On generalized constraints and certificates
نویسندگان
چکیده
منابع مشابه
Constraints on Generalized Inflationary Cosmologies
We consider cosmologies having an inflationary period during which the Robertson-Walker scale factor is an arbitrary function of time satisfying /~ > 0 (not necessarily an exponential). We show that any such inflationary period will produce long-wavelength gravitational waves which can affect present observations of the microwave background. Using present bounds on the quadrupole anisotropy we ...
متن کاملObservational Constraints on the Generalized Chaplygin Gas
In this paper we study a quintessence cosmological model in which the dark energy component is considered to be the Generalized Chaplygin Gas and the curvature of the three-geometry is taken into account. Two parameters characterize this sort of fluid, the ν and the α parameters. We use different astronomical data for restricting these parameters. It is shown that the constraint ν . α agrees en...
متن کاملOn Mixed Connectivity Certificates
Vertex and edge connectivity are special cases of mixed connectivity, in which all edges and a specified set of vertices play a similar role. Certificates of k-connectivity for a graph are obtained by removing a subset of its edges, while preserving its connectivity up to k. We unify the previous work on connectivity certificates and extend it to handle mixed connectivity and multigraphs. Our t...
متن کاملon semihypergroups and hypergroups
in this thesis, first the notion of weak mutual associativity (w.m.a.) and the necessary and sufficient condition for a $(l,gamma)$-associated hypersemigroup $(h, ast)$ derived from some family of $lesssim$-preordered semigroups to be a hypergroup, are given. second, by proving the fact that the concrete categories, semihypergroups and hypergroups have not free objects we will introduce t...
15 صفحه اولServer Certificates based on DNSSEC
Globally unique domain names and IP addresses that are provided in real time by the DNS (Domain Name System) represent the fundamental signposts for navigating the Internet and for locating remote hosts. It is therefore paradoxical that the traditional method for secure identification of remote hosts is not directly based on DNS, but on the browser PKI which is external to the trust structure o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Discrete Mathematics
سال: 2001
ISSN: 0012-365X
DOI: 10.1016/s0012-365x(00)00166-7