Search results for "Tribute"

showing 10 items of 1455 documents

Advances in the enumeration of foldable self-avoiding walks

2020

<font color="#336633"&gtSelf-avoiding walks (SAWs) have been studied for a long time due to their intrinsic importance and the many application fields in which they operate. A new subset of SAWs, called foldable SAWs, has recently been discovered when investigating two different SAW manipulations embedded within existing protein structure prediction (PSP) software. Since then, several attempts have been made to find out more about these walks, including counting them. However, calculating the number of foldable SAWs appeared as a tough work, and current supercomputers fail to count foldable SAWs of length exceeding ≈ 30 steps. In this article, we present new progress in this enumeration, bo…

Hexagonal crystal systemComputer sciencebusiness.industry[INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-IU] Computer Science [cs]/Ubiquitous ComputingUpper and lower boundsParallel genetic algorithmComputational MathematicsSoftwareComputational Theory and MathematicsHardware and ArchitectureModeling and Simulation[INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET]Genetic algorithm[INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Enumeration[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and SimulationbusinessAlgorithmSoftware[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]International Journal of Computational Science and Engineering
researchProduct

Cooperative RTS/CTS MAC with relay selection in distributed wireless networks

2009

This paper proposes a cooperative multiple access protocol based on the Distributed Coordination Function (DCF) Request-To-Send/Clear-To-Send (RTS/CTS) scheme for distributed wireless networks. It answers three key questions concerning cooperation from the network perspective, namely when to cooperate, whom to cooperate with and how to protect cooperative transmissions. According to our protocol, the cooperation is initiated only if the direct transmission fails. An optimal relay node is selected in a distributed manner according to instantaneous relay channel conditions without prior information or extra signaling among relay candidates in the network. An additional three-way handshake is …

Hidden node problemComputer sciencebusiness.industryWireless networkNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDistributed coordination functionlaw.inventionCooperative diversityRelaylawMultiple Access with Collision Avoidance for WirelessbusinessRelay channelComputer network2009 International Conference on Ultra Modern Telecommunications &amp; Workshops
researchProduct

Revisit of RTS/CTS Exchange in High-Speed IEEE 802.11 Networks

2005

IEEE 802.11 medium access control (MAC), called distributed coordination function (DCF), provides two different access modes, namely, 2-way (basic access) and 4-way (RTS/CTS) handshaking. The 4-way handshaking has been introduced in order to combat the hidden terminal phenomenon. It has been also proved that such a mechanism can be beneficial even in the absence of hidden terminals, because of the collision time reduction. We analyze the effectiveness of the RTS/CTS access mode, in current 802.11b and 802.11a networks. Since the rates employed for control frame transmissions can be much lower than the rate employed for data frames, the assumption on the basis of the 4-way handshaking introd…

Hidden node problembusiness.industryComputer scienceReal-time computingFrame (networking)Wireless local area networks (WLAN)Distributed coordination functionThroughputbackoff algorithmHandshakingMedia access controlMultiple Access with Collision Avoidance for WirelessIEEE 802.11e-2005businessCarrier sense multiple access with collision avoidanceComputer networkSixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks
researchProduct

Introduction

2014

Studying Ancient Greek offers new insights for linguistic theory. Thanks to the amount of available written data of a large corpus at our disposal, it is possible for a linguist to test hypotheses from modern theories in order to explain language phenomena, without disregarding a description according to methodologies adopted in traditional analyses of ancient languages. In particular, the morphological complexity of the Greek verb with its highly intricate inflectional system provide a valuable basis for an in-depth-analysis of the mechanisms which regulate the functioning of a language in the mind of the speaker. Crucially, in recent times also deductive methodologies adopted in the gener…

Historical linguisticverbal systemcognitive linguisticDistributed MorphologyOld Greekfunctional linguistictypological linguisticIndo-Europeangrammatical categoriesSettore L-LIN/01 - Glottologia E Linguistica
researchProduct

Deployment of a WLCG network monitoring infrastructure based on the perfSONAR-PS technology

2014

The WLCG infrastructure moved from a very rigid network topology, based on the MONARC model, to a more relaxed system, where data movement between regions or countries does not necessarily need to involve T1 centres. While this evolution brought obvious advantages, especially in terms of flexibility for the LHC experiment's data management systems, it also opened the question of how to monitor the increasing number of possible network paths, in order to provide a global reliable network service. The perfSONAR network monitoring system has been evaluated and agreed as a proper solution to cover the WLCG network monitoring use cases: it allows WLCG to plan and execute latency and bandwidth te…

HistoryEngineeringbusiness.industryPerfSONARDistributed computingData managementNetwork monitoringNetwork topologyComputer securitycomputer.software_genreComputer Science ApplicationsEducationSoftware deploymentNetwork serviceUse casebusinesscomputerGraphical user interfaceJournal of Physics: Conference Series
researchProduct

Omaggio a Joan Vinyoli

2015

Riassunto: In continuità con l’omaggio a Joan Vinyoli organizzato a Roma nel 2014, si propongono le traduzioni in italiano di alcuni suoi componimenti, con testo a fronte.   Parole chiave: Joan Vinyoli, traduzione dal catalano all’italiano, poesia catalana del Novecento.   Abstract: In continuity with the Joan Vinyoli Tribute organized in Rome in December 2014, I propose the translation from Catalan to Italian of some of his poems.  Keywords: Joan Vinyoli, translation from Catalan to Italian, twentieth-century Catalan poetry.

HistoryLiterature and Literary TheoryFilologíasmedia_common.quotation_subjectlcsh:Literature (General)lcsh:D111-203Tributelcsh:Medieval historytraduzione letteraria; Joan Vinyoli; poesia catalana del '900.Joan VinyoliLanguage and Linguisticspoesia catalana del '900traduzione letterariamedia_commonUNESCO::CIENCIAS DE LAS ARTES Y LAS LETRASPoetryFilologías. GeneralidadesArttraduzione dal catalano all’italianolcsh:PN1-6790language.human_languagelcsh:D204-475:CIENCIAS DE LAS ARTES Y LAS LETRAS [UNESCO]languagePerformance artCatalanHumanitiespoesia catalana del Novecentolcsh:Modern history 1453-
researchProduct

Le dossier de M. Helvius Anthus. Ou comment une mauvaise édition initiale entraîne la création d’ un « monstre » social

2021

An inscription discovered in Baetica and wrongly read by the publishers, was understood only late. The first reading, erroneous, gave rise to an impossible social situation of the Roman point of view : a slave would have had his statue on the forum of Lucurgentum ! More recent works allowed to correct this initial error and to restore the text, a testimony of the essay of upward social mobility of an emancipated slave, an evergete offering among others a statue of the god Ianus Pater.

HommageDieu Ianus Pater[SHS.ARCHEO] Humanities and Social Sciences/Archaeology and Prehistory[SHS.ARCHEO]Humanities and Social Sciences/Archaeology and PrehistoryLucurgentumÉpigraphieBétiqueAffranchiStatueStatue ; Lucurgentum ; Bétique ; Épigraphie ; Affranchi ; Dieu Ianus Pater ; HommageComputingMilieux_MISCELLANEOUSEpigraphy ; Emancipated Slave ; God Ianus Pater ; Statue ; Tribute ; Lucurgentum ; BaeticaPériodiques Scientifiques en Édition Électronique
researchProduct

H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks

2009

In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collector’s retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption based scheme is not compromise resilient. To achieve all the desires, we propose a scheme - H2S by making use of both homomorphic secret sharing and homomorphic encryption. The security and efficiency of our scheme are justified by extensive analysis.

Homomorphic secret sharingComputer sciencebusiness.industryClient-side encryptionEncryptioncomputer.software_genreMultiple encryptionProbabilistic encryptionComputer Science::MultimediaComputer Science::Networking and Internet Architecture40-bit encryptionAttribute-based encryptionOn-the-fly encryptionbusinesscomputerComputer Science::Cryptography and SecurityComputer network2009 Fifth International Conference on Information Assurance and Security
researchProduct

A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing

2009

Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission cost, and resilience of node compromise in UWSNs, we propose a novel Homomorphic Encryption and Homomorphic Secret Sharing based scheme (HEHSS) to accomplish the goals of confidentiality, resilience to node compromises, reliability, and efficiency of storage and transmission. Our scheme exploits th…

Homomorphic secret sharingbusiness.industryComputer scienceNode (networking)Distributed data storeHomomorphic encryptionCryptographybusinessEncryptionSecret sharingWireless sensor networkComputer network2009 2nd IFIP Wireless Days (WD)
researchProduct

Class-B two-photon Fabry–Pérot laser

1998

Abstract We study the stationary operation and stability properties of a class-B two-photon Fabry–Perot laser. We show that, differently from the one-photon laser, the intensity emitted by the two-photon laser is larger in a Fabry–Perot than in a ring cavity. The lasing solution loses stability through a subcritical Hopf bifurcation, as it occurs in the unidirectional ring laser. The stability domain in the parameter space is larger in the Fabry–Perot than in the ring cavity configuration.

Hopf bifurcationPhysicsDistributed feedback laserPhysics::Instrumentation and Detectorsbusiness.industryAstrophysics::Instrumentation and Methods for AstrophysicsPhysics::OpticsRing laserLaserAtomic and Molecular Physics and OpticsElectronic Optical and Magnetic MaterialsRound-trip gainlaw.inventionsymbols.namesakeOpticslawsymbolsLaser power scalingElectrical and Electronic EngineeringPhysical and Theoretical ChemistrybusinessLasing thresholdFabry–Pérot interferometerOptics Communications
researchProduct