914,406 research outputs found
Verifying security protocols by knowledge analysis
This paper describes a new interactive method to analyse knowledge of participants involved in security protocols and further to verify the correctness of the protocols. The method can detect attacks and flaws involving interleaving sessions besides normal attacks. The implementation of the method in a generic theorem proving environment, namely Isabelle, makes the verification of protocols mechanical and efficient; it can verify a medium-sized security protocol in less than ten seconds. As an example, the paper finds the flaw in the Needham-Schroeder public key authentication protocol and proves the secure properties and guarantees of the protocol with Lowe's fix to show the effectiveness of this method
Ownership structure and new product development in transnational corporations in China
This article is available open access through the publisherâs website at the link below. Copyright @ 2008 United Nations.This paper examines the relationship between the ownership structure
and new product development (NPD) at the affiliates of transnational
corporations in China. Seven research hypotheses are tested on a panel
data set covering 10,000 manufacturing firms with foreign involvement
for the period 1998-2001. The results from probit and tobit models
show that contractual joint ventures, equity joint ventures and joint stock
enterprises are better organizational forms than wholly owned enterprises
for increasing both the probability and intensity of NPD. We also find
that ventures with OECD participation are more likely to be involved in
NPD than those with participation by âoverseasâ Chinese TNCs
Soft Power to Whom? A Critical Analysis of the Publicity Film âCPC (Communist Party of China) is With You Along the Wayâ in Relation to Chinaâs Soft Power Project
The existing literature on Chinaâs soft power is mainly concerned with its success or failure, ignoring the ideological tensions between the Chinese state's international pursuit of soft power and its efforts at reviving the popularity of socialist ideology at home in a country profoundly transformed by modernisation and globalisation processes. This article argues that such ideological tensions should be contextualised and critically analysed by employing an approach informed by critical globalisation studies, particularly by the power-to-whom critique. It offers a critical analysis of the CPC is With You Along the Way film, a notable recent example of the CPCâs publicity videos in the context of its pursuit of soft power. Borrowing Reisigl and Wodakâs discourse-historical approach (DHA) in addition to the analytical devices for the study of ideology from Eagleton and van Dijk, the article argues that CPC is With You Along the Way illustrates a shift in the partyâs ideological approach to the question â(soft) power to whom?â
Thermal fluctuations and anomalous elasticity of homogeneous nematic elastomers
We present a unified formulation of a rotationally invariant nonlinear
elasticity for a variety of spontaneously anisotropic phases, and use it to
study thermal fluctuations in nematic elastomers and spontaneously anisotropic
gels. We find that in a thermodynamic limit homogeneous nematic elastomers are
universally incompressible, are characterized by a universal ratio of shear
moduli, and exhibit an anomalous elasticity controlled by a nontrivial low
temperature fixed point perturbative in D=3-epsilon dimensions. In three
dimensions, we make predictions that are asymptotically exact.Comment: 4 RevTeX pgs,,submitted to Europhysics Letter
Minimizing synchronizations in sparse iterative solvers for distributed supercomputers
Eliminating synchronizations is one of the important techniques related to minimizing communications for modern high performance computing. This paper discusses principles of reducing communications due to global synchronizations in sparse iterative solvers on distributed supercomputers. We demonstrates how to minimizing global synchronizations by rescheduling a typical Krylov subspace method. The benefit of minimizing synchronizations is shown in theoretical analysis and is verified by numerical experiments using up to 900 processors. The experiments also show the communication complexity for some structured sparse matrix vector multiplications and global communications in the underlying supercomputers are in the order P1/2.5 and P4/5 respectively, where P is the number of processors and the experiments were carried on a Dawning 5000A
- âŠ