Institution
Technion – Israel Institute of Technology
Education•Haifa, Israel•
About: Technion – Israel Institute of Technology is a education organization based out in Haifa, Israel. It is known for research contribution in the topics: Population & Nonlinear system. The organization has 31714 authors who have published 79377 publications receiving 2603976 citations. The organization is also known as: Technion Israel Institute of Technology & Ṭekhniyon, Makhon ṭekhnologi le-Yiśraʼel.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: Three self-stabilizing protocols for distributed systems in the shared memory model are presented, one of which is a mutual-exclusion prootocol for tree structured systems and the other two are a spanning tree protocol for systems with any connected communication graph.
Abstract: Three self-stabilizing protocols for distributed systems in the shared memory model are presented The first protocol is a mutual-exclusion protocol for tree structured systems The second protocol is a spanning tree protocol for systems with any connected communication graph The third protocol is obtained by use of fair protocol combination, a simple technique which enables the combination of two self-stabilizing dynamic protocols The result protocol is a self-stabilizing, mutual-exclusion protocol for dynamic systems with a general (connected) communication graph The presented protocols improve upon previous protocols in two ways: First, it is assumed that the only atomic operations are either read or write to the shared memory Second, our protocols work for any connected network and even for dynamic networks, in which the topology of the network may change during the execution
353 citations
••
TL;DR: These results suggest that on the basis of sleep complaints as early as 1 month after the trauma, it is possible to detect subjects who will later develop chronic PTSD.
Abstract: OBJECTIVE: Disturbed sleep is a common complaint among patients with posttraumatic stress disorder (PTSD) that appears in the reexperiencing and hyperarousal symptom clusters in DSM-IV. The causal relationship between sleep complaints and PTSD is unclear. METHOD: Self-reported insomnia and excessive daytime sleepiness were assessed in 102 victims of motor vehicle accidents and 19 comparison subjects 1 week and 1, 3, 6, and 12 months after the trauma. At 12 months the Structured Clinical Interview for DSM-III-R was administered to determine diagnoses of PTSD. RESULTS: Twenty-six of the accident victims but none of the comparison subjects met the criteria for PTSD. Logistic regression models indicated that sleep complaints from 1 month on were significant in predicting PTSD at 1 year. CONCLUSIONS: These results suggest that on the basis of sleep complaints as early as 1 month after the trauma, it is possible to detect subjects who will later develop chronic PTSD.
352 citations
••
TL;DR: The inhibitory effects of apremilast on pro‐inflammatory responses of human primary peripheral blood mononuclear cells, polymorphonuclear Cells, natural killer cells and epidermal keratinocytes were explored in vitro, and in a preclinical model of psoriasis.
Abstract: Background and purpose:
Apremilast is an orally administered phosphodiesterase-4 inhibitor, currently in phase 2 clinical studies of psoriasis and other chronic inflammatory diseases. The inhibitory effects of apremilast on pro-inflammatory responses of human primary peripheral blood mononuclear cells (PBMC), polymorphonuclear cells, natural killer (NK) cells and epidermal keratinocytes were explored in vitro, and in a preclinical model of psoriasis.
352 citations
••
01 Sep 2008TL;DR: It is demonstrated that compressed sensing-based encryption does not achieve Shannon's definition of perfect secrecy, but can provide a computational guarantee of secrecy.
Abstract: Results in compressed sensing describe the feasibility of reconstructing sparse signals using a small number of linear measurements. In addition to compressing the signal, do these measurements provide secrecy? This paper considers secrecy in the context of an adversary that does not know the measurement matrix used to encrypt the signal. We demonstrate that compressed sensing-based encryption does not achieve Shannon's definition of perfect secrecy, but can provide a computational guarantee of secrecy.
351 citations
••
TL;DR: The first observation of conical diffraction arising from k-space singularities in the band-structure of a periodic potential is predicted and presented.
Abstract: We study wave dynamics in honeycomb photonic lattices, and demonstrate the unique phenomenon of conical diffraction around the singular diabolical (zero-effective-mass) points connecting the first and second bands. This constitutes the prediction and first experimental observation of conical diffraction arising solely from a periodic potential. It is also the first study on k space singularities in photonic lattices. In addition, we demonstrate "honeycomb gap solitons" residing in the gap between the second and the third bands, reflecting the special properties of these lattices.
351 citations
Authors
Showing all 31937 results
Name | H-index | Papers | Citations |
---|---|---|---|
Robert Langer | 281 | 2324 | 326306 |
Nicholas G. Martin | 192 | 1770 | 161952 |
Tobin J. Marks | 159 | 1621 | 111604 |
Grant W. Montgomery | 157 | 926 | 108118 |
David Eisenberg | 156 | 697 | 112460 |
David J. Mooney | 156 | 695 | 94172 |
Dirk Inzé | 149 | 647 | 74468 |
Jerrold M. Olefsky | 143 | 595 | 77356 |
Joseph J.Y. Sung | 142 | 1240 | 92035 |
Deborah Estrin | 135 | 562 | 106177 |
Bruce Yabsley | 133 | 1191 | 84889 |
Jerry W. Shay | 133 | 639 | 74774 |
Richard N. Bergman | 130 | 477 | 91718 |
Shlomit Tarem | 129 | 1306 | 86919 |
Allen Mincer | 129 | 1040 | 80059 |