Results 81 to 90 of about 64,904 (211)

Closed-Form Expressions for Irradiance from Non-Uniform Lambertian Luminaires Part I: Linearly-Varying Radiant Exitance [PDF]

open access: yes, 2000
We present a closed-form expression for the irradiance at a point on a surface due to an arbitrary polygonal Lambertian lurninaire with linearly-varying radiant exitance.
Arvo, James, Chen, Min
core   +5 more sources

Probability References to Apply in the Detection of Anomalous Public Key Infrastructures

open access: yesJournal of Computer Science and Technology, 2016
This article calculates the theoretical probability of finding repeated primes in a given sample of unbiased issued digital certificates. These values can be used as reference for developing a statistical procedure to audit and control the behavioral ...
Antonio Castro Lechtaler   +2 more
doaj  

Deleterious association between proton pump inhibitor and protein kinase inhibitor exposure and survival for patients with lung cancer: A nationwide cohort study

open access: yesCancer Treatment and Research Communications
Introduction: Previous studies have identified an interaction between protein kinase inhibitors (PKIs) and proton pump inhibitors (PPIs) in patients with lung cancer. This type of interaction may reduce the efficacy of PKIs.
Constance Bordet   +7 more
doaj   +1 more source

Cytotoxic Effect of the Her-2/Her-1 Inhibitor PKI-166 on Renal Cancer Cells Expressing the Connexin 32 Gene

open access: yesJournal of Pharmacological Sciences, 2005
We have reported that connexin (Cx) 32 acts as a tumor suppressor gene in renal cancer cells partly due to Her-2 inactivation. Here, we determined if a Her-2/Her-1 inhibitor (PKI-166) can enhance the tumor-suppressive effect of Cx32 in Caki-2 cells from ...
Eriko Fujimoto   +9 more
doaj   +1 more source

Security Issues of the Digital Certificates within Public Key Infrastructures [PDF]

open access: yes
The paper presents the basic byte level interpretation of an X.509 v3 digital certificate according to ASN.1 DER/BER encoding. The reasons for byte level analysis are various and important.
Cristian TOMA
core  

ATP mediates both activation and inhibition of K(ATP) channel activity via cAMP-dependent protein kinase in insulin-secreting cell lines. [PDF]

open access: yes, 1989
The single-channel recording technique was employed to investigate the mechanism conferring ATP sensitivity to a metabolite-sensitive K channel in insulin-secreting cells.
Ciani, S, Eddlestone, GT, Ribalet, B
core  

Geometry of Power Flows and Optimization in Distribution Networks

open access: yes, 2013
We investigate the geometry of injection regions and its relationship to optimization of power flows in tree networks. The injection region is the set of all vectors of bus power injections that satisfy the network and operation constraints.
Lavaei, Javad, Tse, David, Zhang, Baosen
core   +1 more source

Model for PKI interoperability in Serbia / Модель доверия и архетектура PKI в Республике Сербия / Model za PKI interoperabilnost u Republici Srbiji

open access: yesVojnotehnički Glasnik, 2017
The increasing use of electronic services that use electronic certificates and the increasing implementation of public key infrastructures require their interconnection and interoperability.
Radomir I. Prodanović, Ivan B. Vulić
doaj   +1 more source

Secure Mobile Social Networks using USIM in a Closed Environment [PDF]

open access: yes, 2012
Online social networking and corresponding mobile based applications are gaining popularity and now considered a well-integrated service within mobile devices.
Gehrmann, Christian
core   +1 more source

Coordinate Bethe Ansatz for the String S-Matrix

open access: yes, 2007
We use the coordinate Bethe ansatz approach to derive the nested Bethe equations corresponding to the recently found S-matrix for strings in AdS5 x S5, compatible with centrally extended su(2|2) symmetry.Comment: 25 Pages, plain LaTeX, 4 Figures.
Arutyunov G   +23 more
core   +1 more source

Home - About - Disclaimer - Privacy