skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Cumulene Wires Display Increasing Conductance with Increasing Length
Award ID(s):
1764256 1807580
PAR ID:
10233075
Author(s) / Creator(s):
; ; ; ; ; ; ;
Date Published:
Journal Name:
Nano Letters
Volume:
20
Issue:
11
ISSN:
1530-6984
Page Range / eLocation ID:
8415 to 8419
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    Two popular optimal search-based solvers for the multi-agent pathfinding (MAPF) problem, Conflict-Based Search (CBS) and Increasing Cost Tree Search (ICTS), have been extended separately for continuous time domains and symmetry breaking. However, an approach to symmetry breaking in continuous time domains remained elusive. In this work, we introduce a new algorithm, Conflict-Based Increasing Cost Search (CBICS), which is capable of symmetry breaking in continuous time domains by combining the strengths of CBS and ICTS. Our experiments show that CBICS often finds solutions faster than CBS and ICTS in both unit time and continuous time domains. 
    more » « less
  2. null (Ed.)
    Timely evacuation is a standard recommendation by local agencies before disaster events such as hurricanes, which have enough advance notice. However, it has been observed in many recent disasters (e.g., Sandy), that only a small fraction of the population evacuates in time. Recent work by social scientists has examined the factors that influence household evacuation decisions; in addition to individual factors it has been found that peer effect plays a role in this decision but in two opposing ways. Specifically, households are motivated to evacuate if their neighbors evacuate. However, if too many neighbors leave then some households have concerns of looting and crime, and they choose not to evacuate. This makes the dynamics of evacuation very complex. In this paper, we use a detailed agent based model to study the dynamics of evacuation in Virginia’s coastal region. We use data from a large survey and social contagion and collective action theories to develop the model. We evaluate different strategies to increase evacuation. 
    more » « less
  3. null (Ed.)
    We are creating a streamlined way to adapt WebIDs [1], and biometrics [2] to the cyber world. This involves building a user authentication system that enables quick, fast and secure access. It is understood that compared to traditional username and password user authentication, WebIDs are designed to provide such services. Nevertheless, if an intruder either has direct access to the user's computer or somehow gets the unique certificate of the user, important information can be stolen with solely the use of WebIDs. Since biometric data (e.g. fingerprints, iris scanning, etc.) is unique and not easily duplicated, this possibility can be avoided by including biometrics in the authentication process. We also include an enrollment protocol that checks whether a user has a WebID while trying to access a server. If they do, we allow the user access to the server, and if they do not, by accessing their own server, we register the user for a WebID with their permission. Implementing these features in the WebID protocol will greatly enhance user authentication safety. 
    more » « less