Results 1  10
of
576
Coil sensitivity encoding for fast MRI. In:
 Proceedings of the ISMRM 6th Annual Meeting,
, 1998
"... New theoretical and practical concepts are presented for considerably enhancing the performance of magnetic resonance imaging (MRI) by means of arrays of multiple receiver coils. Sensitivity encoding (SENSE) is based on the fact that receiver sensitivity generally has an encoding effect complementa ..."
Abstract

Cited by 193 (3 self)
 Add to MetaCart
, must not exceed n C . In other words, the reduction factor is bound by the number of coils used. Note that n P does not need to be the same for all partial unfolding steps. Upon noninteger reduction the number of pixels actually superimposed may vary in the reduced FOV. Generally, the degree
(Non)Random Sequences from (Non)Random Permutations Analysis of RC4 stream cipher
"... RC4 has been the most popular stream cipher in the history of symmetric key cryptography till date. Its internal state contains a pseudorandom permutation over all nbit words (typically n = 8) and it attempts to generate a pseudorandom sequence of words by extracting elements of this permutatio ..."
Abstract

Cited by 13 (6 self)
 Add to MetaCart
RC4 has been the most popular stream cipher in the history of symmetric key cryptography till date. Its internal state contains a pseudorandom permutation over all nbit words (typically n = 8) and it attempts to generate a pseudorandom sequence of words by extracting elements
Whom You Know Matters: Venture Capital Networks and Investment Performance,
 Journal of Finance
, 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm'slength, spotmarket transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract

Cited by 138 (8 self)
 Add to MetaCart
to a subsequent funding round or exits successfully. This effect is large economically. For instance, the survival probability in the first funding round increases from the unconditional expectation of 66.8% to 72.4% for a onestandarddeviation increase in the lead VC's network centrality. Perhaps
Linear Models for a TimeVariant Permutation Generator
"... Abstract—A keystream generator, known as RC4, consisting of a permutation table that slowly varies in time under the control of itself, is analyzed by the linear model approach. The objective is to find linear relations among the keystream bits that hold with probability different from one half by u ..."
Abstract
 Add to MetaCart
Abstract—A keystream generator, known as RC4, consisting of a permutation table that slowly varies in time under the control of itself, is analyzed by the linear model approach. The objective is to find linear relations among the keystream bits that hold with probability different from one half
3 ON THE MAXIMUM ORDERS OF ELEMENTS OF FINITE ALMOST SIMPLE GROUPS AND PRIMITIVE PERMUTATION GROUPS
"... ar ..."
A randomization test for phylogenetic information in systematic data
 Syst
, 1989
"... Abstract.—A randomization procedure is proposed to determine if sets of data used for phylogenetic analysis contain phylogenetically nonrandom information. The method compares the observed number of steps on a minimum length tree with the mean number of steps on minimum length trees derived from th ..."
Abstract

Cited by 55 (0 self)
 Add to MetaCart
the same data set after character state assignments have been randomly permuted within each character. Such randomized data sets will exhibit exactly the same character state distributions as the original data but no phylogenetic information. In tests of 28 separate data sets using this procedure
An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks
"... To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on linear feedback shift registers (LFSRs). In this paper, we extend algebraic analysis to nonLFSR based stream ciphers. Specifically, we perform an algebraic analysis on the RC4 family of stream ciph ..."
Abstract
 Add to MetaCart
the complex word manipulations in the system. For an arbitrary word size, we derive algebraic representations for the three main operations used in RC4, namely state extraction, word addition and state permutation. Equations relating the internal states and keystream of RC4 are then obtained from each
Microsoft Word  Hanson29.doc
"... Abstract In the last few years, preference logic and in particular, the dynamic logic of preference change, has suddenly become a live topic in my Amsterdam and Stanford environments. At the request of the editors, this article explains how this interest came about, and what is happening. I mainly ..."
Abstract
 Add to MetaCart
preferences are generated from criteria or constraints. We show how to dynamify both views by adding explicit events that trigger preference change in the models, and we sketch how the resulting systems connect. Next, we discuss some entanglements between preference, knowledge and belief, and what this means
Microsoft Word  Kamieniarz.doc
, 2007
"... Abstract: The computer resources needed to run the TB LMTO code have been reduced using a genetic algorithm in computations of the total energy requiring the interactive userdependent mode. A computer program has been developed to search for the total energy minima and perform calculations in the ..."
Abstract
 Add to MetaCart
parameters needed for solving the problem by the lm.run subroutine. The number of different atomic radii N r is equal the number of genes of a given chromosome. The initial values of genes of each chromosome are generated at random from the range given in the INPUT file of ga_lmto. The program can work
VMPCR Cryptographically Secure PseudoRandom Number Generator Alternative to RC4
"... Abstract. We present a new Cryptographically Secure PseudoRandom Number Generator. It uses permutations as its internal state, similarly to the RC4 stream cipher. We describe a statistical test which revealed nonrandom patterns in a sample of 216.6 outputs of a 3bit RC4. Our new algorithm produce ..."
Abstract
 Add to MetaCart
Abstract. We present a new Cryptographically Secure PseudoRandom Number Generator. It uses permutations as its internal state, similarly to the RC4 stream cipher. We describe a statistical test which revealed nonrandom patterns in a sample of 216.6 outputs of a 3bit RC4. Our new algorithm
Results 1  10
of
576