7,629 research outputs found
Comment on "Indispensable Finite Time Correlations for Fokker-Planck Equations from Time Series Data"
Comment on "Indispensable Finite Time Correlations for Fokker-Planck
Equations from Time Series Data"Comment: 2 pages, 1 figur
Treatment of renal stones by extracorporeal shockwave lithotripsy - An update
Aim: Despite the extensive experience with minimal invasive stone therapy, there are still different views on the ideal management of renal stones. Materials and Methods: Analysis of the literature includes more than 14,000 patients. We have compared these data with long-term results of two major stone centers in Germany. The results have been compared concerning the anatomical kidney situation, stone size, stone localization and observation time. Results: According to the importance of residual fragments following extracorporeal shock wave lithotripsy (ESWL), we have to distinguish between clinically insignificant residual fragments and clinically significant residual fragments (CIRF). 24 months following ESWL stone passage occurs as a continous process, and if there are no clinical symptoms, any endoscopic procedure should be considered as overtreatment. According to these results, stone-free rates of patients increase in longer follow-up periods. Newer ESWL technology has increased the percentage of CIRF. Conclusion: We consider ESWL in most patients with renal calculi as first-line treatment, except in patients with renal calculi bigger than 30 mm in diameter. Copyright (C) 2001 S. Karger AG, Basel
Security of two-way quantum key distribution
Quantum key distribution protocols typically make use of a one-way quantum
channel to distribute a shared secret string to two distant users. However,
protocols exploiting a two-way quantum channel have been proposed as an
alternative route to the same goal, with the potential advantage of
outperforming one-way protocols. Here we provide a strategy to prove security
for two-way quantum key distribution protocols against the most general quantum
attack possible by an eavesdropper. We utilize an entropic uncertainty
relation, and only a few assumptions need to be made about the devices used in
the protocol. We also show that a two-way protocol can outperform comparable
one-way protocols.Comment: 10 pages, 5 figure
- …