Results 1  10
of
830,324
Construction of Escherichia coli K12 inframe, singlegene knockout mutants: the Keio collection. Mol. Syst. Biol 2:2006.0008
, 2006
"... We have systematically made a set of precisely defined, singlegene deletions of all nonessential genes in Escherichia coli K12. Openreading frame coding regions were replaced with a kanamycin cassette flanked by FLP recognition target sites by using a onestep method for inactivation of chromosom ..."
Abstract

Cited by 714 (7 self)
 Add to MetaCart
are candidates for essential genes. Distribution is being handled via GenoBase
Keying hash functions for message authentication
, 1996
"... The use of cryptographic hash functions like MD5 or SHA for message authentication has become a standard approach inmanyInternet applications and protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis. We present new cons ..."
Abstract

Cited by 611 (39 self)
 Add to MetaCart
constructions of message authentication schemes based on a cryptographic hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths. Moreover we show, in a quantitativeway, that the schemes retain almost all the security
Parallel Networks that Learn to Pronounce English Text
 COMPLEX SYSTEMS
, 1987
"... This paper describes NETtalk, a class of massivelyparallel network systems that learn to convert English text to speech. The memory representations for pronunciations are learned by practice and are shared among many processing units. The performance of NETtalk has some similarities with observed h ..."
Abstract

Cited by 549 (5 self)
 Add to MetaCart
is essential. (iv) Relearning after damage is much faster than learning during the original training. (v) Distributed or spaced practice is more effective for longterm retention than massed practice. Network models can be constructed that have the same performance and learning characteristics on a particular
Axiomatic quantum field theory in curved spacetime
, 2008
"... The usual formulations of quantum field theory in Minkowski spacetime make crucial use of features—such as Poincare invariance and the existence of a preferred vacuum state—that are very special to Minkowski spacetime. In order to generalize the formulation of quantum field theory to arbitrary globa ..."
Abstract

Cited by 689 (18 self)
 Add to MetaCart
globally hyperbolic curved spacetimes, it is essential that the theory be formulated in an entirely local and covariant manner, without assuming the presence of a preferred state. We propose a new framework for quantum field theory, in which the existence of an Operator Product Expansion (OPE) is elevated
The irreducibility of the space of curves of given genus
 Publ. Math. IHES
, 1969
"... Fix an algebraically closed field k. Let Mg be the moduli space of curves of genus g over k. The main result of this note is that Mg is irreducible for every k. Of course, whether or not M s is irreducible depends only on the characteristic of k. When the characteristic s o, we can assume that k ~ ..."
Abstract

Cited by 506 (2 self)
 Add to MetaCart
is to construct families of curves X, some singular, with pa(X)=g, over nonsingular parameter spaces, which in some sense contain enough singular curves to link together any two components that Mg might have. The essential thing that makes this method work now is a recent " stable reduction theorem "
Data Mining Approaches for Intrusion Detection,
 in the 7th USENIX Security Symposium,
, 1998
"... Abstract In this paper we discuss our research in developing general and systematic methods for intrusion detection. The key ideas are to use data mining techniques to discover consistent and useful patterns of system features that describe program and user behavior, and use the set of relevant sys ..."
Abstract

Cited by 435 (23 self)
 Add to MetaCart
system features to compute (inductively learned) classifiers that can recognize anomalies and known intrusions. Using experiments on the sendmail system call data and the network tcpdump data, we demonstrate that we can construct concise and accurate classifiers to detect anomalies. We provide
Efficient Implementation of Weighted ENO Schemes
, 1995
"... In this paper, we further analyze, test, modify and improve the high order WENO (weighted essentially nonoscillatory) finite difference schemes of Liu, Osher and Chan [9]. It was shown by Liu et al. that WENO schemes constructed from the r th order (in L¹ norm) ENO schemes are (r +1) th order accur ..."
Abstract

Cited by 412 (38 self)
 Add to MetaCart
In this paper, we further analyze, test, modify and improve the high order WENO (weighted essentially nonoscillatory) finite difference schemes of Liu, Osher and Chan [9]. It was shown by Liu et al. that WENO schemes constructed from the r th order (in L¹ norm) ENO schemes are (r +1) th order
An Object Calculus for Asynchronous Communication
 Proceedings of the European Conference on ObjectOriented Programming (ECOOP
, 1991
"... This paper presents a formal system based on the notion of objects and asynchronous communication. Built on Milner's work on ßcalculus, the communication primitive of the formal system is purely asynchronous, which makes it unique among various concurrency formalisms. Computationally this resu ..."
Abstract

Cited by 392 (35 self)
 Add to MetaCart
this results in a consistent reduction of Milner's calculus, while retaining the same expressive power. Seen semantically asynchronous communication induces a surprisingly different framework where bisimulation is strictly more general than its synchronous counterpart. This paper shows basic construction
Essentially nonoscillatory and weighted essentially nonoscillatory schemes for hyperbolic conservation laws
, 1998
"... In these lecture notes we describe the construction, analysis, and application of ENO (Essentially NonOscillatory) and WENO (Weighted Essentially NonOscillatory) schemes for hyperbolic conservation laws and related HamiltonJacobi equations. ENO and WENO schemes are high order accurate nite di ere ..."
Abstract

Cited by 270 (26 self)
 Add to MetaCart
In these lecture notes we describe the construction, analysis, and application of ENO (Essentially NonOscillatory) and WENO (Weighted Essentially NonOscillatory) schemes for hyperbolic conservation laws and related HamiltonJacobi equations. ENO and WENO schemes are high order accurate nite di
A tool for checking ANSIC programs
 In Tools and Algorithms for the Construction and Analysis of Systems
, 2004
"... Abstract. We present a tool for the formal verification of ANSIC programs using Bounded Model Checking (BMC). The emphasis is on usability: the tool supports almost all ANSIC language features, including pointer constructs, dynamic memory allocation, recursion, and the float and double data types. ..."
Abstract

Cited by 326 (35 self)
 Add to MetaCart
Abstract. We present a tool for the formal verification of ANSIC programs using Bounded Model Checking (BMC). The emphasis is on usability: the tool supports almost all ANSIC language features, including pointer constructs, dynamic memory allocation, recursion, and the float and double data types
Results 1  10
of
830,324