914,406 research outputs found

    Verifying security protocols by knowledge analysis

    Get PDF
    This paper describes a new interactive method to analyse knowledge of participants involved in security protocols and further to verify the correctness of the protocols. The method can detect attacks and flaws involving interleaving sessions besides normal attacks. The implementation of the method in a generic theorem proving environment, namely Isabelle, makes the verification of protocols mechanical and efficient; it can verify a medium-sized security protocol in less than ten seconds. As an example, the paper finds the flaw in the Needham-Schroeder public key authentication protocol and proves the secure properties and guarantees of the protocol with Lowe's fix to show the effectiveness of this method

    Ownership structure and new product development in transnational corporations in China

    Get PDF
    This article is available open access through the publisher’s website at the link below. Copyright @ 2008 United Nations.This paper examines the relationship between the ownership structure and new product development (NPD) at the affiliates of transnational corporations in China. Seven research hypotheses are tested on a panel data set covering 10,000 manufacturing firms with foreign involvement for the period 1998-2001. The results from probit and tobit models show that contractual joint ventures, equity joint ventures and joint stock enterprises are better organizational forms than wholly owned enterprises for increasing both the probability and intensity of NPD. We also find that ventures with OECD participation are more likely to be involved in NPD than those with participation by “overseas” Chinese TNCs

    Soft Power to Whom? A Critical Analysis of the Publicity Film “CPC (Communist Party of China) is With You Along the Way” in Relation to China’s Soft Power Project

    Get PDF
    The existing literature on China’s soft power is mainly concerned with its success or failure, ignoring the ideological tensions between the Chinese state's international pursuit of soft power and its efforts at reviving the popularity of socialist ideology at home in a country profoundly transformed by modernisation and globalisation processes. This article argues that such ideological tensions should be contextualised and critically analysed by employing an approach informed by critical globalisation studies, particularly by the power-to-whom critique. It offers a critical analysis of the CPC is With You Along the Way film, a notable recent example of the CPC’s publicity videos in the context of its pursuit of soft power. Borrowing Reisigl and Wodak’s discourse-historical approach (DHA) in addition to the analytical devices for the study of ideology from Eagleton and van Dijk, the article argues that CPC is With You Along the Way illustrates a shift in the party’s ideological approach to the question ‘(soft) power to whom?’

    Thermal fluctuations and anomalous elasticity of homogeneous nematic elastomers

    Full text link
    We present a unified formulation of a rotationally invariant nonlinear elasticity for a variety of spontaneously anisotropic phases, and use it to study thermal fluctuations in nematic elastomers and spontaneously anisotropic gels. We find that in a thermodynamic limit homogeneous nematic elastomers are universally incompressible, are characterized by a universal ratio of shear moduli, and exhibit an anomalous elasticity controlled by a nontrivial low temperature fixed point perturbative in D=3-epsilon dimensions. In three dimensions, we make predictions that are asymptotically exact.Comment: 4 RevTeX pgs,,submitted to Europhysics Letter

    Minimizing synchronizations in sparse iterative solvers for distributed supercomputers

    Get PDF
    Eliminating synchronizations is one of the important techniques related to minimizing communications for modern high performance computing. This paper discusses principles of reducing communications due to global synchronizations in sparse iterative solvers on distributed supercomputers. We demonstrates how to minimizing global synchronizations by rescheduling a typical Krylov subspace method. The benefit of minimizing synchronizations is shown in theoretical analysis and is verified by numerical experiments using up to 900 processors. The experiments also show the communication complexity for some structured sparse matrix vector multiplications and global communications in the underlying supercomputers are in the order P1/2.5 and P4/5 respectively, where P is the number of processors and the experiments were carried on a Dawning 5000A
    • 

    corecore