• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,391
Next 10 →

Is There a Safe Area for the Axillary Nerve

by In The Deltoid Muscle, A Cadaveric Study
"... Background: Several authors have defined a variety of so-called safe zones for deltoid-splitting incisions. The first aim of the present study was to investigate the distance of the axillary nerve from the acromion and its relation to arm length. The second aim was to identify a safe area for the ax ..."
Abstract - Add to MetaCart
Background: Several authors have defined a variety of so-called safe zones for deltoid-splitting incisions. The first aim of the present study was to investigate the distance of the axillary nerve from the acromion and its relation to arm length. The second aim was to identify a safe area

Safe Areas of Computation for Secure Computing with Insecure Applications

by André L. M. Dos Santos, Richard A. Kemmerer - Proceedings of the Fifteenth Annual Computer Security Applications Conference , 1999
"... Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the security community and have appeared in the popular press. This paper presents an approach to increase the level of secu ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
of security provided to users when interacting with otherwise unsafe applications and computing systems. The general approach, called Safe Areas of Computation (SAC), uses trusted devices, such as smart cards, to provide an area of secure processing and storage. This paper describes preliminary results

Implementing Security Policies Using the Safe Areas of Computation Approach

by André L. M. Dos Santos, Richard A. Kemmerer
"... The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute documents that are stored in their servers. Online banks capitalize on this technology to reduce their operating costs and to off ..."
Abstract - Add to MetaCart
transactions, called Safe Areas of Computation, was described in [DK99]. This paper describes the access control lists used by the Safe Areas of Computation approach, the operations on these access control lists supported by the approach, and how the access control lists can be customized for implementing many

A Monetary History of the United States 1867-1960

by Of Anna J. Schwartz, Michael D. Bordo, Michael D. Bordo, Michael D. Bordo, Michael D. Bordo , 1963
"... The long-awaited monetary history of the United States by Friedman and Schwartz is in every sense of the term a monumental scholarly accomplishment.... the volume sets,..., a new standard for the writing of monetary history, one that requires the explanation of historical developments in terms of mo ..."
Abstract - Cited by 415 (6 self) - Add to MetaCart
of monetary theory and the appli-cation of them to the techniques of quantitative economic analysis.... One can safely predict that it will be the classic reference on its subject for many years to come. H. G. Johnson (1965, 388) The book is clearly destined to become a classic, perhaps one of the few

Markov chain monte carlo convergence diagnostics

by Kathryn Cowles, Bradley P. Carlin - JASA , 1996
"... A critical issue for users of Markov Chain Monte Carlo (MCMC) methods in applications is how to determine when it is safe to stop sampling and use the samples to estimate characteristics of the distribution of interest. Research into methods of computing theoretical convergence bounds holds promise ..."
Abstract - Cited by 371 (6 self) - Add to MetaCart
A critical issue for users of Markov Chain Monte Carlo (MCMC) methods in applications is how to determine when it is safe to stop sampling and use the samples to estimate characteristics of the distribution of interest. Research into methods of computing theoretical convergence bounds holds promise

oriGiNal artiClE Anatomical Course Demarcating the Safe Area for

by The Superior Gluteal Nerve, Simon Lammy
"... ABSTRACT: Iatrogenic injury to the superior gluteal nerve (SGN) persists despite a safe area being defined. Current descriptions of the course of the SGN are conflicting and do not provide agreeable distances to surface landmarks that are useful for most health care professionals. This study aimed t ..."
Abstract - Add to MetaCart
ABSTRACT: Iatrogenic injury to the superior gluteal nerve (SGN) persists despite a safe area being defined. Current descriptions of the course of the SGN are conflicting and do not provide agreeable distances to surface landmarks that are useful for most health care professionals. This study aimed

THE SOUTHERN OUTER MORAY FIRTH IN NE SCOTLAND AS A POTENTIAL “SAFE AREA” CANDIDATE FOR THE HARBOUR PORPOISE (PHOCOENA PHOCOENA L.)

by Allan R. Whaley, Kevin P. Robinson
"... INTRODUCTION. Throughout its range, the distribution of the harbour porpoise (Phocoena phocoena L.) has contracted significantly in the last century, particularly in the North Sea. Reasons for this decline have been primarily attributed to detrimental anthropogenic activities, but the current lack o ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
INTRODUCTION. Throughout its range, the distribution of the harbour porpoise (Phocoena phocoena L.) has contracted significantly in the last century, particularly in the North Sea. Reasons for this decline have been primarily attributed to detrimental anthropogenic activities, but the current lack of data on the species has been noted as the foremost reason for the apparent complacency with which the UK and EC governments have regarded it to date.

Dual Busy Tone Multiple Access (DBTMA) - A Multiple Access Control Scheme for Ad Hoc Networks

by Zygmunt J. Haas, Senior Member, Jing Deng, Student Member - IEEE Transactions on Communications , 2002
"... In ad hoc networks, the hidden- and the exposed-terminal problems can severely reduce the network capacity on the MAC layer. To address these problems, the ready-to-send and clear-to-send (RTS/CTS) dialogue has been proposed in the literature. However, MAC schemes using only the RTS/CTS dialogue can ..."
Abstract - Cited by 302 (13 self) - Add to MetaCart
cannot completely solve the hidden and the exposed terminal problems, as pure "packet sensing" MAC schemes are not safe even in fully connected networks. We propose a new MAC protocol, termed the dual busy tone multiple access (DBTMA) scheme. The operation of the DBTMA protocol is based

The anti-k t jet clustering algorithm

by Matteo Cacciari, Gavin P. Salam, Gregory Soyez - JHEP 04 (2008) 063, arXiv:0802.1189 [hep-ph
"... Abstract: The kt and Cambridge/Aachen inclusive jet finding algorithms for hadron-hadron collisions can be seen as belonging to a broader class of sequential recombination jet algorithms, parametrised by the power of the energy scale in the distance measure. We examine some properties of a new membe ..."
Abstract - Cited by 280 (5 self) - Add to MetaCart
member of this class, for which the power is negative. This “anti-kt ” algorithm essentially behaves like an idealised cone algorithm, in that jets with only soft fragmentation are conical, active and passive areas are equal, the area anomalous dimensions are zero, the non-global logarithms are those

Petrify: a tool for manipulating concurrent specifications and . . .

by Jordi Cortadella, et al.
"... Petrify is a tool for (1) manipulating concurrent specifications and (2) synthesis and optimization of asynchronous control circuits. Given a Petri Net (PN), a Signal Transition Graph (STG), or a Transition System (TS) 1 it (1) generates another PN or STG which is simpler than the original descripti ..."
Abstract - Cited by 219 (34 self) - Add to MetaCart
). In the initial TS, all transitions with the same label are considered as one event. The TS is then transformed and transitions relabeled to fulfill the conditions required to obtain a safe irredundant PN. For synthesis of an asynchronous implementation petrify performs state assignment by solving the Complete
Next 10 →
Results 1 - 10 of 4,391
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University