5 resultados para Eugene, of Savoy, Prince of Savoy, 1663-1736.

em Boston University Digital Common


Relevância:

60.00% 60.00%

Publicador:

Resumo:

http://www.archive.org/details/thestoryofthefuh00stocuoft

Relevância:

50.00% 50.00%

Publicador:

Resumo:

http://www.archive.org/details/anheroicbishopli00stocuoft

Relevância:

50.00% 50.00%

Publicador:

Resumo:

http://www.archive.org/details/diaryofdavid01zeisrich http://www.archive.org/details/diaryofdavid02zeisrich

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Using Monte Carlo simulations we study a coarse­grained model of a water layer confined in a fixed disordered matrix of hydrophobic nanoparticles at different particle concentrations c. For c = 0 we find a 1st order liquid­liquid phase transition (LLPT) ending in one critical point at low pressure P. For c > 0 our simulations are consistent with a LLPT line ending in two critical points at low and high pressure. For c = 25% at high P and low temperature T we find a dramatic decrease of compressibility, thermal expansion coefficient, and specific heat. Surprisingly, the effect is present also for c as low as 2.4%. We conclude that even a small presence of nanoscopic hydrophobes can drastically suppress thermodynamic fluctuations, making the detection of the LLPT more difficult.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

As new multi-party edge services are deployed on the Internet, application-layer protocols with complex communication models and event dependencies are increasingly being specified and adopted. To ensure that such protocols (and compositions thereof with existing protocols) do not result in undesirable behaviors (e.g., livelocks) there needs to be a methodology for the automated checking of the "safety" of these protocols. In this paper, we present ingredients of such a methodology. Specifically, we show how SPIN, a tool from the formal systems verification community, can be used to quickly identify problematic behaviors of application-layer protocols with non-trivial communication models—such as HTTP with the addition of the "100 Continue" mechanism. As a case study, we examine several versions of the specification for the Continue mechanism; our experiments mechanically uncovered multi-version interoperability problems, including some which motivated revisions of HTTP/1.1 and some which persist even with the current version of the protocol. One such problem resembles a classic degradation-of-service attack, but can arise between well-meaning peers. We also discuss how the methods we employ can be used to make explicit the requirements for hardening a protocol's implementation against potentially malicious peers, and for verifying an implementation's interoperability with the full range of allowable peer behaviors.