17 research outputs found

    The Role of the Party in the Chinese Post-Mao Reform Process

    Get PDF

    A Decade of Crises at the Institute of Marxism–Leninism–Mao Zedong Thought, 1979–89

    No full text

    Responses to Hua shiping's “all roads lead to democracy”

    No full text

    Genomic characterization and seed transmission of a novel unclassified partitivirus infecting Polygonatum kingianum Coll. et Hemsl

    No full text
    This study identified a novel virus in the family Partitiviridae infecting Polygonatum kingianum Coll. et Hemsl, which is tentatively named polygonatum kingianum cryptic virus 1 (PKCV1). PKCV1 genome has two RNA segments: dsRNA1 (1926 bp) has an open reading frame (ORF) encoding an RNA-dependent RNA polymerase (RdRp) of 581 amino acids (aa), and dsRNA2 (1721 bp) has an ORF encoding a capsid protein (CP) of 495 aa. The RdRp of PKCV1 shares 20.70–82.50% aa identity with known partitiviruses, and the CP of PKCV1 shares 10.70–70.80% aa identity with known partitiviruses. Moreover, PKCV1 phylogenetically clustered with unclassified members of the Partitiviridae family. Additionally, PKCV1 is common in P. kingianum planting regions and has a high infection rate in P. kingianum seeds

    Bezoar ∗ : Automated Virtual Machine-based Full-System Recovery from Control-Flow Hijacking Attacks

    No full text
    Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operation after an attack, it may not behave properly. Traditional mechanisms for detecting attacks disrupt service and current recovery approaches are application-based and cannot guarantee recovery in the face of exploits that corrupt the kernel, involve multiple processes or target multithreaded network services. This paper presents Bezoar, an automated full-system virtual machine-based approach to recover from zero-day control-flow hijacking attacks. Bezoar tracks down the source of network bytes in the system and after an attack, replays the checkpointed run while ignoring inputs from the malicious source. We evaluated our proof-of-concept prototype on six notorious exploits for Linux and Windows. In all cases, it recovered the full system state and resumed execution. Bezoar incurs low overhead to the virtual machine: less than 1% for the recovery and log components and approximately 1.4X for the memory monitor component that tracks down network bytes, for five SPEC INT 2000 benchmarks. I

    Janus Magneto–Electric Nanosphere Dimers Exhibiting Unidirectional Visible Light Scattering and Strong Electromagnetic Field Enhancement

    No full text
    Steering incident light into specific directions at the nanoscale is very important for future nanophotonics applications of signal transmission and detection. A prerequisite for such a purpose is the development of nanostructures with high-efficiency unidirectional light scattering properties. Here, from both theoretical and experimental sides, we conceived and demonstrated the unidirectional visible light scattering behaviors of a heterostructure, Janus dimer composed of gold and silicon nanospheres. By carefully adjusting the sizes and spacings of the two nanospheres, the Janus dimer can support both electric and magnetic dipole modes with spectral overlaps and comparable strengths. The interference of these two modes gives rise to the narrow-band unidirectional scattering behaviors with enhanced forward scattering and suppressed backward scattering. The directionality can further be improved by arranging the dimers into one-dimensional chain structures. In addition, the dimers also show remarkable electromagnetic field enhancements. These results will be important not only for applications of light emitting devices, solar cells, optical filters, and various surface enhanced spectroscopies but also for furthering our understanding on the light–matter interactions at the nanoscale
    corecore