Results 101 to 110 of about 389,513 (303)
Soft Constraint Programming to Analysing Security Protocols
Security protocols stipulate how the remote principals of a computer network should interact in order to obtain specific security goals. The crucial goals of confidentiality and authentication may be achieved in various forms, each of different strength.
Bella, Giampaolo, Bistarelli, Stefano
core +2 more sources
This study shows that lizard osteoderm capping tissue is a hyper‐mineralized hydroxyapatite layer consistently covering the superficial osteoderm surface in those species studied here, yet it varies greatly in morphology, nanostructure, and mechanical performance across species.
Adrian Rodriguez‐Palomo +10 more
wiley +1 more source
The Soft Budget Constraint: A Theoretical Clarification [PDF]
In this paper, we have distinguished three different conceptions of the budget constraint (BC). The first one, introduced by Clower, regards the BC as a universal (unconditional) rational planning postulate.
Mehrdad Vahabi
core +3 more sources
Hardening a Soft Budget Constraint Through 'Upward Devolution' to a Supranational Institution: The Case of Italian State-Owned Firms and the European Union [PDF]
Public enterprises, Soft budget constraint, State aid, European integration, Italy ...
Bertero, Elisabetta, Rondi, Laura
core
An optimized carbon host nanostructure enables a dual‐interface‐dominant architecture in sulfur cathodes of solid‐state Li‐S batteries by selectively forming sulfur|carbon and sulfur|solid electrolyte interfaces. This tailored interfacial configuration accelerates sulfur redox kinetics by establishing enriched Li+/e– transport networks, while ...
Zhao Yang +13 more
wiley +1 more source
The Timing of Elections in Federations : A Disciplining Device against Soft Budget Constraints ? [PDF]
We introduce political economics into the soft budget constraint problem by asking if the timing of elections has the potential to harden budget constraints.
Emmanuelle Taugourdeau, Karolina Kaiser
core
SCET sum rules for heavy-to-light form factors
We consider a sum rule for heavy-to-light form factors in soft-collinear effective theory (SCET). Using the correlation function given by the time-ordered product of a heavy-to-light current and its hermitian conjugate, the heavy-to-light soft form ...
Adam K. Leibovich +24 more
core +1 more source
Conductive Bonding and System Architectures for High‐Performance Flexible Electronics
This review outlines bonding technologies and structural design strategies that support high‐performance flexible and stretchable electronics. Bonding approaches such as surface‐activated bonding and anisotropic conductive films, together with system‐level architectures including buffer layers and island‐bridge structures, possess distinct mechanical ...
Kazuma Nakajima, Kenjiro Fukuda
wiley +1 more source
Direct Optical-Flow-Aware Computational Framework for 3D Reconstruction
In this paper, a direct computational method is presented which combines optical flow and structure from motion (SfM) by putting the SfM problem in the framework of optical flow estimation. In other word, the optical flow is reparametrized in term of the
Huijuan Hu, Pei Chen
doaj +1 more source
Applying a high electric field to a doped organic semiconductor heats up the charge carrier distribution beyond the lattice temperature, enhancing conductivity. It is shown that the associated effective temperature can be used to extract the effective localization length, which is a characteristic length scale of charge transport and provides ...
Morteza Shokrani +4 more
wiley +1 more source

