Moozonian

About 0 results
AI Overview
Generating...
Sponsored • AdSense Integration Active
Corrected by Entity Network
arxiv.org arXiv
arxiv.org › abs › 2112.11184v2
Principles for new ASI Safety Paradigms
Artificial Superintelligence (ASI) that is invulnerable, immortal, irreplaceable, unrestricted in its powers, and above the law is likely persistently uncontrollable. The goal of ASI Safety must be to...
arxiv.org arXiv
arxiv.org › abs › 1806.07075v1
On radical and torsion theory in the category of S-acts
In abelian categories like the category of R-modules and even in the category S-Act 0 of S-acts with a unique zero, idempotent radicals and torsion theories are equivalent, and the τ-torsion and τ- ...
arxiv.org arXiv
arxiv.org › abs › 2510.03088v1
Digraph Yama Nim
{\sc Yama Nim} is a variant of two piles {\sc Nim}. In this ruleset, the player chosses one of the piles and removes at least two tokens from the pile. In the same move, the player adds one token to t...
arxiv.org arXiv
arxiv.org › abs › physics › 0401058v1
Multimer Radical Ions and Electron/Hole Localization in Polyatomic Molecular Liquids: A critical review
While ionization of some polyatomic molecular liquids (such as water and aliphatic alcohols) yields so-called "solvated electrons" in which the excess electron density is localized in the interstices ...
arxiv.org arXiv
arxiv.org › abs › 2108.02391v1
Adapting to Function Difficulty and Growth Conditions in Private Optimization
We develop algorithms for private stochastic convex optimization that adapt to the hardness of the specific function we wish to optimize. While previous work provide worst-case bounds for arbitrary co...
arxiv.org arXiv
arxiv.org › abs › 1606.09523v1
Role of substrate induced electron-phonon interactions in biased graphitic bilayers
Bilayers of graphitic materials have potential applications in field effect transistors (FETs). A potential difference applied between certain ionic bilayers made from insulating graphitic materials s...
arxiv.org arXiv
arxiv.org › abs › 2410.12351v1
Yama: Precise Opcode-based Data Flow Analysis for Detecting PHP Applications Vulnerabilities
Web applications encompass various aspects of daily life, including online shopping, e-learning, and internet banking. Once there is a vulnerability, it can cause severe societal and economic damage. ...
arxiv.org arXiv
arxiv.org › abs › 2310.06610v1
On variations of Yama Nim and Triangular Nim
Yama Nim is a two heaps Nim game introduced in the second author's Master Thesis, where the player takes more than $2$ tokens from one heap, and return $1$ token to the other heap. Triangular Nim is a...
arxiv.org arXiv
arxiv.org › abs › 2406.08492v1
ASI as the New God: Technocratic Theocracy
As Artificial General Intelligence edges closer to reality, Artificial Superintelligence does too. This paper argues that ASI's unparalleled capabilities might lead people to attribute godlike infalli...
arxiv.org arXiv
arxiv.org › abs › astro-ph › 0307433v1
The AGILE Archive and Data Processing at the ASI Science Data Center
AGILE (Astro-rivelatore Gamma ad Immagini LEggero) is a Small Scientific Mission of the Italian Space Agency (ASI) with a Science Program open to the national and international community. Its main goa...