منابع مشابه
Signature change induces compactification.
It is shown – using a FRW model with S 3 × S 6 as spatial sections and a positive cosmological constant – that classical signature change implies a new compactification mechanism. The internal scale factor is of the order Λ −1/2 , and the solutions are stable against small perturbatons. In the case of compactified S 6 , it is shown that the effective four-dimensional space-time metric has Loren...
متن کاملSignature Change and Clifford Algebras
Given the real Clifford algebra of a quadratic space with a given signature, we define a new product in this structure such that it simulates the Clifford product of a quadratic space with another signature different from the original one. Among the possible applications of this new product, we use it in order to write the minkowskian Dirac equation over the euclidean spacetime and to define a ...
متن کاملJunction conditions for signature change
The change of signature of a metric is explained using simple examples and methods. The Klein-Gordon field on a signature-changing background is discussed, and it is shown how the approach of Dray et al. can be corrected to ensure that the KleinGordon equation holds. Isotropic cosmologies are discussed, and it is shown how the approach of Ellis et al. can be corrected to ensure that the Einstei...
متن کاملwoman-defined identity: analysis of selected poems of adrienne rich
the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...
Digital Signature with Hashing and XML Signature patterns
Data security has become one of the most important concerns for organizations. Information is a valuable asset and needs to be protected. One important countermeasure against attackers is the use of digital signatures. Digital signatures provides message authentication and may also provide message integrity. We present here two patterns: XML Signature and Digital Signature with Hashing patterns...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGSOFT Software Engineering Notes
سال: 2005
ISSN: 0163-5948
DOI: 10.1145/1082983.1083154