The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It has been proven that if the solution exists to an inhomogeneous biharmonic equation in the plane where the values of the solution, the normal derivative of the solution, and the Laplacian of the solution are prescribed on the boundary, then the domain is a disk. This result has been extended to N-dimensions by the Serrin reflection method. Here we present a new proof and give a characterization...
In STOC'05, Aim, Hopper and Longford introduced the notion of covert computation. A covert computation protocol is one in which parties am run a protocol without knowing if other parties ore also participating in the protocol or not. At the end of the protocol, if all parties participated in the protocol and if the function output is favorable to all parties, then the output is revealed. Ahn et al...
The objective of context honeypot is to identify a probable privacy violator before he actually succeeds in capturing desired precious information. We believe that in the environment of robust implementation of privacy policy, privacy breaches can occur only through masquerading. Success of context honeypot depends on efficient luring (by using lure messages) of probable privacy violator. Lure messages...
As a response to serious privacy concerns, various approaches have been proposed on privacy policy driven databases. However it is very difficult to provide robust privacy implementation. Privacy violation can still take place with some masquerading. In such a scenario, it is important to detect the violation. A solution for privacy violation detection based on malafide intension has been proposed...
Non Disclosure Agreements(NDAs) in real life are typically used whenever there is transfer of private or confidential information from one organization to another. The provider organization can not have any control over privacy mechanisms of the receiving organization. The privacy policy work so far has addressed itself for preventing privacy violation within an organization. We aim to give an architecture...
The present investigations were conducted to ascertain the influence of Pb2+ and Cd2+ both individually and in combination on selected enzymes of tricarboxylic acid (TCA) cycle. All the enzymes of TCA cycle examined (α-ketoglutarate dehydrogenase, isocitrate dehydrogenase, succinate dehydrogenase, malate dehydrogenase) were affected deleteriously by Pb2+ as well as Cd2+ and these metals in combination...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.