682 research outputs found

    Thermofield Dynamics of the Heterotic String - Physical Aspects of the Thermal Duality -

    Full text link
    The thermofield dynamics of the D = 10 heterotic thermal string theory is described in proper reference to the thermal duality symmetry as well as the thermal stability of modular invariance in association with the global phase structure of the D = 10 heterotic thermal string ensemble.Comment: 8 pages, LaTeX, Minor correction

    Combined immunosuppressive therapy with low dose FK506 and antimetabolites in rat allogeneic heart transplantation

    Get PDF
    Following rat heterotopic heart allotransplantation, low to lethal doses of the antimetabolites mizoribine (MIZ), RS-61443 (RS), and AZA were given alone or in combination with subtherapeutic doses of FK506 (0.04 mg/kg/day) for 14 days after transplantation. With the median effect analysis of Chou and Kahan for quantitative drug interactions, substantial therapeutic synergism was demonstrated between FK506 and nontoxic doses of MĪZ (2.5, 5, and 10 mg/kg/day) or AZA (5, 30, and 45 mg/kg/day), which was particularly evident with the lowest dose MIZ (2.5 mg/kg/day). When FK506 was used in combination with MIZ or AZA but not with RS, the maximum effect (peak median graft survival) was enhanced significantly from 15 days (MIZ alone) to 26 days (P<0.05), and from 19 days (AZA alone) to 32 days (P<0.0l). In contrast, RS interacted with FK506 no more than additively. Although RS was the most powerful single antimetabolite, the best overall survival was obtained by combining AZA and FK506. The addition of FK506 did not significantly increase the percent mortality and LD50 of the antimetabolites. © 1994 by Williams and Wilkins

    Encrypted Shared Data Spaces

    Get PDF
    The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approaches focus on access control mechanisms that protect the data space from untrusted agents. The basic assumption is that the hosts (and their administrators) where the data space is deployed have to be trusted. Encryption schemes can be used to protect the data space content from malicious hosts. However, these schemes do not allow searching on encrypted data. In this paper we present a novel encryption scheme that allows tuple matching on completely encrypted tuples. Since the data space does not need to decrypt tuples to perform the search, tuple confidentiality can be guaranteed even when the data space is deployed on malicious hosts (or an adversary gains access to the host). Our scheme does not require authorised agents to share keys for inserting and retrieving tuples. Each authorised agent can encrypt, decrypt, and search encrypted tuples without having to know other agents’ keys. This is beneficial inasmuch as it simplifies the task of key management. An implementation of an encrypted data space based on this scheme is described and some preliminary performance results are given
    corecore