Results 81 to 90 of about 64,904 (211)
Closed-Form Expressions for Irradiance from Non-Uniform Lambertian Luminaires Part I: Linearly-Varying Radiant Exitance [PDF]
We present a closed-form expression for the irradiance at a point on a surface due to an arbitrary polygonal Lambertian lurninaire with linearly-varying radiant exitance.
Arvo, James, Chen, Min
core +5 more sources
Probability References to Apply in the Detection of Anomalous Public Key Infrastructures
This article calculates the theoretical probability of finding repeated primes in a given sample of unbiased issued digital certificates. These values can be used as reference for developing a statistical procedure to audit and control the behavioral ...
Antonio Castro Lechtaler +2 more
doaj
Introduction: Previous studies have identified an interaction between protein kinase inhibitors (PKIs) and proton pump inhibitors (PPIs) in patients with lung cancer. This type of interaction may reduce the efficacy of PKIs.
Constance Bordet +7 more
doaj +1 more source
We have reported that connexin (Cx) 32 acts as a tumor suppressor gene in renal cancer cells partly due to Her-2 inactivation. Here, we determined if a Her-2/Her-1 inhibitor (PKI-166) can enhance the tumor-suppressive effect of Cx32 in Caki-2 cells from ...
Eriko Fujimoto +9 more
doaj +1 more source
Security Issues of the Digital Certificates within Public Key Infrastructures [PDF]
The paper presents the basic byte level interpretation of an X.509 v3 digital certificate according to ASN.1 DER/BER encoding. The reasons for byte level analysis are various and important.
Cristian TOMA
core
ATP mediates both activation and inhibition of K(ATP) channel activity via cAMP-dependent protein kinase in insulin-secreting cell lines. [PDF]
The single-channel recording technique was employed to investigate the mechanism conferring ATP sensitivity to a metabolite-sensitive K channel in insulin-secreting cells.
Ciani, S, Eddlestone, GT, Ribalet, B
core
Geometry of Power Flows and Optimization in Distribution Networks
We investigate the geometry of injection regions and its relationship to optimization of power flows in tree networks. The injection region is the set of all vectors of bus power injections that satisfy the network and operation constraints.
Lavaei, Javad, Tse, David, Zhang, Baosen
core +1 more source
The increasing use of electronic services that use electronic certificates and the increasing implementation of public key infrastructures require their interconnection and interoperability.
Radomir I. Prodanović, Ivan B. Vulić
doaj +1 more source
Secure Mobile Social Networks using USIM in a Closed Environment [PDF]
Online social networking and corresponding mobile based applications are gaining popularity and now considered a well-integrated service within mobile devices.
Gehrmann, Christian
core +1 more source
Coordinate Bethe Ansatz for the String S-Matrix
We use the coordinate Bethe ansatz approach to derive the nested Bethe equations corresponding to the recently found S-matrix for strings in AdS5 x S5, compatible with centrally extended su(2|2) symmetry.Comment: 25 Pages, plain LaTeX, 4 Figures.
Arutyunov G +23 more
core +1 more source

