Warning: file_put_contents(cache/omni_47ef857d6d328a615ed5787edf361d5c.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Automated reasoning about hardware data types using bit-vectors of symbolic lengths
First published in 2003...
View Book →A Theory of Lorentzian Kac-Moody algebras
We present a variant of the Theory of Lorentzian (i. e. with a hyperbolic generalized Cartan matrix) Kac-Moody algebras recently developed by V. A. Gritsenko and the author. It is closely related with...
View Book →Canine adenovirus type I: a potential viral expression vector for the rabies glycoprotein gene?
First published in 1987...
View Book →
Teaching and Learning About Whole Numbers in Primary School
...
View Book →
SQL Server Execution Plans, 3rd Edition
For SQL Server 2008 through to 2017 and Azure SQL Database...
View Book →On a monodromy theorem for sheaves of local fields and applications
We prove a monodromy theorem for local vector fields belonging to a sheaf satisfying the unique continuation property. In particular, in the case of admissible regular sheaves of local fields defined ...
View Book →A BGG-type resolution for tensor modules over general linear superalgebra
We construct a Bernstein-Gelfand-Gelfand type resolution in terms of direct sums of Kac modules for the finite-dimensional irreducible tensor representations of the general linear superalgebra. As a c...
View Book →Contrasting confinement in superQCD and superconductors
The vacuum of supersymmetric gauge theories (SQCD) with N=2 softly broken to N=1 resembles that of a BCS superconductor in that it has a condensate which collimates flux into vortices, leading to conf...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
Anisotropy Across Fields and Scales
...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Between Mobility and Migration
The Multi-Level Governance of Intra-European Movement...
View Book →
Innovative Medicine
Basic Research and Development...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
CIA Reading Room cia-rdp89b00709r000200500011-0: EXPANDED AR RESEARCH PROGRAM, INCLUDING TECHNICAL S
Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP89B00709R000200500011-0 115- E'' IAN& DPD.5453-61 6 September 1961 25X1 Information Fidelity Incorporated Las Vegas. Nevad...
View Book →
Development of a bovine adenovirus type 2-based gene delivery vector
First published in 1997...
View Book →
Foundations of Software Science and Computation Structures
21st International Conference, FOSSACS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14–20, 2018. Proceedings...
View Book →Some problems concerning different types of vector valued almost periodic functions
First published in 1995...
View Book →Asymptotically flat black holes and gravitational waves in three-dimensional massive gravity
Different classes of exact solutions for the BHT massive gravity theory are constructed and analyzed. We focus in the special case of the purely quadratic Lagrangian, whose field equations are irreduc...
View Book →
Pre-Field Screening Protocols for Heat-Tolerant Mutants in Rice
...
View Book →
CIA Reading Room cia-rdp90t00155r000500030026-8: ATTACKING TARGETS BEYOND THE FEBA NATO NEEDS NEW WE
Approved For Release 2011/09/27: CIA-RDP90T00155R000500030026-8 Attacking Targets Beyond the FEBA NATO needs new weapons by Mark Hewish A major problem facing NATO is its in-ability to match the Warsa...
View Book →
Mesure et action des i-permutations sur les multigraphes multicolores finis et inifinis
Among other results, the purpose of this article is to show the existence of an $\mathbb{R}$-space-vector with basis $\omega^i_j $, $i, j$ are integers such that every graph with n vertex $n \geq 3$ i...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Transmedial Narration
Narratives and Stories in Different Media...
View Book →
A degree bound for globally generated vector bundles
We obtain a sharp bound on the degree of a globally generated vector bundle over a reduced irreducible projective variety defined over an algebraically closed field of characteristic zero. As an appli...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →Nilpotent operators and weighted projective lines
We show a surprising link between singularity theory and the invariant subspace problem of nilpotent operators as recently studied by C. M. Ringel and M. Schmidmeier, a problem with a longstanding his...
View Book →
The space of graded traces for holomorphic VOAs of small central charge
It is one of the remarkable results of vertex operator algebras (VOAs) that the graded traces (one-point correlation functions) of holomorphic VOAs are modular functions. This paper explores the quest...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Foundations of Machine Learning
...
View Book →
Digital Business Models
Concepts, Models, and the Alphabet Case Study...
View Book →
ATCC recombinant DNA materials
First published in 1989...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →
Conformal anomaly c-coefficients of superconformal 6d theories
We propose general relations between the conformal anomaly and the chiral (R-symmetry and gravitational) anomaly coefficients in 6d (1,0) superconformal theories. The suggested expressions for the thr...
View Book →Automated resasoning about Hardware data types using bit-vectors of symbolic lengths
First published in 2003...
View Book →
Developing Graphics Frameworks with Python and OpenGL
...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Catalogue of bacteria, phages and rDNA vectors
First published in 1985...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →
Demystifying Climate Models
A Users Guide to Earth System Models...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →Control of discrete-event systems of vector and mixed structural type
First published in 1996...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →Design and characterization of a novel vector system based on the stable replicator of bovine papill
First published in 2003...
View Book →
A parallel computer implementation of the ascend/descend types of vector algorithms
First published in 1981...
View Book →
25 Years of Transformations of Higher Education Systems in Post-Soviet Countries
Reform and Continuity...
View Book →Equations determining the orbit of the highest weight vector in the adjoint representation
We explicitly construct a set of quadratic equations defining the highest weight vector orbit for adjoint representations of Chevalley groups of types D_l, E_6, E_7, and E_8. The combinatorics of thes...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
The representations of quivers of type A_n. A fast approach
It is well-known that a quiver Q of type A_n is representation-finite, and that its indecomposable representations are thin (all Jordan-Hoelder multiplicities are 0 or 1). By now, various methods of p...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →Transposable regularized covariance models with an application to missing data imputation
Missing data estimation is an important challenge with high-dimensional data arranged in the form of a matrix. Typically this data matrix is transposable, meaning that either the rows, columns or both...
View Book →
Drinking in Victorian and Edwardian Britain
Beyond the Spectre of the Drunkard...
View Book →
MonoGame Role-Playing Game Development Succinctly
...
View Book →
The Limits of Art
On Borderline Cases of Artworks and their Aesthetic Properties...
View Book →
Programming Languages and Systems
27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Decomposition Techniques for Bilinear Saddle Point Problems and Variational Inequalities with Affine
The majority of First Order methods for large-scale convex-concave saddle point problems and variational inequalities with monotone operators are proximal algorithms which at every iteration need to m...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →Extending the boolean and vector space models of information retrieval with p-norm queries and multi
First published in 1983...
View Book →Development of canine adenovirus type I as an expression vector for the rabies glycoprotein gene
First published in 1993...
View Book →
Principles of Programming Languages
...
View Book →
Area-stationary and stable surfaces of class $C^1$ in the sub-Riemannian Heisenberg group ${\mathbb
We consider surfaces of class $C^1$ in the $3$-dimensional sub-Riemannian Heisenberg group ${\mathbb H}^1$. Assuming the surface is area-stationary, i.e., a critical point of the sub-Riemannian perime...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →Tame systems of linear and semilinear mappings
We study systems of linear and semilinear mappings considering them as representations of a directed graph $G$ with full and dashed arrows: a representation of $G$ is given by assigning to each vertex...
View Book →
Certified Programming with Dependent Types
A Pragmatic Introduction to the Coq Proof Assistant...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →Search for Heavy Down-Type Vector-Like Quarks in the Lepton-Plus-Jets Final State in 8 TeV proton-pr
First published in 2015...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →Subcloning of Thrombospondin Type-1 Domain Containing into Lentivirus Vector
First published in 2016...
View Book →Detect & Describe: Deep learning of bank stress in the news
News is a pertinent source of information on financial risks and stress factors, which nevertheless is challenging to harness due to the sparse and unstructured nature of natural text. We propose an a...
View Book →
Robert Ludlum's The Moscow vector
First published in 2005...
View Book →Hidden $U(1)_Y$ Ward-Takahashi identities in the spontaneously brokenAbelian Higgs model and the dec
This work is dedicated to the memory of R. Stora. The spontaneously broken (SSB) $U(1)_Y$ Abelian Higgs model (AHM) (the gauge theory of a scalar $\phi \propto (H+i\pi)= {\tilde H}e^{i{\tilde \pi}/}$ ...
View Book →
Introduction to Permanent Plug and Abandonment of Wells
...
View Book →