scispace - formally typeset
Search or ask a question
Institution

Technion – Israel Institute of Technology

EducationHaifa, Israel
About: Technion – Israel Institute of Technology is a education organization based out in Haifa, Israel. It is known for research contribution in the topics: Population & Upper and lower bounds. The organization has 31714 authors who have published 79377 publications receiving 2603976 citations. The organization is also known as: Technion Israel Institute of Technology & Ṭekhniyon, Makhon ṭekhnologi le-Yiśraʼel.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper overviews several selected topics in this popular area, specifically, recent extensions of the basic concept of robust counterpart of an optimization problem with uncertain data, tractability of robust counterparts, links between RO and traditional chance constrained settings of problems with stochastic data, and a novel generic application of the RO methodology in Robust Linear Control.
Abstract: Robust Optimization is a rapidly developing methodology for handling optimization problems affected by non-stochastic “uncertain-but- bounded” data perturbations. In this paper, we overview several selected topics in this popular area, specifically, (1) recent extensions of the basic concept of robust counterpart of an optimization problem with uncertain data, (2) tractability of robust counterparts, (3) links between RO and traditional chance constrained settings of problems with stochastic data, and (4) a novel generic application of the RO methodology in Robust Linear Control.

339 citations

Journal ArticleDOI
TL;DR: This work presents and analyze several simple password authentication protocols, and shows optimal resistance to off-line password guessing attacks under the choice of suitable public key encryption functions, and introduces the notion of public passwords that enables the use of the above protocols in situations where the client's machine does not have the means to validate the server's public key.
Abstract: We study protocols for strong authentication and key exchange in asymmetric scenarios where the authentication server possesses ~a pair of private and public keys while the client has only a weak human-memorizable password as its authentication key. We present and analyze several simple password authentication protocols in this scenario, and show that the security of these protocols can be formally proven based on standard cryptographic assumptions. Remarkably, our analysis shows optimal resistance to off-line password guessing attacks under the choice of suitable public key encryption functions. In addition to user authentication, we describe ways to enhance these protocols to provide two-way authentication, authenticated key exchange, defense against server's compromise, and user anonymity. We complement these results with a proof that strongly indicates that public key techniques are unavoidable for password protocols that resist off-line guessing attacks.As a further contribution, we introduce the notion of public passwords that enables the use of the above protocols in situations where the client's machine does not have the means to validate the server's public key. Public passwords serve as "hand-held certificates" that the user can carry without the need for specal computing devices.

338 citations

Journal ArticleDOI
TL;DR: Spiral phase elements with topological charges based on space-variant Pancharatnam-Berry phase optical elements are presented and spiral geometrical phases for infrared radiation at a wavelength of 10.6microm are demonstrated.
Abstract: Spiral phase elements with topological charges based on space-variant Pancharatnam-Berry phase optical elements are presented Such elements can be achieved by use of continuous computer-generated space-variant subwavelength dielectric gratings We present a theoretical analysis and experimentally demonstrate spiral geometrical phases for infrared radiation at a wavelength of 106microm

338 citations

Journal ArticleDOI
TL;DR: The results point to excitatory drive from the hippocampus, and possibly other regions, as one prerequisite for the formation and translocation of grid patterns in the MEC.
Abstract: Previous evidence has suggested that hippocampal place fields in rodents arise from the summation of input from entorhinal grid cells. Here the authors show that perturbing excitatory backprojections from the hippocampus to the entorhinal cortex causes a gradual firing rate–dependent loss of grid pattern and an emergence of head-directional tuning in grid cells of the medial entorhinal cortex.

338 citations


Authors

Showing all 31937 results

NameH-indexPapersCitations
Robert Langer2812324326306
Nicholas G. Martin1921770161952
Tobin J. Marks1591621111604
Grant W. Montgomery157926108118
David Eisenberg156697112460
David J. Mooney15669594172
Dirk Inzé14964774468
Jerrold M. Olefsky14359577356
Joseph J.Y. Sung142124092035
Deborah Estrin135562106177
Bruce Yabsley133119184889
Jerry W. Shay13363974774
Richard N. Bergman13047791718
Shlomit Tarem129130686919
Allen Mincer129104080059
Network Information
Related Institutions (5)
Imperial College London
209.1K papers, 9.3M citations

93% related

Massachusetts Institute of Technology
268K papers, 18.2M citations

92% related

University of Illinois at Urbana–Champaign
225.1K papers, 10.1M citations

92% related

Stanford University
320.3K papers, 21.8M citations

92% related

University of Toronto
294.9K papers, 13.5M citations

92% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023147
2022390
20213,397
20203,526
20193,273
20183,131