Results 41 to 50 of about 40,333 (164)
ABSTRACT Policy subsystems are comprised of competing advocacy coalitions, in which public and private political actors with shared belief systems learn from each other and coordinate their strategies in the pursuit of influencing policy making in their favor.
Kristijan Garic, Philip Leifeld
wiley +1 more source
Abstract The intensity and size of a tropical cyclone (TC) are profoundly shaped by its internal convective distribution. However, comparing convective structures across TCs is challenging because fixed‐radius metrics cannot adapt to TC size variations.
Shi Tang +5 more
wiley +1 more source
Concurrency control mechanism is one of the critical factors which affect the overall performance of database system. The conflicting situations are normal phenomena in multiuser distributed transaction environment. Concurrency situation is not desirable
Jaypalsinh A. Gohil, Prashant M. Dolia
semanticscholar +1 more source
Mechanical Coupling With the Nuclear Envelope Shapes the Schizosaccharomyces pombe Mitotic Spindle
ABSTRACT The fission yeast Schizosaccharomyces pombe divides via closed mitosis, meaning that spindle elongation and chromosome segregation transpire entirely within the closed nuclear envelope. Both the spindle and nuclear envelope must undergo shape changes and exert varying forces on each other during this process.
Marcus A. Begley +8 more
wiley +1 more source
This study integrates multi‐source geospatial data and fire risk modeling to provide the first quantitative analysis of the dynamic impacts of ritual fires on urban‐forest interface zones. Unlike conventional static risk assessment methods, our proposed temporal evolution model elucidates the coupling mechanisms between anthropogenic activities and ...
Sicong Zhou
wiley +1 more source
Bridging the Gap between Programming Languages and Hardware Weak Memory Models
We develop a new intermediate weak memory model, IMM, as a way of modularizing the proofs of correctness of compilation from concurrent programming languages with weak memory consistency semantics to mainstream multi-core architectures, such as POWER and
Lahav, Ori +2 more
core +1 more source
The results of this paper show that incorporating ML predictions with a confidence ratio significantly improves profitability, achieving a 258.5% profit and ~60% increase in total balance compared with traditional non‐ML strategies. By leveraging ML algorithms like multilayer perceptron, this approach enhances decision‐making and outperforms competing ...
Kristína Okasová +2 more
wiley +1 more source
Mechanistic Transformation of CuI Nanoparticles Into Oxidation‐Resistant 2D Copper Nanoplates
Thermodynamically stable CuI nanoparticles transform into less stable 2D Cu plates through a defect‐mediated uphill phase transformation. In situ TEM and DFT analyses reveal that Cl− and hexadecylamine promote iodine vacancies, enabling Cu aggregation and facet‐selective {111} growth.
Hyeuk Jin Han +13 more
wiley +1 more source
Abstract unordered and ordered trees CRDT [PDF]
Trees are fundamental data structure for many areas of computer science and system engineering. In this report, we show how to ensure eventual consistency of optimistically replicated trees.
Ahmed-Nacer, Mehdi +2 more
core +3 more sources
Event Log Correlation for Multi‐Step Attack Detection
ABSTRACT Event log correlation (ELC) is central to detecting multi‐step attacks (MSAD) that unfold across heterogeneous systems and long time horizons. This review synthesises ELC families—mining/sequence, graph learning, provenance/causal correlation, and hybrid LLM‐assisted approaches—through an MSAD‐first lens that ties methods to attack stages and ...
Syed Usman Shaukat +2 more
wiley +1 more source

