Learn More
Canola (Brassica napus L.) is one of the most important oil-producing crops in China and worldwide. The yield and quality of canola is frequently threatened by environmental stresses including drought, cold and high salinity. Calcium is a well-known ubiquitous intracellular secondary messenger in plants. Calcium-dependent protein kinases (CPKs) are Ser/Thr(More)
This paper introduced a process to prepare the carbon nanosphere (CNS)/NiCo2O4 core-shell sub-microspheres. That is: 1) CNSs were firstly prepared via a simple hydrothermal method; 2) a layer of NiCo2O4 precursor was coated on the CNS surface; 3) finally the composite was annealed at 350 °C for 2 hours in the air, and the CNS/NiCo2O4 core-shell(More)
In the setting of streaming verifiable computation, a verifier and a prover observe a stream of n elements <i>x</i><sub>1</sub>; <i>x</i><sub>2</sub>; : : : ; <i>x<sub>n</sub></i> and later, the verifier can delegate a computation (e.g., a range search query) to the untrusted prover over the stream. The prover returns the result of the computation and a(More)
Recent clinical studies have demonstrated that auditory cortex electrical stimulation (ACES) has yielded promising results in the suppression of patients' tinnitus. However, the large variability in the efficacy of ACES-induced suppression across individuals has hindered its development into a reliable therapy. Due to ethical reasons, many issues cannot be(More)
[Purpose] The purpose of this study was to investigate whether early hyperbaric oxygen is useful in rats with permanent cerebral ischemia, and whether its mechanism relates to the inhibition of the tumor necrosis factor-alpha-protein kinase C-alpha pathway. [Subjects] Healthy, male Sprague-Dawley rats (N = 108) were the subjects. [Methods] After middle(More)
BodyAvatar is a Kinect-based interactive system that allows users without professional skills to create freeform 3D avatars using body gestures. Unlike existing gesture-based 3D modeling tools, BodyAvatar centers around a first-person "you're the avatar" metaphor, where the user treats their own body as a physical proxy of the virtual avatar. Based on an(More)
We consider a scenario in which a data owner outsources storage of a large graph to an untrusted server; the server performs computations on this graph in response to queries from a client (whether the data owner or others), and the goal is to ensure verifiability of the returned results. Existing work on verifiable computation (VC) would compile each graph(More)
This paper presents IntegriDB, a system allowing a data owner to outsource storage of a database to an untrusted server, and then enable anyone to perform verifiable SQL queries over that database. Our system handles a rich subset of SQL queries, including multidimensional range queries, JOIN, SUM, MAX/MIN, COUNT, and AVG, as well as (limited) nestings of(More)
The goal of searchable encryption (SE) is to enable a client to execute searches over encrypted files stored on an untrusted server while ensuring some measure of privacy for both the encrypted files and the search queries. Research has focused on developing efficient SE schemes at the expense of allowing some small, well-characterized " (information)(More)