Vectors in a box

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Admissible Vectors of a Covariant Representation of a Dynamical System

In this paper, we introduce admissible vectors of covariant representations of a dynamical system which are extensions of the usual ones, and compare them with each other. Also, we give some sufficient conditions for a vector to be admissible vector of a covariant pair of a dynamical system.  In addition, we show the existence of Parseval frames for some special subspaces of $L^2(G)$ related to...

متن کامل

Simulation of a Box Annealing Unit

In this paper the heating process in a box annealing unit is simulated and the effect of various parameters involved in the process is examined. For this purpose, the full Naiver-Stokes equations along with the standard k- turbulence model are solved in the fluid region using the finite volume approach. In the solid area the conduction heat transfer equation is employed using approporate surfac...

متن کامل

Gravity in a Box

We consider a brane-world construction which incorporates a finite region of flat space, “the box,” surrounded by a region of anti-de Sitter space. This hybrid construction provides a framework which interpolates between the scenario proposed by Arkani-Hamed, Dimopoulos and Dvali, and that proposed by Randall and Sundrum. Within this composite framework, we investigate the effects of resonant m...

متن کامل

Shape in a Box

Many techniques have been developed in computer vision to recover three-dimensional shape from two-dimensional images. These techniques impose various combinations of assumptions/restrictions of conditions to produce a representation of shape (e.g. a depth/height map). Although great progress has been made it is a problem which remains far from solved, with most methods requiring a non-passive ...

متن کامل

CA-in-a-Box

An enterprise (such as an institute of higher education) wishing to deploy PKI must choose between several options, all expensive and awkward. It might outsource certification to a third-party company; it might purchase CA software and appliances from a third-party company; it might try to build and maintain its own CA. In the latter two options, the enterprise faces the additional challenge of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematical Programming

سال: 2011

ISSN: 0025-5610,1436-4646

DOI: 10.1007/s10107-011-0474-y