scispace - formally typeset
Search or ask a question
Institution

Macquarie University

EducationSydney, New South Wales, Australia
About: Macquarie University is a education organization based out in Sydney, New South Wales, Australia. It is known for research contribution in the topics: Population & Laser. The organization has 14075 authors who have published 47673 publications receiving 1416184 citations. The organization is also known as: Macquarie uni.
Topics: Population, Laser, Galaxy, Anxiety, Mantle (geology)


Papers
More filters
Journal ArticleDOI
TL;DR: This work quantified the strength of the relationships between temperature and precipitation and 21 plant traits from 447,961 species-site combinations worldwide and used meta-analysis to provide an overall answer to the question.
Abstract: Question: Are plant traits more closely correlated with mean annual temperature, or with mean annual precipitation? Location: Global. Methods: We quantified the strength of the relationships between temperature and precipitation and 21 plant traits from 447,961 species-site combinations worldwide. We used meta-analysis to provide an overall answer to our question.

327 citations

Journal ArticleDOI
TL;DR: It is argued for research that demonstrates that parental understanding of a particular child's characteristics and situation rather than use of specific strategies or styles is the mark of effective parenting.
Abstract: Traditional theories of how children acquire values or standards of behavior have emphasized the importance of specific parenting techniques or styles and have acknowledged the importance of a responsive parent-child relationship, but they have failed to differentiate among forms of responsiveness, have stressed internalization of values as the desired outcome, and have limited their scope to a small set of parenting strategies or methods. This paper outlines new directions for research. It acknowledges the central importance of parents and argues for research that (1) demonstrates that parental understanding of a particular child's characteristics and situation rather than use of specific strategies or styles is the mark of effective parenting; (2) traces the differential impact of varieties of parent responsiveness; (3) assesses the conditions surrounding the fact that parents have goals other than internalization when socializing their children, and evaluates the impact of that fact; and (4) considers a wider range of parenting strategies.

326 citations

Journal ArticleDOI
TL;DR: Patients with metastatic melanoma can have durable complete remission after discontinuation of pembrolizumab, and the low incidence of relapse after median follow-up of approximately 2 years from discontinuation provides hope for a cure for some patients.
Abstract: PurposePembrolizumab provides durable antitumor activity in metastatic melanoma, including complete response (CR) in about 15% of patients. Data are limited on potential predictors of CR and patient disposition after pembrolizumab discontinuation after CR. We describe baseline characteristics and long-term follow-up in patients who experienced CR with pembrolizumab in the KEYNOTE-001 study (ClinicalTrials.gov identifier: NCT01295827).Patients and MethodsPatients with ipilimumab-naive or -treated advanced/metastatic melanoma received one of three dose regimens of pembrolizumab. Eligible patients who received pembrolizumab for ≥ 6 months and at least two treatments beyond confirmed CR could discontinue therapy. Response was assessed every 12 weeks by central Response Evaluation Criteria in Solid Tumors version 1.1. For this analysis, CR was defined per investigator assessment, immune-related response criteria, and potential predictors of CR were evaluated using univariate and multivariate analyses.ResultsOf...

326 citations

Journal ArticleDOI
TL;DR: The coal gap in the Permian-Triassic boundary was first identified by as discussed by the authors. But the coal gap was not identified until the Late Triassic (230 Ma) and the early Triassic period (approximately 250 Ma).
Abstract: Early Triassic coals are unknown, and Middle Triassic coals are rare and thin. The Early Triassic coal gap began with extinction of peat-forming plants at the end of the Permian (ca. 250 Ma), with no coal known anywhere until Middle Triassic (243 Ma). Permian levels of plant diversity and peat thickness were not recovered until Late Triassic (230 Ma). Tectonic and climatic explanations for the coal gap fail because deposits of fluctuating sea levels and sedimentary facies and paleosols commonly found in coal-bearing sequences are present also in Early Triassic rocks. Nor do we favor explanations involving evolutionary advances in the effectiveness of fungal decomposers, insects or tetrapod herbivores, which became cosmopolitan and much reduced in diversity across the Permian-Triassic boundary. Instead, we favor explanations involving extinction of peat-forming plants at the Permian-Triassic boundary, followed by a hiatus of some 10 m.y. until newly evolved peat-forming plants developed tolerance to the acidic dysaerobic conditions of wetlands. This view is compatible not only with the paleobotanical record of extinction of swamp plants, but also with indications of a terminal Permian productivity crash from {delta}{sup 13}C{sub org} and total organic carbon of both nonmarine and shallow marine shales. 205 refs., 3 figs.,more » 3 tabs.« less

326 citations

Book ChapterDOI
02 Dec 2009
TL;DR: This work achieves CPA-security against subexponential attacks, with (quasi-)optimal asymptotic performance, in public key encryption schemes with security provably based on the worst case hardness of the approximate Shortest Vector Problem in some structured lattices, called ideal lattices.
Abstract: We describe public key encryption schemes with security provably based on the worst case hardness of the approximate Shortest Vector Problem in some structured lattices, called ideal lattices. Under the assumption that the latter is exponentially hard to solve even with a quantum computer, we achieve CPA-security against subexponential attacks, with (quasi-)optimal asymptotic performance: if n is the security parameter, both keys are of bit-length ${\widetilde{O}}(n)$ and the amortized costs of both encryption and decryption are ${\widetilde{O}}(1)$ per message bit. Our construction adapts the trapdoor one-way function of Gentry et al. (STOC'08), based on the Learning With Errors problem, to structured lattices. Our main technical tools are an adaptation of Ajtai's trapdoor key generation algorithm (ICALP'99) and a re-interpretation of Regev's quantum reduction between the Bounded Distance Decoding problem and sampling short lattice vectors.

326 citations


Authors

Showing all 14346 results

NameH-indexPapersCitations
Yang Yang1712644153049
Peter B. Reich159790110377
Nicholas J. Talley158157190197
John R. Hodges14981282709
Thomas J. Smith1401775113919
Andrew G. Clark140823123333
Joss Bland-Hawthorn136111477593
John F. Thompson132142095894
Xin Wang121150364930
William L. Griffin11786261494
Richard Shine115109656544
Ian T. Paulsen11235469460
Jianjun Liu112104071032
Douglas R. MacFarlane11086454236
Richard A. Bryant10976943971
Network Information
Related Institutions (5)
Australian National University
109.2K papers, 4.3M citations

96% related

University of Queensland
155.7K papers, 5.7M citations

96% related

University of Sydney
187.3K papers, 6.1M citations

95% related

University of Melbourne
174.8K papers, 6.3M citations

95% related

University of New South Wales
153.6K papers, 4.8M citations

94% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023110
2022463
20214,106
20204,009
20193,549
20183,119