scispace - formally typeset
Search or ask a question
Institution

Purdue University

EducationWest Lafayette, Indiana, United States
About: Purdue University is a education organization based out in West Lafayette, Indiana, United States. It is known for research contribution in the topics: Population & Heat transfer. The organization has 73219 authors who have published 163563 publications receiving 5775236 citations. The organization is also known as: Purdue & Purdue-West Lafayette.


Papers
More filters
Book
01 Jan 1974
TL;DR: Television: Technology and Cultural Form was first published in 1974, long before the dawn of multi-channel TV, or the reality and celebrity shows that now pack the schedules as discussed by the authors.
Abstract: Television: Technology and Cultural Form was first published in 1974, long before the dawn of multi-channel TV, or the reality and celebrity shows that now pack the schedules. Yet Williams' analysis of television's history, its institutions, programmes and practices, and its future prospects, remains remarkably prescient. Williams stresses the importance of technology in shaping the cultural form of television, while always resisting the determinism of McLuhan's dictum that 'the medium is the message'. If the medium really is the message, Williams asks, what is left for us to do or say? Williams argues that, on the contrary, we as viewers have the power to disturb, disrupt and to distract the otherwise cold logic of history and technology - not just because television is part of the fabric of our daily lives, but because new technologies continue to offer opportunities, momentarily outside the sway of transnational corporations or the grasp of media moguls, for new forms of self and political expression.

1,950 citations

Journal ArticleDOI
TL;DR: The model provides a unifying view of all systems that restrict information flow, enables a classification of them according to security objectives, and suggests some new approaches to formulating the requirements of secure information flow among security classes.
Abstract: This paper investigates mechanisms that guarantee secure information flow in a computer system. These mechanisms are examined within a mathematical framework suitable for formulating the requirements of secure information flow among security classes. The central component of the model is a lattice structure derived from the security classes and justified by the semantics of information flow. The lattice properties permit concise formulations of the security requirements of different existing systems and facilitate the construction of mechanisms that enforce security. The model provides a unifying view of all systems that restrict information flow, enables a classification of them according to security objectives, and suggests some new approaches. It also leads to the construction of automatic program certification mechanisms for verifying the secure flow of information through a program.

1,943 citations

Book
01 Jan 1982
TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.
Abstract: From the Preface (See Front Matter for full Preface) Electronic computers have evolved from exiguous experimental enterprises in the 1940s to prolific practical data processing systems in the 1980s. As we have come to rely on these systems to process and store data, we have also come to wonder about their ability to protect valuable data. Data security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modification. The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks. The book is for students and professionals seeking an introduction to these principles. There are many references for those who would like to study specific topics further. Data security has evolved rapidly since 1975. We have seen exciting developments in cryptography: public-key encryption, digital signatures, the Data Encryption Standard (DES), key safeguarding schemes, and key distribution protocols. We have developed techniques for verifying that programs do not leak confidential data, or transmit classified data to users with lower security clearances. We have found new controls for protecting data in statistical databases--and new methods of attacking these databases. We have come to a better understanding of the theoretical and practical limitations to security.

1,937 citations

Journal ArticleDOI
TL;DR: Evidence is provided that the rapid 32P-PtdOH response was primarily generated through DAG kinase (DGK), and a tentative model illustrating direct cold effects on phospholipid metabolism is presented.
Abstract: Phosphatidic acid (PtdOH) is emerging as an important signalling lipid in abiotic stress responses in plants. The effect of cold stress was monitored using 32P-labelled seedlings and leaf discs of Arabidopsis thaliana. Low, non-freezing temperatures were found to trigger a very rapid 32P-PtdOH increase, peaking within 2 and 5 min, respectively. In principle, PtdOH can be generated through three different pathways, i.e. i) via de novo phospholipid biosynthesis (through acylation of lyso-PtdOH), ii) via phospholipase D hydrolysis of structural phospholipids or iii) via phosphorylation of diacylglycerol (DAG) by DAG kinase (DGK). Using a differential 32P-labelling protocol and a PLD-transphosphatidylation assay, evidence is provided that the rapid 32P-PtdOH response was primarily generated through DGK. A simultaneous decrease in the levels of 32P-PtdInsP, correlating in time, temperature dependency and magnitude with the increase in 32P-PtdOH, suggested that a PtdInsP-hydrolyzing PLC generated the DAG in this reaction. Testing T-DNA insertion lines available for the seven DGK genes, revealed no clear changes in 32P-PtdOH responses, suggesting functional redundancy. Similarly, known cold-stress mutants were analyzed to investigate whether the PtdOH response acted downstream of the respective gene products. The hos1, los1 and fry1 mutants were found to exhibit normal PtdOH responses. Slight changes were found for ice1, snow1, and the overexpression line Super-ICE1, however, this was not cold-specific and likely due to pleiotropic effects. A tentative model illustrating direct cold effects on phospholipid metabolism is presented.

1,936 citations

Proceedings ArticleDOI
09 Jul 2003
TL;DR: This paper proposes a distributed, randomized clustering algorithm to organize the sensors in a wireless sensor network into clusters, and extends this algorithm to generate a hierarchy of clusterheads and observes that the energy savings increase with the number of levels in the hierarchy.
Abstract: A wireless network consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. The data collected by each sensor is communicated through the network to a single processing center that uses all reported data to determine characteristics of the environment or detect an event. The communication or message passing process must be designed to conserve the limited energy resources of the sensors. Clustering sensors into groups, so that sensors communicate information only to clusterheads and then the clusterheads communicate the aggregated information to the processing center, may save energy. In this paper, we propose a distributed, randomized clustering algorithm to organize the sensors in a wireless sensor network into clusters. We then extend this algorithm to generate a hierarchy of clusterheads and observe that the energy savings increase with the number of levels in the hierarchy. Results in stochastic geometry are used to derive solutions for the values of parameters of our algorithm that minimize the total energy spent in the network when all sensors report data through the clusterheads to the processing center.

1,935 citations


Authors

Showing all 73693 results

NameH-indexPapersCitations
Yi Cui2201015199725
Yi Chen2174342293080
David Miller2032573204840
Hongjie Dai197570182579
Chris Sander178713233287
Richard A. Gibbs172889249708
Richard H. Friend1691182140032
Charles M. Lieber165521132811
Jian-Kang Zhu161550105551
David W. Johnson1602714140778
Robert Stone1601756167901
Tobin J. Marks1591621111604
Joseph Wang158128298799
Ed Diener153401186491
Wei Zheng1511929120209
Network Information
Related Institutions (5)
University of Illinois at Urbana–Champaign
225.1K papers, 10.1M citations

98% related

Pennsylvania State University
196.8K papers, 8.3M citations

96% related

University of Wisconsin-Madison
237.5K papers, 11.8M citations

94% related

University of Minnesota
257.9K papers, 11.9M citations

94% related

Cornell University
235.5K papers, 12.2M citations

94% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023194
2022834
20217,499
20207,699
20197,294
20186,840