Ylide modeling as the key to a cis-selective synthesis of stilbenes
Related publications (32)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We prove that the critical Wave Maps equation with target S2 and origin ℝ2+1 admits energy class blow up solutions of the form [ u(t, r) = Q(\lambda(t)r) + \epsilon(t, r) ] where Q:R2→S2 is the ground state harmonic map and $\lambda ...
This paper sheds light on some of the graphical methods used by Robert Maillart to design the Salginatobel Bridge, a three-hinged concrete structure spanning 90 meters. Built in 1929, this masterpiece has since received extensive recognition both for its s ...
Energy needs at the global level are gigantic and steadily increasing while the need to reduce carbon emissions is vital if catastrophic climate change is to be avoided. In the Global South, a large part of the population still lacks access to energy, whic ...
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain a ...
The first enantiospecific [3+2] annulation of D-A amino-cyclopropanes with ketones is reported herein (see scheme; Phth = phthaloyl). The reaction is catalyzed by 5 mol % of tin(IV) chloride at -78 °C and gives aminotetra-hydrofurans bearing a C5-quaternar ...
Recently, two e-mail protocols were proposed claiming to provide perfect secrecy. These protocols use authentication and (Diffie-Hellman) key-exchange techniques, and as such, other standard security criteria besides perfect forward secrecy include key-rep ...
A chiral phosphoric acid (5)-catalyzed three-component Povarov reaction of aldehydes 2, anilines 3, and enecarbamates 4 afforded cis-4-amino-2-aryl(alkyl)-1,2,3,4-tetrahydroquinolines 1 in high yields with excellent diastereoselectivities (>95%) and almost ...
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bit “1”, but not the contrary), we propose integrity codes (I-codes) for a radio co ...
A reaction of 2-acyl substituted tetrahydroquinolines, prepared by Lewis acid-catalyzed three-component reaction of α-oxo aldehydes, anilines, and dienophiles, with in situ generated arynes afforded 5,6-dihydroindolo[1,2-a]- quinolines in good to excellent ...
We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol, which is known to be vulnerable to the ``man-in-the-middle" attack if the two users ...