Results 41 to 50 of about 4,452,390 (325)

Non-equivalent greedy and almost greedy bases in lp

open access: yesJournal of Function Spaces and Applications, 2006
For 1 < p < 8 and p ? 2 we construct a family of mutually non-equivalent greedy bases in lp having the cardinality of the continuum. In fact, no basis from this family is equivalent to a rearranged subsequence of any other basis thereof.
Stephen J. Dilworth   +2 more
doaj   +1 more source

The Veblen functions for computability theorists

open access: yes, 2010
We study the computability-theoretic complexity and proof-theoretic strength of the following statements: (1) "If X is a well-ordering, then so is epsilon_X", and (2) "If X is a well-ordering, then so is phi(alpha,X)", where alpha is a fixed computable ...
Marcone, Alberto, Montalbán, Antonio
core   +2 more sources

VMud: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement Matching

open access: yesConference on Computer and Communications Security
The widespread use of open-source software (OSS) has led to extensive code reuse, making vulnerabilities in OSS significantly pervasive. The vulnerabilities due to code reuse in OSS are commonly known as vulnerable code clones (VCCs) or recurring ...
Kaifeng Huang   +4 more
semanticscholar   +1 more source

The Health Insurance Contribution Due by Natural Persons Earning Incomes from Independent Activities

open access: yesCECCAR Business Review, 2022
The article hereby has a series of theoretical and practical issues regarding the health insurance contribution due by natural persons earning incomes from independent activities.
Lucian CERNUȘCA
doaj   +1 more source

Ensuring the Safety of Steel Moment Frames Subjected to Uncertain Impacts

open access: yesBuildings, 2023
The article addresses the problem of safety evaluation of steel moment frames of civil buildings, e.g., warehouses, shops, garages, and multistory industrial buildings on deformable soil in the relevant case of an emergency impact. The case of accidental
Anatoly Victorovich Alekseytsev
doaj   +1 more source

Faster Mutation Analysis via Equivalence Modulo States

open access: yes, 2017
Mutation analysis has many applications, such as asserting the quality of test suites and localizing faults. One important bottleneck of mutation analysis is scalability.
Hao, Dan   +4 more
core   +1 more source

Imaging chronic active lesions in multiple sclerosis: a consensus statement.

open access: yesBrain : a journal of neurology
Chronic active lesions (CAL) are an important manifestation of chronic inflammation in multiple sclerosis (MS) and have implications for non-relapsing biological progression.
F. Bagnato   +20 more
semanticscholar   +1 more source

From Bolzano-Weierstra{\ss} to Arzel\`a-Ascoli

open access: yes, 2012
We show how one can obtain solutions to the Arzel\`a-Ascoli theorem using suitable applications of the Bolzano-Weierstra{\ss} principle. With this, we can apply the results from \cite{aK} and obtain a classification of the strength of instances of the ...
Brattka   +13 more
core   +1 more source

Two New Equivalent Statements of Riemann Hypothesis

open access: yesFar East Journal of Mathematical Sciences (FJMS), 2019
The distribution of such prime numbers among all natural numbersdoes not follow any regular pattern; however, the Germanmathematician G. F. B. Riemann (1826-1866) observed that thefrequency of prime numbers is very closely related to the behaviorof an elaborate function called the Riemann zeta function s.
openaire   +2 more sources

A Note on Barnette’s Conjecture

open access: yesDiscussiones Mathematicae Graph Theory, 2013
Barnette conjectured that each planar, bipartite, cubic, and 3-connected graph is hamiltonian. We prove that this conjecture is equivalent to the statement that there is a constant c > 0 such that each graph G of this class contains a path on at least c ...
Harant Jochen
doaj   +1 more source

Home - About - Disclaimer - Privacy