![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter
Synthesis of Silver and Copper Nanowires and Their Application for Transparent Conductors
Silver and copper nanowires have been used in many areas, like sensors, catalysis, optoelectronics, etc. They are well-known by the excellent optoelectronic and chemical properties. Here in this chapter, some ...
-
Article
A facile interface engineering method to improve the performance of FTO/ZnO/CsPbI3−xBrx (x < 1)/C solar cells
Hole-transport-layer (HTL)-free, carbon-based all-inorganic perovskite solar cells (PSCs) are attracting a great interest owing to a low cost and an advanced stability in ambient environment. However, the phot...
-
Article
Open AccessAltered expression of the DISC1 gene in peripheral blood of patients with schizophrenia
Schizophrenia is a severe, heritable, and refractory psychiatric disorder. Several studies have shown that the disrupted in schizophrenia 1 (DISC1) gene is closely associated with schizophrenia by its role in neu...
-
Article
Open AccessTemplated growth of oriented layered hybrid perovskites on 3D-like perovskites
The manipulation of crystal orientation from the thermodynamic equilibrium states is desired in layered hybrid perovskite films to direct charge transport and enhance the perovskite devices performance. Here w...
-
Article
Symbolic algorithmic verification of intransitive generalized noninterference
Generalized noninterference can be used to formulate transitive security policies, but is unsuitable for intransitive security policies. We propose a new information flow security property, which we call intra...
-
Article
Abstraction for model checking multi-agent systems
Model checking multi-agent systems (MAS) always suffers from the state explosion problem. In this paper we focus on an abstraction technique which is one of the major methods for overcoming this problem. For a...
-
Chapter and Conference Paper
Information Flow Graph: An Approach to Identifying Covert Storage Channels
The paper introduces a technique for detecting covert storage channels using a graph structure called an Information Flow Graph (IFG). The IFG can offer the information flows of the system for covert channel d...
-
Chapter and Conference Paper
Abstraction for Model Checking the Probabilistic Temporal Logic of Knowledge
Probabilistic temporal logics of knowledge have been used to specify multi-agent systems. In this paper, we introduce a probabilistic temporal logic of knowledge called PTLK for expressing time, knowledge, and...
-
Chapter and Conference Paper
QBF-Based Symbolic Model Checking for Knowledge and Time
For temporal and epistemic property CTLK we propose a new symbolic model checking technique based on Quantified Boolean Formula(QBF). The verification approach is based on an adaption of the technique of bound...
-
Chapter and Conference Paper
Improved SAT Based Bounded Model Checking
The usefulness of Bounded Model Checking(BMC) based on propositional satisfiability methods has recently proven its efficacy for bug hunting. The basic idea is to search for a counterexample in executions whos...