Showing 1,981 - 2,000 results of 75,748 for search '"if(we)"', query time: 0.11s Refine Results
  1. 1981

    A note on centralizers by Howard E. Bell

    Published 2000-01-01
    “…For prime rings R, we characterize the set U∩CR([U,U]), where U is a right ideal of R; and we apply our result to obtain a commutativity-or-finiteness theorem. …”
    Get full text
    Article
  2. 1982

    Properties of the function f(x)=x/π(x) by Panayiotis Vlamos

    Published 2001-01-01
    “…We obtain the asymptotic estimations for ∑k=2nf(k) and ∑k=2n1/f(k), where f(k)=k/π(k), k≥2. …”
    Get full text
    Article
  3. 1983

    Oriented 6-dimensional submanifolds in the octonians, III by Hideya Hashimoto

    Published 1995-01-01
    “…In this paper, we classify 6-dimensional almost Hermitian submanifolds in the octonians 𝕆 according to the classification introduced by A. …”
    Get full text
    Article
  4. 1984

    Les trois conceptions du développement durable by Fabrice Flipo

    Published 2014-12-01
    “…We describe these three conceptions which we named, by taking back partially the words of the actors themselves, dematerialization, other development and exit of the development.…”
    Get full text
    Article
  5. 1985

    Bootstrapping line defects in AdS3/CFT2 by Gabriel Bliard, Diego H. Correa, Martín Lagares, Ignacio Salazar Landea

    Published 2025-01-01
    “…We obtain a bootstrap result that only depends on two OPE coefficients. …”
    Get full text
    Article
  6. 1986

    Reducing maladaptive behavior in neuropsychiatric disorders using network modification by Nicholas M. Timme

    Published 2025-01-01
    “…We hypothesize that this is a general feature of developing effective treatment strategies for networks of neurons. …”
    Get full text
    Article
  7. 1987

    In search of comity: TEI for distant reading by Lou Burnard, Christof Schöch, Carolin Odebrecht

    Published 2021-07-01
    “…These constraints are expressed by a master TEI ODD, from which we derive three different schemas by ODD chaining, each associated with appropriate documentation.…”
    Get full text
    Article
  8. 1988

    The Relational Aspects of Luxury Consumption in Brazil: The development of a Luxury Customer Relationship Perception Scale and the Analysis of Brand Personality Influence on Relati... by Fernanda Scussel, Gisela Demo

    Published 2019-01-01
    “…Regarding our contributions, we propose a new metric for marketing literature, which enables future relational studies with other consumer behavior constructs. …”
    Get full text
    Article
  9. 1989

    Extending the Intermediate Data Structure (IDS) for longitudinal historical databases to include geographic data by Finn Hedefalk, Lars Harrie, Patrick Svensson

    Published 2014-09-01
    “…Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. …”
    Get full text
    Article
  10. 1990
  11. 1991

    Decoherence-free many-body Hamiltonians in nonlinear waveguide quantum electrodynamics by Aviv Karnieli, Offek Tziperman, Charles Roques-Carmes, Shanhui Fan

    Published 2025-01-01
    “…Interestingly, we find that the dynamics approaches a unitary evolution in the limit of weak intrawaveguide squeezing, and we discuss potential experimental realizations of this effect. …”
    Get full text
    Article
  12. 1992

    Symplectic quantization and general constraint structure of a prototypical second-class system by Ignacio S. Gomez, Vipul Kumar Pandey, Ronaldo Thibes

    Published 2024-12-01
    “…Abstract We discuss a general prototypical constrained Hamiltonian system with a broad application in quantum field theory and similar contexts where dynamics is defined through a functional action obeying a stationarity principle. …”
    Get full text
    Article
  13. 1993

    Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks by Ling Chi, Liang Hu, Hongtu Li, Jianfeng Chu

    Published 2014-03-01
    “…After analyzing, we proved that we can obtain the session key via controlling a compromised sensor node and using the collusion attack when a user wants to establish a session with a legal node. …”
    Get full text
    Article
  14. 1994

    Nonequilibrium Dynamics of Charged Dual-Unitary Circuits by Alessandro Foligno, Pasquale Calabrese, Bruno Bertini

    Published 2025-02-01
    “…The interplay between symmetries and entanglement in out-of-equilibrium quantum systems is currently at the center of an intense multidisciplinary research effort. Here we introduce a setting where these questions can be characterized exactly by considering dual-unitary circuits with an arbitrary number of U(1) charges. …”
    Get full text
    Article
  15. 1995

    Extremal jumps of circuit complexity of unitary evolutions generated by random Hamiltonians by Marcin Kotowski, Michał Oszmaniec, Michał Horodecki

    Published 2025-01-01
    “…Abstract We investigate circuit complexity of unitaries generated by time evolution of randomly chosen strongly interacting Hamiltonians in finite dimensional Hilbert spaces. …”
    Get full text
    Article
  16. 1996

    Anomaly Monitoring Method for Key Components of Satellite by Jian Peng, Linjun Fan, Weidong Xiao, Jun Tang

    Published 2014-01-01
    “…Lastly, we conducted an example of AMM for LIBs, and, according to the results of AMM, we validated the feasibility and effectiveness of AMM by comparing it with the results of threshold detective method (TDM).…”
    Get full text
    Article
  17. 1997

    When is a DAO Decentralized? by Henrik Axelsen, Johannes Rude Jensen, Omri Ross

    Published 2022-07-01
    “…We propose a definition of “sufficient decentralization” and present a general framework for the assessment of decentralization. …”
    Get full text
    Article
  18. 1998

    An Improved EDAS Method Based on Bipolar Neutrosophic Set and Its Application in Group Decision-Making by Irvanizam Irvanizam, Intan Syahrini, Nawar Nabila Zi, Natasya Azzahra, Muhd Iqbal, Marzuki Marzuki, Muhammad Subianto

    Published 2021-01-01
    “…We calculated the average solution under all the criteria by two existing aggregation operators of BNNs. …”
    Get full text
    Article
  19. 1999

    Entanglement asymmetry and symmetry defects in boundary conformal field theory by Yuya Kusuki, Sara Murciano, Hirosi Ooguri, Sridip Pal

    Published 2025-01-01
    “…By leveraging 2D boundary conformal field theory (BCFT), we investigate the symmetry breaking for both finite and compact Lie groups. …”
    Get full text
    Article
  20. 2000

    Influence of the Constitutive Flow Law in FEM Simulation of the Radial Forging Process by Olivier Pantalé, Babacar Gueye

    Published 2013-01-01
    “…For the presented study we use an AISI 4140 steel, and we denote a fairly good agreement between the results obtained using both laws.…”
    Get full text
    Article