scispace - formally typeset
Search or ask a question
Institution

University of Houston

EducationHouston, Texas, United States
About: University of Houston is a education organization based out in Houston, Texas, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 23074 authors who have published 53903 publications receiving 1641968 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Overall, sex, gender and hormones play a major role in the regulation of ocular surface and adnexal tissues, and in the difference in DED prevalence between women and men.
Abstract: One of the most compelling features of dry eye disease (DED) is that it occurs more frequently in women than men. In fact, the female sex is a significant risk factor for the development of DED. This sex-related difference in DED prevalence is attributed in large part to the effects of sex steroids (e.g. androgens, estrogens), hypothalamic-pituitary hormones, glucocorticoids, insulin, insulin-like growth factor 1 and thyroid hormones, as well as to the sex chromosome complement, sex-specific autosomal factors and epigenetics (e.g. microRNAs). In addition to sex, gender also appears to be a risk factor for DED. "Gender" and "sex" are words that are often used interchangeably, but they have distinct meanings. "Gender" refers to a person's self-representation as a man or woman, whereas "sex" distinguishes males and females based on their biological characteristics. Both gender and sex affect DED risk, presentation of the disease, immune responses, pain, care-seeking behaviors, service utilization, and myriad other facets of eye health. Overall, sex, gender and hormones play a major role in the regulation of ocular surface and adnexal tissues, and in the difference in DED prevalence between women and men. The purpose of this Subcommittee report is to review and critique the nature of this role, as well as to recommend areas for future research to advance our understanding of the interrelationships between sex, gender, hormones and DED.

260 citations

Journal ArticleDOI
TL;DR: A dual space-size analysis is presented that can account for these bisection thresholds over a wide range of experimental conditions and shows that the limiting factors in spatial hyperacuity are both the contrast-response function and the spatial grain.
Abstract: Bisection thresholds were measured as a function of the separation of the lines. For separations of less than 1.5 min, the addition of flanking lines facilitates bisection so that thresholds of less than 1 sec for discriminating the direction of offset could be reliably obtained. For larger separations an interval could be bisected to an accuracy of 1 part in 60. Experiments varying the length, luminance, and overlap of the lines suggest that different cues are used in these two regimes. A dual space-size analysis is presented that can account for these bisection thresholds over a wide range of experimental conditions. This quantitative analysis produces viewprints of the stimuli (analogous to the voiceprint of audition). Each viewprint shows the output of many spatial filters of different positions and sizes. A new filter shape is introduced that has advantages for modeling the visual system. The sensitivity of each filter is fixed by the contrast-response function. The analysis further shows that the limiting factors in spatial hyperacuity are both the contrast-response function and the spatial grain.

260 citations

Book ChapterDOI
Lin Chen1, Lei Xu1, Nolan Shah1, Zhimin Gao1, Yang Lu1, Weidong Shi1 
05 Nov 2017
TL;DR: A theoretical framework for evaluating a PoET based blockchain system is developed, and it is shown that the current design is vulnerable in the sense that adversary can jeopardize the blockchain system by only compromising \(\varTheta (\log \log n/\log n)\) fraction of the participating nodes.
Abstract: As more applications are built on top of blockchain and public ledger, different approaches are developed to improve the performance of blockchain construction. Recently Intel proposed a new concept of proof-of-elapsed-time (PoET), which leverages trusted computing to enforce random waiting times for block construction. However, trusted computing component may not be perfect and 100% reliable. It is not clear, to what extent, blockchain systems based on PoET can tolerate failures of trusted computing component. The current design of PoET lacks rigorous security analysis and a theoretical foundation for assessing its strength against such attacks. To fulfill this gap, we develop a theoretical framework for evaluating a PoET based blockchain system, and show that the current design is vulnerable in the sense that adversary can jeopardize the blockchain system by only compromising \(\varTheta (\log \log n/\log n)\) fraction of the participating nodes, which is very small when n is relatively large. Based on our theoretical analysis, we also propose methods to mitigate these vulnerabilities.

259 citations

Book ChapterDOI
14 May 2012
TL;DR: It is shown that there are several popular "artifact - evaluation method" combinations in the literature and these combinations inform DS researchers of usual and customary combinations of research artifacts and evaluation methods, potentially providing them with rationale and justification for an evaluation method selection.
Abstract: The consensus view is that the rigorous evaluation of design science (DS) artifacts is essential. There are many types of DS artifacts and many forms of evaluation; what is missing is guidance for how to perform the evaluation, more specifically, what evaluation methods to use with specific DS research outputs. Here we find and review 148 DS research articles published in a selected set of information systems (IS), computer science (CS) and engineering journals. We analyze the articles to develop taxonomies of DS artifact types and artifact evaluation methods; we apply these taxonomies to determine which evaluation methods are associated in the literature with particular artifacts. We show that there are several popular "artifact - evaluation method" combinations in the literature. The results inform DS researchers of usual and customary combinations of research artifacts and evaluation methods, potentially providing them with rationale and justification for an evaluation method selection.

259 citations

Journal ArticleDOI
TL;DR: This article reviewed issues and questions concerning punishment, reviewed existing research to delimit variables that influence the effectiveness of punishment, and discussed research issues associated with the study of punishment in organizational contexts.
Abstract: The topic of punishment has received essentially no attention from organizational researchers. Our purpose in this paper is to review issues and questions concerning punishment, to review existing research to delimit variables that influence the effectiveness of punishment, and to discuss research issues associated with the study of punishment in organizational contexts.

259 citations


Authors

Showing all 23345 results

NameH-indexPapersCitations
Matthew Meyerson194553243726
Gad Getz189520247560
Eric Boerwinkle1831321170971
Pulickel M. Ajayan1761223136241
Zhenan Bao169865106571
Marc Weber1672716153502
Steven N. Blair165879132929
Martin Karplus163831138492
Dongyuan Zhao160872106451
Xiang Zhang1541733117576
Jan-Åke Gustafsson147105898804
James M. Tour14385991364
Guanrong Chen141165292218
Naomi J. Halas14043582040
Antonios G. Mikos13869470204
Network Information
Related Institutions (5)
University of Texas at Austin
206.2K papers, 9M citations

95% related

University of Southern California
169.9K papers, 7.8M citations

94% related

Texas A&M University
164.3K papers, 5.7M citations

93% related

Pennsylvania State University
196.8K papers, 8.3M citations

93% related

University of California, Irvine
113.6K papers, 5.5M citations

92% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023111
2022440
20213,031
20203,072
20192,806
20182,568