Web Process Dynamic Stepped Extension: Pi-Calculus-Based Model and Inference Experiments

Author(s):  
Li Zhang ◽  
Zhiwei Yu
Keyword(s):  
1992 ◽  
Vol 35 (4) ◽  
pp. 892-902 ◽  
Author(s):  
Robert Allen Fox ◽  
Lida G. Wall ◽  
Jeanne Gokcen

This study examined age-related differences in the use of dynamic acoustic information (in the form of formant transitions) to identify vowel quality in CVCs. Two versions of 61 naturally produced, commonly occurring, monosyllabic English words were created: a control version (the unmodified whole word) and a silent-center version (in which approximately 62% of the medial vowel was replaced by silence). A group of normal-hearing young adults (19–25 years old) and older adults (61–75 years old) identified these tokens. The older subjects were found to be significantly worse than the younger subjects at identifying the medial vowel and the initial and final consonants in the silent-center condition. These results support the hypothesis of an age-related decrement in the ability to process dynamic perceptual cues in the perception of vowel quality.


Author(s):  
Matthew Hennessy
Keyword(s):  

2014 ◽  
Vol 36 (6) ◽  
pp. 1261-1266
Author(s):  
Xiang-Ning LI ◽  
Ke-Gang HAO ◽  
Xiao-Qun GUO
Keyword(s):  

Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2011 ◽  
Vol 228-229 ◽  
pp. 822-827
Author(s):  
Jia Yuan Luo ◽  
Rong Fan ◽  
Cheng Xiang Shi

Since the aluminum alloy quenching is a complicated and a prompt heat-pressure coupling processing, traditional experimental tests and empirical judgments cannot explain and predict the physical and the force behavior completely during the quenching process. Dynamic simulation of the quenching process is conducted using the finite analysis method. Development laws of the stress and the strain field of the surface layer and core of the alloy during the quenching process are described based on the verification of the simulation. States and process history of the stress and the strain in each phase during the quench are obtained, which provides ponderable data and theoretical value for a fully understanding of the aluminum alloy quenching.


Author(s):  
Caimei Wang ◽  
Yan Xiong ◽  
Wenchao Huang ◽  
Huihua Xia ◽  
Jianmeng Huang

Sign in / Sign up

Export Citation Format

Share Document