scispace - formally typeset
Search or ask a question
Institution

Worcester Polytechnic Institute

EducationWorcester, Massachusetts, United States
About: Worcester Polytechnic Institute is a education organization based out in Worcester, Massachusetts, United States. It is known for research contribution in the topics: Population & Data envelopment analysis. The organization has 6270 authors who have published 12704 publications receiving 332081 citations. The organization is also known as: WPI.


Papers
More filters
Journal ArticleDOI
TL;DR: This critical review details the studies completed to date on the 3 main classes of azobenzene derivatives and explains the mechanism behind the isomerization mechanism.
Abstract: Azobenzene undergoes trans → cisisomerization when irradiated with light tuned to an appropriate wavelength. The reverse cis →transisomerization can be driven by light or occurs thermally in the dark. Azobenzene's photochromatic properties make it an ideal component of numerous molecular devices and functional materials. Despite the abundance of application-driven research, azobenzene photochemistry and the isomerization mechanism remain topics of investigation. Additional substituents on the azobenzene ring system change the spectroscopic properties and isomerization mechanism. This critical review details the studies completed to date on the 3 main classes of azobenzene derivatives. Understanding the differences in photochemistry, which originate from substitution, is imperative in exploiting azobenzene in the desired applications.

2,062 citations

Journal ArticleDOI
TL;DR: In this paper, a front-tracking method for multiphase flows is presented, which is based on writing one set of governing equations for the whole computational domain and treating the different phases as one fluid with variable material properties.

2,011 citations

Proceedings ArticleDOI
14 Mar 2010
TL;DR: This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.
Abstract: Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensitive user data confidential against untrusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. However, in doing so, these solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine-grained data access control is desired, and thus do not scale well. The problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control actually still remains unresolved. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine-grained data access control to untrusted cloud servers without disclosing the underlying data contents. We achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re-encryption. Our proposed scheme also has salient properties of user access privilege confidentiality and user secret key accountability. Extensive analysis shows that our proposed scheme is highly efficient and provably secure under existing security models.

1,903 citations

Journal ArticleDOI
TL;DR: This paper critically examines how blockchains, a potentially disruptive technology that is early in its evolution, can overcome many potential barriers and proposes future research propositions and directions that can provide insights into overcoming barriers and adoption of blockchain technology for supply chain management.
Abstract: Globalisation of supply chains makes their management and control more difficult. Blockchain technology, as a distributed digital ledger technology which ensures transparency, traceability, and sec...

1,637 citations

Journal ArticleDOI
TL;DR: The authors' integrated IT utilization model is an extension of TAM to include TTF constructs and provides more explanatory power than either model alone, which should lead to a better understanding of choices about using IT.

1,607 citations


Authors

Showing all 6336 results

NameH-indexPapersCitations
Andrew G. Clark140823123333
Ming Li103166962672
Joseph Sarkis10148245116
Arthur C. Graesser9561438549
Kevin J. Harrington8568233625
Kui Ren8350132490
Bart Preneel8284425572
Ming-Hui Chen8252529184
Yuguang Fang7957220715
Wenjing Lou7731129405
Bernard Lown7333020320
Joe Zhu7223119017
Y.S. Lin7130416100
Kevin Talbot7126815669
Christof Paar6939921790
Network Information
Related Institutions (5)
Georgia Institute of Technology
119K papers, 4.6M citations

94% related

Carnegie Mellon University
104.3K papers, 5.9M citations

93% related

Massachusetts Institute of Technology
268K papers, 18.2M citations

91% related

University of Illinois at Urbana–Champaign
225.1K papers, 10.1M citations

91% related

Purdue University
163.5K papers, 5.7M citations

91% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202326
202295
2021762
2020836
2019761
2018703