When is Jones’ space normal?

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Puberty: when is it normal?

C lassically, the normal chronological age for pubertal onset is between 8 and 13 years in girls and 9 and 14 years in boys based on data from epidemiological studies from the 60’s (1). However, the age limit for pubertal timing is still a challenge (2,3). It is well known that puberty is a complex and multi factorial process that involves genetic, metabolic, socio economic, nutritional and eth...

متن کامل

When every $P$-flat ideal is flat

In this paper‎, ‎we study the class of rings in which every $P$-flat‎ ‎ideal is flat and which will be called $PFF$-rings‎. ‎In particular‎, ‎Von Neumann regular rings‎, ‎hereditary rings‎, ‎semi-hereditary ring‎, ‎PID and arithmetical rings are examples of $PFF$-rings‎. ‎In the context domain‎, ‎this notion coincide with‎ ‎Pr"{u}fer domain‎. ‎We provide necessary and sufficient conditions for‎...

متن کامل

Rape: when the exam is normal.

In this case report we present the sexual assault of a stuporous victim by a suspect who videotaped their encounter. We review the role of substance use and exam findings and discuss both victim and suspect factors that may lead to a negative examination of the victim.

متن کامل

Assessing when a sample is mostly normal

The use of trimming procedures constitutes a natural approach to robustifying statistical methods. This is the case of goodness-of-fit tests based on a distance, which can be modified by choosing trimmed versions of the distributions minimizing that distance. In this paper we consider the L2-Wasserstein distance and introduce the trimming methodology for assessing when a data sample can be cons...

متن کامل

Proofs of Space: When Space Is of the Essence

Proofs of computational effort were devised to control denial of service attacks. Dwork and Naor (CRYPTO ’92), for example, proposed to use such proofs to discourage spam. The idea is to couple each email message with a proof of work that demonstrates the sender performed some computational task. A proof of work can be either CPU-bound or memory-bound. In a CPU-bound proof, the prover must comp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the American Mathematical Society

سال: 1975

ISSN: 0002-9939

DOI: 10.1090/s0002-9939-1975-0394583-3