Implementing fault-tolerant services using the state machine approach: A tutorial
FB Schneider - ACM Computing Surveys (CSUR), 1990 - dl.acm.org
… MACHINES permits other components to detect that A t fault-tolerant version of a state
machine a failure has occurred and then stops can be implemented by replicating that [Schneider …
machine a failure has occurred and then stops can be implemented by replicating that [Schneider …
Cytoarchitectonic mapping of the human amygdala, hippocampal region and entorhinal cortex: intersubject variability and probability maps
Probabilistic maps of neocortical areas and subcortical fiber tracts, warped to a common
reference brain, have been published using microscopic architectonic parcellations in ten …
reference brain, have been published using microscopic architectonic parcellations in ten …
Crisis or opportunity? Economic degrowth for social equity and ecological sustainability. Introduction to this special issue
F Schneider, G Kallis, J Martinez-Alier - Journal of cleaner production, 2010 - Elsevier
This article reviews the burgeoning emerging literature on sustainable degrowth. This is
defined as an equitable downscaling of production and consumption that increases human well-…
defined as an equitable downscaling of production and consumption that increases human well-…
Regime of improved confinement and high beta in neutral-beam-heated divertor discharges of the ASDEX tokamak
…, W Poschenrieder, H Rapp, H Röhr, F Schneider… - Physical Review Letters, 1982 - APS
A new operational regime has been observed in neutral-injection-heated ASDEX divertor
discharges. This regime is characterized by high β p values comparable to the aspect ratio A (…
discharges. This regime is characterized by high β p values comparable to the aspect ratio A (…
[HTML][HTML] High risk of thrombosis in patients with severe SARS-CoV-2 infection: a multicenter prospective cohort study
…, S Fafi-Kremer, V Castelain, F Schneider… - Intensive care …, 2020 - Springer
Purpose Little evidence of increased thrombotic risk is available in COVID-19 patients. Our
purpose was to assess thrombotic risk in severe forms of SARS-CoV-2 infection. Methods All …
purpose was to assess thrombotic risk in severe forms of SARS-CoV-2 infection. Methods All …
Shadow economies: Size, causes, and consequences
F Schneider, DH Enste - Journal of economic literature, 2000 - aeaweb.org
… Schneider and Neck show in their theoretical model that a more … Schneider and Neck
empirically analyze the effects of … The explanation offered by Schneider and Neck was that not …
empirically analyze the effects of … The explanation offered by Schneider and Neck was that not …
Binary interaction dominates the evolution of massive stars
… We find an intrinsic binary fraction of f bin = 0.69 ± 0.09, a strong preference for close pairs
(π = –0.55 ± 0.2), and a uniform distribution of the mass ratio (κ = –0.1 ± 0.6) for binaries with …
(π = –0.55 ± 0.2), and a uniform distribution of the mass ratio (κ = –0.1 ± 0.6) for binaries with …
Neocortical excitation/inhibition balance in information processing and social dysfunction
Severe behavioural deficits in psychiatric diseases such as autism and schizophrenia have
been hypothesized to arise from elevations in the cellular balance of excitation and inhibition …
been hypothesized to arise from elevations in the cellular balance of excitation and inhibition …
Shadow economies all over the world: New estimates for 162 countries from 1999 to 2007
F Schneider, A Buehn… - Handbook on the shadow …, 2011 - elgaronline.com
… have been written by Schneider and Enste (2000) and Feld and Schneider (2009; Chapter
2, … same data sample used in Schneider and Buehn (2009) and Schneider and Enste (2000). …
2, … same data sample used in Schneider and Buehn (2009) and Schneider and Enste (2000). …
Enforceable security policies
FB Schneider - ACM Transactions on Information and System Security …, 2000 - dl.acm.org
A precise characterization is given for the class of security policies enforceable with mechanisms
that work by monitoring system execution, and automata are introduced for specifying …
that work by monitoring system execution, and automata are introduced for specifying …