Results 51 to 60 of about 40,203 (280)
Balanced growth path solutions of a Boltzmann mean field game model for knowledge growth [PDF]
In this paper we study balanced growth path solutions of a Boltzmann mean field game model proposed by Lucas et al [13] to model knowledge growth in an economy. Agents can either increase their knowledge level by exchanging ideas in learning events or by
Burger, Martin +2 more
core +6 more sources
Simple Summary Both cancer and the chemotherapy used to treat it are drivers of cachexia, a life-threatening body-wasting condition which complicates cancer treatment.
Dean G. Campelj +5 more
semanticscholar +1 more source
A Survey among Network Operators on BGP Prefix Hijacking [PDF]
BGP prefix hijacking is a threat to Internet operators and users. Several mechanisms or modifications to BGP that protect the Internet against it have been proposed.
Pavlos Sermpezis +3 more
semanticscholar +1 more source
This work aims at advancing knowledge about the relationship among Intellectual Capital (IC), firms’ performances and market value by investigating 10-year data gathered from a sample of manufacturing companies listed on the Euronext Stock Exchange.
Gianpaolo Iazzolino +2 more
doaj +1 more source
Logging-based assessment of low-resistivity oil zones: A case study from Sudan
The reservoirs in the N oilfield in Sudan feature a complex sedimentary environment, which has led to a widespread development of low-resistivity oil zones, accounting for as high as 37% of the total oil zones.
Li Chunmei +5 more
doaj +1 more source
Nuclear activity in galaxy pairs: a spectroscopic analysis of 48 UZC-BGPs
Galaxy pairs are ideal sites in which to investigate the role of interaction on nuclear activity. For this reason we have undertaken a spectroscopic survey of a large homogeneous sample of galaxy pairs (UZC-BGP) and we present the results of the nuclear ...
Alonso +61 more
core +1 more source
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes [PDF]
The Internet's interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with strong guarantees require a public-key infrastructure, accurate routing registries, and changes to BGP.
Josh Karlin +2 more
openaire +1 more source
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider +3 more
core +2 more sources
Homotopy properties of Hamiltonian group actions [PDF]
Consider a Hamiltonian action of a compact Lie group H on a compact symplectic manifold (M,w) and let G be a subgroup of the diffeomorphism group Diff(M). We develop techniques to decide when the maps on rational homotopy and rational homology induced by
Kedra, Jarek, McDuff, Dusa
core +2 more sources
Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table
BGP hijacks remain an acute problem in today's Internet, with widespread consequences. While hijack detection systems are readily available, they typically rely on a priori prefix-ownership information and are reactive in nature. In this work, we take on
Cecilia Testart +4 more
semanticscholar +1 more source

