منابع مشابه
Entropies Galore!
The functional properties of the entropy gives rise to 6 possible types of thermodynamics. Additivity or superadditivity or subadditivity are closely related to extensivity and this is one of the characteristics used to distinguish the 6 types. We give examples (some are somewhat academic) of all of these, except one. For this purpose we draw also on black hole systems which have been proposed....
متن کاملQuantification Galore
Perhaps the most influential understanding of how reference to kinds varies across languages is that of Chierchia (1998). In this framework, determiners can in principle apply to kinds and NPs can in principle denote them. English, like other Germanic languages, is taken to realize the latter possibility. One might reasonably expect, then, that it would also realize the former—that is, that it ...
متن کاملRetrograde signals galore
The term “retrograde signaling” refers to the concept that signals originating from chloroplasts or mitochondria can modulate nuclear gene expression (NGE). The evolutionary establishment of the complex mechanisms underlying retrograde signaling is likely to have required a long time period (reviewed in: Tanaka and Hanaoka, 2012). The initial notion, proposed almost 30 years ago, that a single ...
متن کاملThe Annual SUMO Reasoning Prizes at CASC
Previous CASC competitions have focused on proving difficult problems on small numbers of axioms. However, typical reasoning applications for expert systems rely on knowledge bases that have large numbers of axioms of which only a small number may be relevant to any given query. We have created a category in the new LTB division of CASC to test this sort of situation. We present an analysis of ...
متن کاملAlgebraic Attacks Galore!
Received: May 15, 2009 This is the first in a two-part survey of current techniques in algebraic cryptanalysis. After introducing the basic setup of algebraic attacks and discussing several attack scenarios for symmetric cryptosystems, public key cryptosystems, and stream ciphers, we discuss a number of individual methods. The XL, XSL, and MutantXL attacks are based on linearization techniques ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: European Journal of Immunology
سال: 2009
ISSN: 0014-2980,1521-4141
DOI: 10.1002/eji.200990303