Search
Results
-
Geiger-Mode Avalanche Photodiodes as Photodetectors in Cherenkov Astronomy
(2008)Proceedings of the 31st International Cosmic Ray Conference, Łódź (Poland), July 7 - 15, 2009 : invited, rapporteur & highlight papersConference Paper -
Dynamical heterogeneities: from glasses to gels
(2008)Journal of Physics: Condensed MatterConference Paper -
μSR studies of CePd2In at low temperatures
(2008)Journal of Physics and Chemistry of SolidsLow-temperature properties of the heavy-fermion antiferromagnet CePd2In were investigated by muon-spin relaxation in zero external magnetic field (ZF- ). The time spectra below 1.2 K reveal the muon-spin oscillation characteristic of a magnetically ordered state with very small ordered Ce moments. Based on our data we discuss possible magnetic structures and compare them with the previous suggestions.Conference Paper -
Rheological properties of magma from the 1538 eruption of Monte Nuovo (Phlegrean Fields, Italy): An experimental study
(2008)Chemical GeologyThe rheology of natural, partially crystallized samples from Monte Nuovo (1538 AD) eruption have been investigated using a high temperature, high pressure internally heated pressure vessel. Within the temperature interval of investigation the samples exhibited Newtonian rheology at deformation strain rates up to 10− 4 s− 1. At higher strain rates a decrease of viscosity with increasing strain rate (shear thinning), eventually terminating ...Conference Paper -
Reactions of zinc-free anti-wear additives in DLC/DLC and steel/steel contacts
(2008)Tribology InternationalConference Paper -
Size and boundary effects on desiccation cracking in hardened cement paste
(2008)International Journal of FractureConference Paper -
Unbounded Verification, Falsification, and Characterization of Security Protocols by Pattern Refinement
(2008)Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS '08)We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a number of novel features, including: (1) Guaranteed termination, after which the result is either unbounded correctness, falsification, or bounded correctness. (2) Efficient generation of a finite representation of an infinite set of traces in terms of patterns, also ...Conference Paper -
-
A Class of Probabilistic Models for Role Engineering
(2008)Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS '08)Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically infer appropriate roles from existing user-permission assignments. However, these approaches are mainly combinatorial and lack an underlying probabilistic model of the domain. We present the first probabilistic model for RBAC. Our model defines a general framework ...Conference Paper -
Runoff modelling of the glacierized Alpine Upper Salzach basin (Austria)
(2008)Hydrological ProcessesConference Paper