3,763 research outputs found

    Postshutdown cooling requirements of tungsten water-moderated nuclear rocket

    Get PDF
    Postshutdown cooling requirements of tungsten water moderated nuclear rocket engine

    Scheduling language and algorithm development study. Volume 2, phase 2: Introduction to plans programming

    Get PDF
    A user guide for the Programming Language for Allocation and Network Scheduling (PLANS) is presented. Information is included for the construction of PLANS programs. The basic philosophy of PLANS is discussed, and access and update reference techniques are described along with the use of tree structures

    Translational energy dependence of cross sections for reactions of OH− (H2O) n with CO2 and SO2

    Get PDF
    This is the publisher's version, also available electronically from http://scitation.aip.org/content/aip/journal/jcp/80/10/10.1063/1.446510.A tandem mass spectrometer has been used to measure cross sections for reactions of the solvated negative ions OH−(H2O) n , where 0≤n≤3, with the neutral molecules CO2 and SO2 over the range of reactant translational energy 0.15–25.0 eV (LAB). The reactions observed include solvent switching, collisional dissociation, and charge transfer. The exoergic solvent switching reactions are very rapid, having cross sections which exceed a hundred square Angstroms at low energies. These cross sections decrease approximately as (energy)−0.5 up to 1 eV and then decrease much more rapidly at higher collision energies. Estimates of bond dissociation energies for the cluster ions are derived from the measured translational energy thresholds for the endothermic collisional dissociationreactions

    Relating two standard notions of secrecy

    Get PDF
    Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s should never be disclosed while equivalence-based secrecy states that two executions of a protocol with distinct instances for s should be indistinguishable to an attacker. Although the second formulation ensures a higher level of security and is closer to cryptographic notions of secrecy, decidability results and automatic tools have mainly focused on the first definition so far. This paper initiates a systematic investigation of the situations where syntactic secrecy entails strong secrecy. We show that in the passive case, reachability-based secrecy actually implies equivalence-based secrecy for digital signatures, symmetric and asymmetric encryption provided that the primitives are probabilistic. For active adversaries, we provide sufficient (and rather tight) conditions on the protocol for this implication to hold.Comment: 29 pages, published in LMC

    Improving the use of equational constraints in cylindrical algebraic decomposition

    Get PDF
    When building a cylindrical algebraic decomposition (CAD) savings can be made in the presence of an equational constraint (EC): an equation logically implied by a formula. The present paper is concerned with how to use multiple ECs, propagating those in the input throughout the projection set. We improve on the approach of McCallum in ISSAC 2001 by using the reduced projection theory to make savings in the lifting phase (both to the polynomials we lift with and the cells lifted over). We demonstrate the benefits with worked examples and a complexity analysis

    Decidability of Univariate Real Algebra with Predicates for Rational and Integer Powers

    Full text link
    We prove decidability of univariate real algebra extended with predicates for rational and integer powers, i.e., (xn∈Q)(x^n \in \mathbb{Q}) and (xn∈Z)(x^n \in \mathbb{Z}). Our decision procedure combines computation over real algebraic cells with the rational root theorem and witness construction via algebraic number density arguments.Comment: To appear in CADE-25: 25th International Conference on Automated Deduction, 2015. Proceedings to be published by Springer-Verla

    Graduate Education in Agricultural Communication: The Need and Role

    Get PDF
    Is there a meed for graduate studies in agricultural communication

    Scheduling language and algorithm development study. Volume 3, phase 2: As-built specifications for the prototype language and module library

    Get PDF
    Detailed specifications of the prototype language and module library are presented. The user guide to the translator writing system is included

    Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    Get PDF
    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples

    Truth Table Invariant Cylindrical Algebraic Decomposition by Regular Chains

    Get PDF
    A new algorithm to compute cylindrical algebraic decompositions (CADs) is presented, building on two recent advances. Firstly, the output is truth table invariant (a TTICAD) meaning given formulae have constant truth value on each cell of the decomposition. Secondly, the computation uses regular chains theory to first build a cylindrical decomposition of complex space (CCD) incrementally by polynomial. Significant modification of the regular chains technology was used to achieve the more sophisticated invariance criteria. Experimental results on an implementation in the RegularChains Library for Maple verify that combining these advances gives an algorithm superior to its individual components and competitive with the state of the art
    • …
    corecore