The history of power compression is a series of developmental epochs that are (1) characteristically marked by a technological breakthrough and (2) generally separated by a factor of ∼1010 in power density. Based on ...
The history of power compression is a series of developmental epochs that are (1) characteristically marked by a technological breakthrough and (2) generally separated by a factor of ∼1010 in power density. Based on new advances in high‐power coherent x‐ray technology, the transition to a new nuclear epoch of laser interactions is presently commencing. Chief outcomes foreseen are (1) the generation of power densities in the 1028–1030 W/cm3 realm, (2) the controlled induction of nuclear interactions, and (3) the production of new states and forms of nuclear matter.
Encyclopedias of regulatory genomic elements provide a foundation for research in areas such as disease diagnosis, disease treatment, and crop enhancement. The construction of complete encyclopedias of organism-specif...
详细信息
Encyclopedias of regulatory genomic elements provide a foundation for research in areas such as disease diagnosis, disease treatment, and crop enhancement. The construction of complete encyclopedias of organism-specific genomic elements involved in gene regulation remains a significant challenge. To address this problem, the authors present novel bioinformatics strategies for exploring the word landscapes of putative regulatory regions of genomes. The methods are incorporated into the WordSeeker software tool, which is available at http://***. The effectiveness of these strategies is demonstrated through several case studies.
In the spring of 2007, Worcester Polytechnic Institute introduced a BS degree program in Robotics engineering. The degree program is a collaborative effort, involving faculty from the departments of computerscience, ...
详细信息
We report on the fabrication of a macroporous silicon diode that successfully operates in a photovoltaic mode of energy conversion. Typical device structures are fabricated on 4″, Cz grown, , p-type, 5 – 30 Ω-cm, S...
详细信息
A continuing challenge in engineering in higher education is that of professional equity regarding opportunity for advancement and job satisfaction due to differences in gender, race, ethnicity, sexual orientation, ab...
详细信息
We develop a unifying analytical and optimization-based framework for the design, operation and performance evaluation of networks of dynamic autonomous agents. The fundamental view is that agents in such a network ar...
详细信息
We develop a unifying analytical and optimization-based framework for the design, operation and performance evaluation of networks of dynamic autonomous agents. The fundamental view is that agents in such a network are dynamic entities that collaborate because via collaboration they can accomplish objectives and goals much better than working alone, or even accomplish objectives that they cannot achieve alone at all. Yet the benefits derived from such collaboration require some costs (e.g. communications), or equivalently, the collaboration is subject to constraints. Understanding and quantifying this tradeoff between the benefits vs the costs of collaboration, leads to new methods that can be used to analyze, design and control/operate networks of agents. Although the inspiration for the framework comes from social and economic networks, the fundamental ideas and in particular the methodology of dynamic constrained coalitional games (DCCG) can unify many concepts and algorithms for networks in various areas: social networks, communication networks, sensor networks, economic networks, biological networks, physics networks. We then analyze a specific instance of such tradeoffs arising in the design of security aware network protocols. We extend network utility maximization (NUM) so as to encompass security metrics such as "trust". The trust values assigned to nodes are based on interaction history and community-based monitoring. The effect of these trust values on the resulting protocols is that in routing and media access scheduling node trustworthiness is automatically considered and used. We develop a distributed algorithm for the joint physical-MAC-routing protocol design. Our extension to NUM with security concerns leads to resilient networks.
暂无评论