Results 41 to 50 of about 3,049,343 (222)

On the Future of Information: Reunification, Computability, Adaptation, Cybersecurity, Semantics

open access: yesIEEE Access, 2016
The vulnerability of software and the Internet and the accumulation of unprocessed information in big data are serious problems in informatics. Both are human-related. The former was traced to flaws caused by human interventions in development.
Sergio Pissanetzky
doaj   +1 more source

Reducing the H0 tension with generalized Proca theory [PDF]

open access: yesJournal of Cosmology and Astroparticle Physics, 2020
We investigate the cosmological viability of the generalized proca theory. We first implement the background and linear perturbation equations of motion in the Boltzmann code and then study the constraints on the parameters of the generalized proca ...
A. D. Felice   +3 more
semanticscholar   +1 more source

New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings [version 2; peer review: 1 approved, 3 approved with reservations]

open access: yesF1000Research
Background Several scholars defined the concepts of fuzzy soft set theory and their application on decision-making problem. Based on this concept, researchers defined the generalised fuzzy soft set and its applications. However, to the best of the author’
Mihret Alamneh Taye   +2 more
doaj   +1 more source

Visualizing Items and Measures: An Overview and Demonstration of the Kernel Smoothing Item Response Theory Technique [PDF]

open access: yesTutorials in Quantitative Methods for Psychology, 2020
The current demonstration was conducted to familiarize a broader audience of applied researchers in psychology and social sciences with the benefits of an exploratory psychometric technique -- kernel smoothing item response theory (KSIRT). A data-driven,
Rajlic, Gordana
doaj   +1 more source

Dispelling the N3 myth for the kt jet-finder [PDF]

open access: yes, 2005
At high-energy colliders, jets of hadrons are the observable counterparts of the perturbative concepts of quarks and gluons. Good procedures for identifying jets are central to experimental analyses and comparisons with theory.
M. Cacciari, G. Salam
semanticscholar   +1 more source

wannier90: A tool for obtaining maximally-localised Wannier functions [PDF]

open access: yesComputer Physics Communications, 2007
We present wannier90, a program for calculating maximally-localised Wannier functions (MLWF) from a set of Bloch energy bands that may or may not be attached to or mixed with other bands.
A. Mostofi   +5 more
semanticscholar   +1 more source

The CMB in a Causal Set Universe

open access: yes, 2007
We discuss Cosmic Microwave Background constraints on the causal set theory of quantum gravity, which has made testable predictions about the nature of dark energy. We flesh out previously discussed heuristic constraints by showing how the power spectrum
Zuntz, Joe
core   +1 more source

Erasure Coding for Real-Time Streaming [PDF]

open access: yes, 2012
We consider a real-time streaming system where messages are created sequentially at the source, and are encoded for transmission to the receiver over a packet erasure link.
Ho, Tracey, Leong, Derek
core   +2 more sources

SARAH 4: A tool for (not only SUSY) model builders [PDF]

open access: yesComputer Physics Communications, 2013
We present the new version of the Mathematica package SARAH which provides the same features for a non-supersymmetric model as previous versions for supersymmetric models. This includes an easy and straightforward definition of the model, the calculation
F. Staub
semanticscholar   +1 more source

Wilson and Domainwall Kernels on Oakforest-PACS

open access: yes, 2017
We report the performance of Wilson and Domainwall Kernels on a new Intel Xeon Phi Knights Landing based machine named Oakforest-PACS, which is co-hosted by University of Tokyo and Tsukuba University and is currently fastest in Japan.
Kanamori, Issaku, Matsufuru, Hideo
core   +1 more source

Home - About - Disclaimer - Privacy