused by Inferences in Supply Chains
We analyze a model of bargaining over new ideas. The model accounts for the problem of information leakage, i.e., the diffusion of information about the idea before and after the idea is implemented. We analyze the effects of information leakage on the distribution of rents within firms and the firms’ stability to the introduction of innovation. In the model, the distribution of rents in a firm...
A “home” sharing environment consists of the data sharing relationships between family members, friends, and acquaintances. We argue that this environment, far from being simple, has sharing and trust relationships as complex as any general-purpose network. Such environments need strong access control and privacy guarantees. We show that avoiding information leakage requires both to be integrat...
This article develops a model of the upstairs market where order size, beliefs, and prices are determined endogenously. We test the model’s predictions using unique data for 5,625 equity trades during the period 1985 to 1992 that are known to be upstairs transactions and are identified as either buyer or seller initiated. We find that price movements prior to the trade date are significantly po...
Signature can be used to verify the integrity of both a message and identity signer, whereas encryption ensure confidentiality message. In past, cryptography researchers have studied proposed numerous certificateless signcryption (CLSC) schemes combine benefits signature encryption. However, these may not robust enough withstand side-channel attacks. Through such attacks, an attacker constantly...
PURPOSE We use semiautomated segmentation of fluorescein angiography (FA) to determine whether anti-vascular endothelial growth factor (VEGF) treatment for diabetic macular edema (DME) differentially affects microaneurysm (MA)-associated leakage, termed focal leakage, versus non-MA-associated leakage, termed diffuse leakage. METHODS We performed a retrospective study of 29 subjects treated wi...
CMOS switches are one of the main components of today's analog circuits. Among the many types of non-idealities that can affect the performance of the switch, its leakage current is of utmost importance. In order to reduce the leakage current or equally increase the OFF resistance of any switch, a novel technique is presented in this paper. The proposed technique employs the body effect to incr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید