Theoretical aspects of charge correlations in θ-(BEDT-TTF)2X
نویسندگان
چکیده
منابع مشابه
Theoretical aspects of charge correlations in θ-(BEDT-TTF)2X.
A review is given on the theoretical studies of charge correlations in θ-(BEDT-TTF)2X. Various studies show that within a purely electronic model on the θ-type lattice with on-site U and nearest neighbor Vp and Vc interactions, the diagonal stripe, c-axis three-fold, and the vertical stripe charge correlations are favored in the regime Vp Vc , respectively. In the realist...
متن کاملTheoretical aspects of immunity.
The immune system recognizes a myriad of invading pathogens and their toxic products. It does so with a finite repertoire of antibodies and T cell receptors. We here describe theories that quantify the dynamics of the immune system. We describe how the immune system recognizes antigens by searching the large space of receptor molecules. We consider in some detail the theories that quantify the ...
متن کاملTheoretical Aspects of Computing
The International Colloquium on Theoretical Aspects of Computing was founded in 2004. In 2014, the 11th International Colloquium on Theoretical Aspects of Computing was for the first time organized in Europe, namely in Bucharest, Romania. Since its early days, the study of computer science in Romania has had a strong theoretical component, owing in part to the mathematical orientation of some o...
متن کاملTheoretical aspects of microquasars
Microquasars (black hole X-ray binaries with relativistic jets) are first found by means of multiwavelengths observations with ground-based telescopes. Microquasars mimic, on a much smaller scale, many of their phenomena seen in quasars. The study about microquasars opens the door for better understanding of the relativistic jets elsewhere in the Universe, and may serve to determine the distanc...
متن کاملTheoretical Analysis of "Correlations in RC6"
In this paper, we give the theoretical analysis of χ attack proposed by Knudsen and Meier on the RC6 block cipher. To this end, we propose the novel method of security evaluation against χ attack precisely including key dependency by introducing a technique “Transition Matrix Computing.” On the other hand, the way of security evaluation against χ attack has not been known except the computer ex...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science and Technology of Advanced Materials
سال: 2009
ISSN: 1468-6996,1878-5514
DOI: 10.1088/1468-6996/10/2/024312