نتایج جستجو برای: mending

تعداد نتایج: 302  

Journal: :ACS applied materials & interfaces 2009
Xiaofan Luo Runqing Ou Daniel E Eberly Amit Singhal Wantinee Viratyaporn Patrick T Mather

In this paper, we report on the development of a new and broadly applicable strategy to produce thermally mendable polymeric materials, demonstrated with an epoxy/poly(-caprolactone) (PCL) phase-separated blend. The initially miscible blend composed of 15.5 wt % PCL undergoes polymerization-induced phase separation during cross-linking of the epoxy, yielding a "bricks and mortar" morphology whe...

Journal: :Heart Lung and Circulation 2023

Applying heart failure (HF) guidelines in a rural hospital clinic setting can result significant improvements patient outcomes. We describe the early days of HF service. Northland has one highest cardiovascular disease and death rates country; addition, access to primary care is suboptimal for variety reasons. In late 2019, cardiologist with an interest took over responsibility cardiology clini...

2013

233 Last year saw the posthumous publication of Stephen Jay Gould’s last volume, The Hedgehog, the Fox and the Magister’s Pox (Gould, 2003) with the subtitle ‘Mending and minding the misconceived gap between science and the humanities’. The two protagonists were chosen to represent metaphorically a stereotypical disparity between two different ways of ‘knowing’ or looking at nature. The hedgeho...

2002
WUU YANG

Security is an ever important issue in computer networks. Current network security, which is mostly based on (symmetric and asymmetric) key encryption, depends on the soundness of the security protocols as well as the strengths of the encryption algorithms. We propose a logic framework to verify or test the soundness of the security protocols. The logic framework can identify the hidden weaknes...

2003
Lan Nguyen Reihaneh Safavi-Naini

In this paper we show two attacks against universally resilient mix-nets. The first attack can be used against a number of mixnets, including Furukawa-Sako01 [6], Millimix [11], Abe98 [1], MiP-1, MiP-2 [2, 3] and Neff01 [19]. We give the details of the attack in the case of Furukawa-Sako01 mix-net. The second attack breaks the correctness of Millimix [11]. We show how to counter these attacks, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید