7,390 research outputs found

    Tropical intercontinental disjunctions

    Get PDF

    Comment on "Indispensable Finite Time Correlations for Fokker-Planck Equations from Time Series Data"

    Get PDF
    Comment on "Indispensable Finite Time Correlations for Fokker-Planck Equations from Time Series Data"Comment: 2 pages, 1 figur

    Treatment of renal stones by extracorporeal shockwave lithotripsy - An update

    Get PDF
    Aim: Despite the extensive experience with minimal invasive stone therapy, there are still different views on the ideal management of renal stones. Materials and Methods: Analysis of the literature includes more than 14,000 patients. We have compared these data with long-term results of two major stone centers in Germany. The results have been compared concerning the anatomical kidney situation, stone size, stone localization and observation time. Results: According to the importance of residual fragments following extracorporeal shock wave lithotripsy (ESWL), we have to distinguish between clinically insignificant residual fragments and clinically significant residual fragments (CIRF). 24 months following ESWL stone passage occurs as a continous process, and if there are no clinical symptoms, any endoscopic procedure should be considered as overtreatment. According to these results, stone-free rates of patients increase in longer follow-up periods. Newer ESWL technology has increased the percentage of CIRF. Conclusion: We consider ESWL in most patients with renal calculi as first-line treatment, except in patients with renal calculi bigger than 30 mm in diameter. Copyright (C) 2001 S. Karger AG, Basel

    Security of two-way quantum key distribution

    Full text link
    Quantum key distribution protocols typically make use of a one-way quantum channel to distribute a shared secret string to two distant users. However, protocols exploiting a two-way quantum channel have been proposed as an alternative route to the same goal, with the potential advantage of outperforming one-way protocols. Here we provide a strategy to prove security for two-way quantum key distribution protocols against the most general quantum attack possible by an eavesdropper. We utilize an entropic uncertainty relation, and only a few assumptions need to be made about the devices used in the protocol. We also show that a two-way protocol can outperform comparable one-way protocols.Comment: 10 pages, 5 figure

    Prevention of Periodontal Diseases

    Get PDF

    The Eötvös experiment

    Get PDF
    • …
    corecore