Institution
Illinois Institute of Technology
Education•Chicago, Illinois, United States•
About: Illinois Institute of Technology is a education organization based out in Chicago, Illinois, United States. It is known for research contribution in the topics: Electric power system & Wireless network. The organization has 10188 authors who have published 21062 publications receiving 554178 citations. The organization is also known as: IIT & Illinois Tech.
Topics: Electric power system, Wireless network, Population, Iterative reconstruction, Computer science
Papers published on a yearly basis
Papers
More filters
••
TL;DR: A review of delay analysis methods can be found in this article, which summarizes the advantages and disadvantages of widely used delay analysis techniques, including as-planned vs. as-built, impact as-planned, collapsed asbuilt, and time impact analysis methods.
187 citations
••
04 Sep 2009TL;DR: Li et al. as discussed by the authors proposed the notion of accountable, anonymous, and ciphertext-policy attribute-based encryption (CP-A3BE), which achieves user accountability in black-box model by embedding additional user-specific information into the attribute private key issued to that user.
Abstract: As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently. For the purpose of secure access control, there is, however, still one critical functionality missing in the existing ABE schemes, which is user accountability. Currently, no ABE scheme can completely prevent the problem of illegal key sharing among users. In this paper, we tackle this problem by firstly proposing the notion of accountable, anonymous, and ciphertext-policy ABE (CP-A3BE, in short) and then giving out a concrete construction. We start by improving the state-of-the-art of anonymous CP-ABE to obtain shorter public parameters and ciphertext length. In the proposed CP-A3BE construction, user accountability can be achieved in black-box model by embedding additional user-specific information into the attribute private key issued to that user, while still maintaining hidden access policy. The proposed constructions are provably secure.
187 citations
••
TL;DR: The Deep Underground Neutrino Experiment (DUNE) as discussed by the authors is an international world-class experiment dedicated to addressing these questions as it searches for leptonic charge-parity symmetry violation, stands ready to capture supernova neutrino bursts, and seeks to observe nucleon decay as a signature of a grand unified theory underlying the standard model.
Abstract: The preponderance of matter over antimatter in the early universe, the dynamics of the supernovae that produced the heavy elements necessary for life, and whether protons eventually decay—these mysteries at the forefront of particle physics and astrophysics are key to understanding the early evolution of our universe, its current state, and its eventual fate. The Deep Underground Neutrino Experiment (DUNE) is an international world-class experiment dedicated to addressing these questions as it searches for leptonic charge-parity symmetry violation, stands ready to capture supernova neutrino bursts, and seeks to observe nucleon decay as a signature of a grand unified theory underlying the standard model. The DUNE far detector technical design report (TDR) describes the DUNE physics program and the technical designs of the single- and dual-phase DUNE liquid argon TPC far detector modules. This TDR is intended to justify the technical choices for the far detector that flow down from the high-level physics goals through requirements at all levels of the Project. Volume I contains an executive summary that introduces the DUNE science program, the far detector and the strategy for its modular designs, and the organization and management of the Project. The remainder of Volume I provides more detail on the science program that drives the choice of detector technologies and on the technologies themselves. It also introduces the designs for the DUNE near detector and the DUNE computing model, for which DUNE is planning design reports. Volume II of this TDR describes DUNE's physics program in detail. Volume III describes the technical coordination required for the far detector design, construction, installation, and integration, and its organizational structure. Volume IV describes the single-phase far detector technology. A planned Volume V will describe the dual-phase technology.
187 citations
••
187 citations
••
TL;DR: In this paper, a mathematical model of an exterior wall covered with climbing vegetation has been developed to evaluate the thermal effects of plants on heat transfer through building facades, which can be used both to access facade thermal improvements in existing buildings retrofitted with green walls and to design green walls for optimal energy efficiency in new construction.
186 citations
Authors
Showing all 10258 results
Name | H-index | Papers | Citations |
---|---|---|---|
David R. Williams | 178 | 2034 | 138789 |
David A. Bennett | 167 | 1142 | 109844 |
Herbert A. Simon | 157 | 745 | 194597 |
Naomi J. Halas | 140 | 435 | 82040 |
Ted Belytschko | 134 | 547 | 81345 |
Thomas E. Mallouk | 122 | 549 | 52593 |
Julie A. Schneider | 118 | 492 | 56843 |
Yang-Kook Sun | 117 | 781 | 58912 |
Cass R. Sunstein | 117 | 787 | 57639 |
D. Errede | 110 | 892 | 62903 |
Qian Wang | 108 | 2148 | 65557 |
Patrick W. Corrigan | 106 | 501 | 46711 |
Jürgen Kurths | 105 | 1038 | 62179 |
Wei Chen | 103 | 1438 | 44994 |
Richard A. Posner | 97 | 566 | 40523 |