نتایج جستجو برای: jacobsons trace form

تعداد نتایج: 754003  

Journal: :Physical review letters 1996
Vattay

We show, that the canonical invariant part of h̄ corrections to the Gutzwiller trace formula and the Gutzwiller-Voros spectral determinant can be computed by the Bohr-Sommerfeld quantization rules, which usually apply for integrable systems. We argue that the information content of the classical action and stability can be used more effectively than in the usual treatment. We demonstrate the imp...

Journal: :Pakistan journal of pharmaceutical sciences 2007
Najma Sultana M Saeed Arayne

Evidences supporting the introduction of metallic elements in several biological processes are rapidly accumulating. Likewise, many drugs possess modified toxicological and pharmacological properties when in the form of metal complexes. In order to ascertain the role of various essential and trace element complexation on the antibacterial activity of various cephalosporins, the synergistic or a...

2017
Bernd Finkbeiner Andrey Kupriyanov

Trace Tableau = concrete trace unwinding + abstract looping trace tableau • automatic procedure to find proofs in the form of a looping trace tableau Figure 1: Data structures for causality-based model checking. the property of interest. The exploration algorithm proceeds by picking some forest leaf, and employing an applicable trace transformer, producing a number of further nodes. The explora...

2005
Jean-Pierre Serre

III. . . . . . . . . . . . . . . . . . . . . . . . . 321 Abel's Theorem in Original Form and Applications . . . . . . 327 (a) Origins of the Theorem and Abel's Proof . . . . . . . . . 327 (b) Inversion of the Trigonometric and Elliptic Integrals . . . . 335 (c) Singular Cubics-General Addition Theorems . . . . . . . 339 (d) The Poncelet Theorem . . . . . . . . . . . . . . . . . 345 Abel's Theor...

2003
Zhaojun Bai Mark Fahey

There are numerous applications in physics, statistics and electrical circuit simulation where it is required to bound entries and the trace of the inverse and the determinant of a large sparse matrix. All these computational tasks are related to the central mathematical problem studied in this paper, namely, bounding the bilinear form uXf(A)v for a given matrix A and vectors u and v, wheref is...

2005
Loren E. Babcock

Asymmetry is a fundamental aspect of the biology of all organisms, and has a deep evolutionary history. The fossil record contains evidence of both morphological and behavioural asymmetries. Morphological asymmetry is most commonly expressed as conspicuous, directional asymmetry (either lateral asymmetry or spiral asymmetry) in body fossils. Few examples of fluctuating asymmetry, a form of subt...

Journal: :EAI Endorsed Trans. Cognitive Communications 2017
Hussein Kobeissi Amor Nafkha Youssef Nasser Oussama Bazzi Yves Louët

Scaled Largest Eigenvalue (SLE) detector stands out as the optimal single-primary-user detector in uncertain noisy environments. In this paper, we consider a multi-antenna cognitive radio system in which we aim at detecting the presence/absence of a Primary User (PU) using the SLE detector. By the exploitation of the distributions of the largest eigenvalue and the trace of the receiver sample c...

2011
Howard Barringer Klaus Havelund

In this paper we describe TRACECONTRACT, an API for trace analysis, implemented in the SCALA programming language. We argue that for certain forms of trace analysis the best weapon is a high level programming language augmented with constructs for temporal reasoning. A trace is a sequence of events, which may for example be generated by a running program, instrumented appropriately to generate ...

2006
Stéphanie Delaune Pascal Lafourcade Denis Lugiez Ralf Treinen

Security of a cryptographic protocol for a bounded number of sessions is usually expressed as a symbolic trace reachability problem. We show that symbolic trace reachability for well-defined protocols is decidable in presence of the exclusive or theory in combination with the homomorphism axiom. These theories allow us to model basic properties of important cryptographic operators. This trace r...

Journal: :CoRR 2007
Pierre Deransart Mireille Ducassé Gérard Ferrand

This paper specifies an observational semantics and gives an original presentation of the Byrd box model. The approach accounts for the semantics of Prolog tracers independently of a particular Prolog implementation. Prolog traces are, in general, considered as rather obscure and difficult to use. The proposed formal presentation of its trace constitutes a simple and pedagogical approach for te...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید