Institution
University of Canterbury
Education•Christchurch, New Zealand•
About: University of Canterbury is a education organization based out in Christchurch, New Zealand. It is known for research contribution in the topics: Population & Large Hadron Collider. The organization has 11100 authors who have published 29846 publications receiving 893232 citations. The organization is also known as: Te Whare Wānanga o Waitaha & Canterbury College.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: It is proposed that large-scale patterns of variation in size and timing of metamorphosis represent adaptive phenotypic plasticity, whereby mayflies respond to variation in risk of predation, thereby maximizing their fitness in variable environments.
Abstract: Animals with complex life cycles often show large variation in the size and timing of metamorphosis in response to environmental variability. If fecundity increases with body size and large individuals are more vulnerable to predation, then organisms may not be able to optimize simultaneously size and timing of metamorphosis. The goals of this study were to measure and explain large-scale spatial and temporal patterns of phe- notypic variation in size at metamorphosis of the mayfly, Baetis bicaudatus (Baetidae), from habitats with variable levels of predation risk. Within a single high-elevation watershed in western Colorado, USA, from 1994 to 1996 we measured dry masses of mature larvae of the overwintering and summer generations of Baetis at 28 site-years in streams with and without predatory fish (trout). We also estimated larval growth rates and development times at 16 site-years. Patterns of spatial variation in mayfly size could not be explained by resource (algae) standing stock, competitor densities, or physical-chemical variables. However, size at metamorphosis of males and females of summer generation Baetis was smaller in fish streams than in fishless streams and decreased as densities of predatory stoneflies increased. Furthermore, overwintering individuals matured at larger sizes than summer generation Baetis, and the size of emerging Baetis declined over the summer, but predominantly in trout streams. Theoretical consideration of the effect of predation risk on size and timing of metamorphosis accurately predicted the observed temporal variation in size and timing of mayflies at emergence in fish and fishless streams. Baetis populations had similar growth rates but followed different developmental trajectories in high and low risk environments. In risky environments larval development was accelerated, resulting in metamorphosis of younger and smaller individuals, minimizing exposure of larvae to risk of mortality from trout predation, but at the cost of future reproduction. In safe environ- ments, larvae extended their development, resulting in larger, more fecund adults. Thus, we propose that large-scale patterns of variation in size and timing of metamorphosis represent adaptive phenotypic plasticity, whereby mayflies respond to variation in risk of predation, thereby maximizing their fitness in variable environments.
193 citations
••
S. Chatrchyan1, Vardan Khachatryan, Albert M. Sirunyan, Armen Tumasyan +2243 more•Institutions (174)
TL;DR: In this article, a measurement of the single-top-quark t-channel production cross section in pp collisions at s√=7 TeV with the CMS detector at the LHC is presented.
Abstract: A measurement of the single-top-quark t-channel production cross section in pp collisions at s√=7 TeV with the CMS detector at the LHC is presented. Two different and complementary approaches have been followed. The first approach exploits the distributions of the pseudorapidity of the recoil jet and reconstructed top-quark mass using background estimates determined from control samples in data. The second approach is based on multivariate analysis techniques that probe the compatibility of the candidate events with the signal. Data have been collected for the muon and electron final states, corresponding to integrated luminosities of 1.17 and 1.56 fb^(−1), respectively. The single-top-quark production cross section in the t-channel is measured to be 67.2±6.1 pb, in agreement with the approximate next-to-next-to-leading-order standard model prediction. Using the standard model electroweak couplings, the CKM matrix element |V_(tb)| is measured to be 1.020 ± 0.046 (meas.) ± 0.017 (theor.).
193 citations
••
TL;DR: This national study examines the relationship between travel time access to parks and beaches, BMI and physical activity in New Zealand neighbourhoods and found little evidence of an association between locational access to open spaces andPhysical activity.
193 citations
••
TL;DR: This paper argued that grammaticalization is derivative, that it has no independent status of its own, but rather relies on other processes and mechanisms of linguistic change which are independent of grammaticalisation but which provide the explanations for the phenomena involved in grammaticalizations.
193 citations
••
TL;DR: The security considerations and some associated methodologies by which security breaches can occur are explained, recommendations for how virtualized environments can best be protected are offered, and a set of generalized recommendations that can be applied to achieve secure virtualized implementations are offered.
Abstract: Although system virtualization is not a new paradigm, the way in which it is used in modern system architectures provides a powerful platform for system building, the advantages of which have only been realized in recent years, as a result of the rapid deployment of commodity hardware and software systems. In principle, virtualization involves the use of an encapsulating software layer (Hypervisor or Virtual Machine Monitor) which surrounds or underlies an operating system and provides the same inputs, outputs, and behavior that would be expected from an actual physical device. This abstraction means that an ideal Virtual Machine Monitor provides an environment to the software equivalent to the host system, but which is decoupled from the hardware state. Because a virtual machine is not dependent on the state of the physical hardware, multiple virtual machines may be installed on a single set of hardware. The decoupling of physical and logical states gives virtualization inherent security benefits. However, the design, implementation, and deployment of virtualization technology have also opened up novel threats and security issues which, while not particular to system virtualization, take on new forms in relation to it. Reverse engineering becomes easier due to introspection capabilities, as encryption keys, security algorithms, low-level protection, intrusion detection, or antidebugging measures can become more easily compromised. Furthermore, associated technologies such as virtual routing and networking can create challenging issues for security, intrusion control, and associated forensic processes. We explain the security considerations and some associated methodologies by which security breaches can occur, and offer recommendations for how virtualized environments can best be protected. Finally, we offer a set of generalized recommendations that can be applied to achieve secure virtualized implementations.
193 citations
Authors
Showing all 11248 results
Name | H-index | Papers | Citations |
---|---|---|---|
Carlo Rovelli | 146 | 1502 | 103550 |
Kenneth A. Dodge | 138 | 468 | 79640 |
John D. Potter | 137 | 795 | 75310 |
David A. Jackson | 136 | 1095 | 68352 |
Wajid Ali Khan | 128 | 1272 | 79308 |
David Krofcheck | 128 | 1043 | 77143 |
Hafeez R Hoorani | 128 | 1208 | 80646 |
Muhammad Ahmad | 128 | 1187 | 79758 |
David M. Fergusson | 127 | 474 | 55992 |
Philip H Butler | 125 | 970 | 71999 |
Paul Lujan | 123 | 1255 | 76799 |
W. Dominik | 122 | 669 | 64410 |
A. J. Bell | 119 | 498 | 55643 |
Cynthia M. Bulik | 107 | 714 | 41562 |
David A. Boas | 106 | 631 | 38003 |