Results 41 to 50 of about 1,741,164 (298)

Large-scale instabilities in a STOVL upwash fountain [PDF]

open access: yes, 2005
The fountain flow created by two underexpanded axisymmetric, turbulent jets impinging on a ground plane was studied through the use of laser-based experimental techniques. Velocity and turbulence data were acquired in the jet and fountain flow regions
Cabrita, P. M.   +2 more
core   +1 more source

Relating Apartness and Bisimulation [PDF]

open access: yesLogical Methods in Computer Science, 2021
A bisimulation for a coalgebra of a functor on the category of sets can be described via a coalgebra in the category of relations, of a lifted functor.
Herman Geuvers, Bart Jacobs
doaj   +1 more source

Model Checking of Continuous-Time Markov Chains Against Timed Automata Specifications [PDF]

open access: yesLogical Methods in Computer Science, 2011
We study the verification of a finite continuous-time Markov chain (CTMC) C against a linear real-time specification given as a deterministic timed automaton (DTA) A with finite or Muller acceptance conditions.
Taolue Chen   +3 more
doaj   +1 more source

Optimal controller synthesis for timed systems [PDF]

open access: yesLogical Methods in Computer Science, 2023
Weighted timed games are zero-sum games played by two players on a timed automaton equipped with weights, where one player wants to minimise the cumulative weight while reaching a target.
Damien Busatto-Gaston   +2 more
doaj   +1 more source

Negative Differential Conductance and Hot Phonons in Suspended Nanotube Molecular Wires [PDF]

open access: yes, 2005
Freely suspended metallic single-wall carbon nanotubes (SWNTs) exhibit reduced current carrying ability compared to those lying on substrates, and striking negative differential conductance (NDC) at low electric fields.
David Mann   +6 more
core   +1 more source

A Reduced Semantics for Deciding Trace Equivalence [PDF]

open access: yesLogical Methods in Computer Science, 2017
Many privacy-type properties of security protocols can be modelled using trace equivalence properties in suitable process algebras. It has been shown that such properties can be decided for interesting classes of finite processes (i.e., without ...
David Baelde   +2 more
doaj   +1 more source

Dispersal of molecular clouds by ionising radiation [PDF]

open access: yes, 2012
The role of feedback from massive stars is believed to be a key element in the evolution of molecular clouds. We use high-resolution 3D SPH simulations to explore the dynamical effects of a single O7 star located at the centre of a molecular cloud with ...
A. P. Whitworth   +106 more
core   +1 more source

Predicate Abstraction with Under-approximation Refinement [PDF]

open access: yesLogical Methods in Computer Science, 2007
We propose an abstraction-based model checking method which relies on refinement of an under-approximation of the feasible behaviors of the system under analysis. The method preserves errors to safety properties, since all analyzed behaviors are feasible
Corina S. Pasareanu   +2 more
doaj   +1 more source

QCD sum rule Study of the $d^*(2380)$

open access: yes, 2015
We systematically construct $I(J^P)=0(3^+)$ six-quark local interpolating currents without derivative operators. We discuss the best choice of operator, and select three $\Delta$-$\Delta$ like operators to perform QCD sum rule analyses to calculate the ...
Chen, Hua-Xing   +4 more
core   +1 more source

Footprints in Local Reasoning [PDF]

open access: yesLogical Methods in Computer Science, 2009
Local reasoning about programs exploits the natural local behaviour common in programs by focussing on the footprint - that part of the resource accessed by the program. We address the problem of formally characterising and analysing the footprint notion
Mohammad Raza, Philippa Gardner
doaj   +1 more source

Home - About - Disclaimer - Privacy