Results 71 to 80 of about 65,702 (193)
D-SLATS: Distributed Simultaneous Localization and Time Synchronization
Through the last decade, we have witnessed a surge of Internet of Things (IoT) devices, and with that a greater need to choreograph their actions across both time and space. Although these two problems, namely time synchronization and localization, share
Alanwar Amr +7 more
core +1 more source
Distributive Politics and Class Dynamics in Rural Java
ABSTRACT Based on fieldwork in a village I call Lone Teak in East Java, Indonesia, this paper examines emerging patterns of class differentiation and distributive politics. The history of Lone Teak's landholding structure reveals long‐term patterns of inequality. However, since widespread deforestation during 1998–2002, new dynamics emerged.
Colum Graham
wiley +1 more source
Probability References to Apply in the Detection of Anomalous Public Key Infrastructures
This article calculates the theoretical probability of finding repeated primes in a given sample of unbiased issued digital certificates. These values can be used as reference for developing a statistical procedure to audit and control the behavioral ...
Antonio Castro Lechtaler +2 more
doaj
This article reveals how the educational policy in Indonesia during The Old Order. The domination of government (Soekarno) as expressed in the domination theory by Antonio Gramsci which a politic is a commander and it can dominate whole Indonesia society
Umasih Umasih
doaj +1 more source
Labour and Land in Indonesia: An Introduction
ABSTRACT This article provides a reflective overview of Indonesian agrarian history, contemporary agrarian dynamics and the growing field of Indonesian agrarian studies. By charting the evolution of the field and highlighting landmark studies, it traces the work and influence of both foreign researchers and the lesser known tradition of agrarian ...
Ben White, Marcus Taylor
wiley +1 more source
Over the last 20 years, the PKI architecture has found its vast application, especially in the fields which require the establishment of a security infrastructure. Given that the purpose of this architecture is to be used for achieving higher security
Radomir I. Prodanović, Ivan B. Vulić
doaj +1 more source
This report surveys different PKI technologies such as PKIX and SPKI and the issues of PKI that affect scalability. Much focus is spent on certificate revocation methodologies and status verification systems such as CRLs, Delta-CRLs, CRS, Certificate ...
Bonilla, Rafael, Slagell, Adam J
core +2 more sources
Closed-Form Expressions for Irradiance from Non-Uniform Lambertian Luminaires Part I: Linearly-Varying Radiant Exitance [PDF]
We present a closed-form expression for the irradiance at a point on a surface due to an arbitrary polygonal Lambertian lurninaire with linearly-varying radiant exitance.
Arvo, James, Chen, Min
core +5 more sources
ABSTRACT Therapeutic drug monitoring of protein kinase inhibitors is widely practiced worldwide. Based on the example of ripretinib dosage requested by a clinician, we detailed the process of method development, using a literature‐based approach while ensuring the sustainability of the method to be as environmentally friendly as possible.
Cedric Rakotovao +10 more
wiley +1 more source
We have reported that connexin (Cx) 32 acts as a tumor suppressor gene in renal cancer cells partly due to Her-2 inactivation. Here, we determined if a Her-2/Her-1 inhibitor (PKI-166) can enhance the tumor-suppressive effect of Cx32 in Caki-2 cells from ...
Eriko Fujimoto +9 more
doaj +1 more source

