Institution
Purdue University
Education•West Lafayette, Indiana, United States•
About: Purdue University is a education organization based out in West Lafayette, Indiana, United States. It is known for research contribution in the topics: Population & Heat transfer. The organization has 73219 authors who have published 163563 publications receiving 5775236 citations. The organization is also known as: Purdue & Purdue-West Lafayette.
Papers published on a yearly basis
Papers
More filters
•
01 Jan 1974TL;DR: Television: Technology and Cultural Form was first published in 1974, long before the dawn of multi-channel TV, or the reality and celebrity shows that now pack the schedules as discussed by the authors.
Abstract: Television: Technology and Cultural Form was first published in 1974, long before the dawn of multi-channel TV, or the reality and celebrity shows that now pack the schedules. Yet Williams' analysis of television's history, its institutions, programmes and practices, and its future prospects, remains remarkably prescient. Williams stresses the importance of technology in shaping the cultural form of television, while always resisting the determinism of McLuhan's dictum that 'the medium is the message'. If the medium really is the message, Williams asks, what is left for us to do or say? Williams argues that, on the contrary, we as viewers have the power to disturb, disrupt and to distract the otherwise cold logic of history and technology - not just because television is part of the fabric of our daily lives, but because new technologies continue to offer opportunities, momentarily outside the sway of transnational corporations or the grasp of media moguls, for new forms of self and political expression.
1,950 citations
••
TL;DR: The model provides a unifying view of all systems that restrict information flow, enables a classification of them according to security objectives, and suggests some new approaches to formulating the requirements of secure information flow among security classes.
Abstract: This paper investigates mechanisms that guarantee secure information flow in a computer system. These mechanisms are examined within a mathematical framework suitable for formulating the requirements of secure information flow among security classes. The central component of the model is a lattice structure derived from the security classes and justified by the semantics of information flow. The lattice properties permit concise formulations of the security requirements of different existing systems and facilitate the construction of mechanisms that enforce security. The model provides a unifying view of all systems that restrict information flow, enables a classification of them according to security objectives, and suggests some new approaches. It also leads to the construction of automatic program certification mechanisms for verifying the secure flow of information through a program.
1,943 citations
•
01 Jan 1982TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.
Abstract: From the Preface (See Front Matter for full Preface)
Electronic computers have evolved from exiguous experimental enterprises in the 1940s to prolific practical data processing systems in the 1980s. As we have come to rely on these systems to process and store data, we have also come to wonder about their ability to protect valuable data.
Data security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modification. The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks. The book is for students and professionals seeking an introduction to these principles. There are many references for those who would like to study specific topics further.
Data security has evolved rapidly since 1975. We have seen exciting developments in cryptography: public-key encryption, digital signatures, the Data Encryption Standard (DES), key safeguarding schemes, and key distribution protocols. We have developed techniques for verifying that programs do not leak confidential data, or transmit classified data to users with lower security clearances. We have found new controls for protecting data in statistical databases--and new methods of attacking these databases. We have come to a better understanding of the theoretical and practical limitations to security.
1,937 citations
••
TL;DR: Evidence is provided that the rapid 32P-PtdOH response was primarily generated through DAG kinase (DGK), and a tentative model illustrating direct cold effects on phospholipid metabolism is presented.
Abstract: Phosphatidic acid (PtdOH) is emerging as an important signalling lipid in abiotic stress responses in plants. The effect of cold stress was monitored using 32P-labelled seedlings and leaf discs of Arabidopsis thaliana. Low, non-freezing temperatures were found to trigger a very rapid 32P-PtdOH increase, peaking within 2 and 5 min, respectively. In principle, PtdOH can be generated through three different pathways, i.e. i) via de novo phospholipid biosynthesis (through acylation of lyso-PtdOH), ii) via phospholipase D hydrolysis of structural phospholipids or iii) via phosphorylation of diacylglycerol (DAG) by DAG kinase (DGK). Using a differential 32P-labelling protocol and a PLD-transphosphatidylation assay, evidence is provided that the rapid 32P-PtdOH response was primarily generated through DGK. A simultaneous decrease in the levels of 32P-PtdInsP, correlating in time, temperature dependency and magnitude with the increase in 32P-PtdOH, suggested that a PtdInsP-hydrolyzing PLC generated the DAG in this reaction. Testing T-DNA insertion lines available for the seven DGK genes, revealed no clear changes in 32P-PtdOH responses, suggesting functional redundancy. Similarly, known cold-stress mutants were analyzed to investigate whether the PtdOH response acted downstream of the respective gene products. The hos1, los1 and fry1 mutants were found to exhibit normal PtdOH responses. Slight changes were found for ice1, snow1, and the overexpression line Super-ICE1, however, this was not cold-specific and likely due to pleiotropic effects. A tentative model illustrating direct cold effects on phospholipid metabolism is presented.
1,936 citations
••
09 Jul 2003TL;DR: This paper proposes a distributed, randomized clustering algorithm to organize the sensors in a wireless sensor network into clusters, and extends this algorithm to generate a hierarchy of clusterheads and observes that the energy savings increase with the number of levels in the hierarchy.
Abstract: A wireless network consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. The data collected by each sensor is communicated through the network to a single processing center that uses all reported data to determine characteristics of the environment or detect an event. The communication or message passing process must be designed to conserve the limited energy resources of the sensors. Clustering sensors into groups, so that sensors communicate information only to clusterheads and then the clusterheads communicate the aggregated information to the processing center, may save energy. In this paper, we propose a distributed, randomized clustering algorithm to organize the sensors in a wireless sensor network into clusters. We then extend this algorithm to generate a hierarchy of clusterheads and observe that the energy savings increase with the number of levels in the hierarchy. Results in stochastic geometry are used to derive solutions for the values of parameters of our algorithm that minimize the total energy spent in the network when all sensors report data through the clusterheads to the processing center.
1,935 citations
Authors
Showing all 73693 results
Name | H-index | Papers | Citations |
---|---|---|---|
Yi Cui | 220 | 1015 | 199725 |
Yi Chen | 217 | 4342 | 293080 |
David Miller | 203 | 2573 | 204840 |
Hongjie Dai | 197 | 570 | 182579 |
Chris Sander | 178 | 713 | 233287 |
Richard A. Gibbs | 172 | 889 | 249708 |
Richard H. Friend | 169 | 1182 | 140032 |
Charles M. Lieber | 165 | 521 | 132811 |
Jian-Kang Zhu | 161 | 550 | 105551 |
David W. Johnson | 160 | 2714 | 140778 |
Robert Stone | 160 | 1756 | 167901 |
Tobin J. Marks | 159 | 1621 | 111604 |
Joseph Wang | 158 | 1282 | 98799 |
Ed Diener | 153 | 401 | 186491 |
Wei Zheng | 151 | 1929 | 120209 |