157,953 Works
Beyond the beak: wing shape variation in Darwins finches
Vanhooydonck, B; Herrel, A; Gabela, A; Podos, JThe Minerals Involved in Lobster Shell Vulnerability
Kunkel, JG; Jercinovic, MJ; Nagel, WTrade-offs between force and accuracy in human performance
Irschick, DJ; Henningsen, JTail autotomy and escape performance in a stream side salamander
Henningsen, J; Herman, R; Irschick, DThe kinetics and kinematics of human performance: Trade-offs between force and accuracy
Almeida, S; Irschick, DStress distribution and morphological specializations in the feeding apparatus of a seahorse (Syngnathidae: Hippocampus reidi)
Leysen, H; Dumont, ER; Adriaens, DNon-Flight Use of Wings by Bats
Kunz, TH; Munoz-Romo, M; Dumont, ER; Riskin, DK; Swartz, SMA comparative analysis of olfactory communication in bats
Eiting, TP; Dumont, ERComparing the performance of finite element models of biological structures
Dumont, ER; Grosse IR; Slater, GJHypocoercivity for kinetic equations with linear relaxation terms
Jean Dolbeault, Clement Gabriel Mouhot & Christian Schmeiser
This note is devoted to a simple method for proving hypocoercivity of the solutions of a kinetic equation involving a linear time relaxation operator, i.e. the construction of an adapted Lyapunov functional satisfying a Gronwall-type inequality. The method clearly distinguishes the coercivity at microscopic level, which directly arises from the properties of the relaxation operator, and a spectral gap inequality at the macroscopic level for the spatial density, which is connected to the diffusion limit....
MIPAS reduced spectral resolution UTLS-1 mode measurements of temperature, O₃, HNO₃, N₂O, H₂O and relative humidity over ice: retrievals and comparison to MLS
S. Chauhan, M. Höpfner, G.P. Stiller, T.Von Clarmann, B. Funke, N. Glatthor, U. Grabowski, A. Linden, S. Kellmann, M. Milz, T. Steck, H. Fischer, L. Froidevaux, A. Lambert, M.L. Santee, M. Schwartz, W.G. Read & N.J. Livesey
During several periods since 2005 the Michelson Interferometer for Passive Atmospheric Sounding (MIPAS) on Envisat has performed observations dedicated to the region of the upper troposphere/lower stratosphere (UTLS). For the duration of November/December 2005 global distributions of temperature and several trace gases from MIPAS UTLS-1 mode measurements have been retrieved using the IMK/IAA (Institut für Meteorologie und Klimaforschung/ Instituto de Astrof´ısica de Andalucía) scientific processor. In the UTLS region a vertical resolution of 3 km...
Dynamic Idp Signature Processing By Fast Elimination Using Dfa
Mohammed Misbahuddin, Sachin Narayanan & Bishwa Ranjan Ghosh
ABSTRACT
Intrusion Detection & Prevention Systems generally aims at detecting / preventing attacks against Information systems and networks. The basic task of IDPS is to monitor network & system traffic for any malicious packets/patterns and hence to prevent any unwarranted incidents which leads the systems to insecure state. The monitoring is done by checking each packet for its validity against the signatures formulated for identified vulnerabilities. Since, signatures are the heart & soul of an...
Dynamic Idp Signature Processing By Fast Elimination Using Dfa
Mohammed Misbahuddin, Sachin Narayanan & Bishwa Ranjan Ghosh
ABSTRACT
Intrusion Detection & Prevention Systems generally aims at detecting / preventing attacks against Information systems and networks. The basic task of IDPS is to monitor network & system traffic for any malicious packets/patterns and hence to prevent any unwarranted incidents which leads the systems to insecure state. The monitoring is done by checking each packet for its validity against the signatures formulated for identified vulnerabilities. Since, signatures are the heart & soul of an...
Commande DTC par réseaux de neurones d’un moteur à induction alimenté par un onduleur de tension
Lahcen Lebba, Hocine Zighem, Farid Kadri & Azeddine MehaouchiA New Key Establishment Scheme For Wireless Sensor Networks
Eric Ke Wang, Lucas C.K.Hui & S.M.Yiu
ABSTRACT
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated pairwise key establishment and integrating LU Matrix with Elliptic Curve Diffie-Hellman for anonymous pathkey establishment. At the...
A New Key Establishment Scheme For Wireless Sensor Networks
Eric Ke Wang, Lucas C.K.Hui & S.M.Yiu
ABSTRACT
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated pairwise key establishment and integrating LU Matrix with Elliptic Curve Diffie-Hellman for anonymous pathkey establishment. At the...
Iterative Method For Improvement Of Coding And Decryption
Natasa Zivic
Cryptographic check values (digital signatures, MACs and H-MACs) are useful only if they are free of errors. For that reason all of errors in cryptographic check values should be corrected after the transmission over a noisy channel before their verification is performed. Soft Input Decryption is a method of combining SISO convolutional decoding and decrypting of cryptographic check values to improve the correction of errors in themselves. If Soft Input Decryption is successful, i.e. all...
Iterative Method For Improvement Of Coding And Decryption
Natasa Zivic
Cryptographic check values (digital signatures, MACs and H-MACs) are useful only if they are free of errors. For that reason all of errors in cryptographic check values should be corrected after the transmission over a noisy channel before their verification is performed. Soft Input Decryption is a method of combining SISO convolutional decoding and decrypting of cryptographic check values to improve the correction of errors in themselves. If Soft Input Decryption is successful, i.e. all...
Patemalistische Gleichberechtigungspolitik und weibliche Emanzipation
Hildegard Maria NickelTable des matières
(:Unap)Index nominum
(:Unap)« Notre amitié » : René Char et Jacques Dupin
Valéry HugotteL'héritage du poète : une inadmissible grandeur ?
Stéphane BaqueyResource Types
Registration Year
Data Centers
-
The Cambridge Crystallographic Data Centre30,722
-
ResearchGate12,766
-
ZENODO - Research. Shared.12,723
-
PANGAEA10,116
-
DANS8,484
-
Universität Zürich, ZORA5,535
-
German Medical Science4,844
-
Partnership for Interdisciplinary Studies of Coastal Oceans (PISCO)4,424
-
E-Periodica4,123
-
HEPData.net3,465
-
PARADISEC3,155
-
Archaeology Data Service3,028
-
Defense Technical Information Center (DTIC)2,951
-
TIB Hannover2,668
-
University Library Heidelberg2,214