Search results for "Tribute"
showing 10 items of 1455 documents
Advances in the enumeration of foldable self-avoiding walks
2020
<font color="#336633">Self-avoiding walks (SAWs) have been studied for a long time due to their intrinsic importance and the many application fields in which they operate. A new subset of SAWs, called foldable SAWs, has recently been discovered when investigating two different SAW manipulations embedded within existing protein structure prediction (PSP) software. Since then, several attempts have been made to find out more about these walks, including counting them. However, calculating the number of foldable SAWs appeared as a tough work, and current supercomputers fail to count foldable SAWs of length exceeding ≈ 30 steps. In this article, we present new progress in this enumeration, bo…
Cooperative RTS/CTS MAC with relay selection in distributed wireless networks
2009
This paper proposes a cooperative multiple access protocol based on the Distributed Coordination Function (DCF) Request-To-Send/Clear-To-Send (RTS/CTS) scheme for distributed wireless networks. It answers three key questions concerning cooperation from the network perspective, namely when to cooperate, whom to cooperate with and how to protect cooperative transmissions. According to our protocol, the cooperation is initiated only if the direct transmission fails. An optimal relay node is selected in a distributed manner according to instantaneous relay channel conditions without prior information or extra signaling among relay candidates in the network. An additional three-way handshake is …
Revisit of RTS/CTS Exchange in High-Speed IEEE 802.11 Networks
2005
IEEE 802.11 medium access control (MAC), called distributed coordination function (DCF), provides two different access modes, namely, 2-way (basic access) and 4-way (RTS/CTS) handshaking. The 4-way handshaking has been introduced in order to combat the hidden terminal phenomenon. It has been also proved that such a mechanism can be beneficial even in the absence of hidden terminals, because of the collision time reduction. We analyze the effectiveness of the RTS/CTS access mode, in current 802.11b and 802.11a networks. Since the rates employed for control frame transmissions can be much lower than the rate employed for data frames, the assumption on the basis of the 4-way handshaking introd…
Introduction
2014
Studying Ancient Greek offers new insights for linguistic theory. Thanks to the amount of available written data of a large corpus at our disposal, it is possible for a linguist to test hypotheses from modern theories in order to explain language phenomena, without disregarding a description according to methodologies adopted in traditional analyses of ancient languages. In particular, the morphological complexity of the Greek verb with its highly intricate inflectional system provide a valuable basis for an in-depth-analysis of the mechanisms which regulate the functioning of a language in the mind of the speaker. Crucially, in recent times also deductive methodologies adopted in the gener…
Deployment of a WLCG network monitoring infrastructure based on the perfSONAR-PS technology
2014
The WLCG infrastructure moved from a very rigid network topology, based on the MONARC model, to a more relaxed system, where data movement between regions or countries does not necessarily need to involve T1 centres. While this evolution brought obvious advantages, especially in terms of flexibility for the LHC experiment's data management systems, it also opened the question of how to monitor the increasing number of possible network paths, in order to provide a global reliable network service. The perfSONAR network monitoring system has been evaluated and agreed as a proper solution to cover the WLCG network monitoring use cases: it allows WLCG to plan and execute latency and bandwidth te…
Omaggio a Joan Vinyoli
2015
Riassunto: In continuità con l’omaggio a Joan Vinyoli organizzato a Roma nel 2014, si propongono le traduzioni in italiano di alcuni suoi componimenti, con testo a fronte. Parole chiave: Joan Vinyoli, traduzione dal catalano all’italiano, poesia catalana del Novecento. Abstract: In continuity with the Joan Vinyoli Tribute organized in Rome in December 2014, I propose the translation from Catalan to Italian of some of his poems. Keywords: Joan Vinyoli, translation from Catalan to Italian, twentieth-century Catalan poetry.
Le dossier de M. Helvius Anthus. Ou comment une mauvaise édition initiale entraîne la création d’ un « monstre » social
2021
An inscription discovered in Baetica and wrongly read by the publishers, was understood only late. The first reading, erroneous, gave rise to an impossible social situation of the Roman point of view : a slave would have had his statue on the forum of Lucurgentum ! More recent works allowed to correct this initial error and to restore the text, a testimony of the essay of upward social mobility of an emancipated slave, an evergete offering among others a statue of the god Ianus Pater.
H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks
2009
In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collector’s retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption based scheme is not compromise resilient. To achieve all the desires, we propose a scheme - H2S by making use of both homomorphic secret sharing and homomorphic encryption. The security and efficiency of our scheme are justified by extensive analysis.
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing
2009
Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission cost, and resilience of node compromise in UWSNs, we propose a novel Homomorphic Encryption and Homomorphic Secret Sharing based scheme (HEHSS) to accomplish the goals of confidentiality, resilience to node compromises, reliability, and efficiency of storage and transmission. Our scheme exploits th…
Class-B two-photon Fabry–Pérot laser
1998
Abstract We study the stationary operation and stability properties of a class-B two-photon Fabry–Perot laser. We show that, differently from the one-photon laser, the intensity emitted by the two-photon laser is larger in a Fabry–Perot than in a ring cavity. The lasing solution loses stability through a subcritical Hopf bifurcation, as it occurs in the unidirectional ring laser. The stability domain in the parameter space is larger in the Fabry–Perot than in the ring cavity configuration.