Results 41 to 50 of about 4,244 (151)
Density Matrix of Two Spin-1/2 Particles: Pure and Mixed States
The density matrix of an arbitrary pure state of a system consisting of two spin-1/2 particles is derived from the Pauli spin angular momentum operators.
Eric R. Johnston
doaj +1 more source
b‐Filter Grade of an Ideal a for Triangulated Categories
Let a and b be two homogeneous ideals in a graded‐commutative Noetherian ring R, and let X be an object in a compactly generated R‐linear triangulated category T. We introduce the notion of the b‐filter grade of a on X, denoted by f‐gradb,a,X, and provide several characterizations and bounds for this invariant. In addition, we explore the relationships
Li Wang +4 more
wiley +1 more source
From rights to runtime: Privacy engineering for agentic AI
Abstract Agentic AI shifts stacks from request‐response to plan‐execute. Systems no longer just answer; they act—planning tasks, calling tools, keeping memory, and changing external state. That shift moves privacy from policy docs into the runtime.
Keivan Navaie
wiley +1 more source
A Formalization of the Theorem of Existence of First-Order Most General Unifiers
This work presents a formalization of the theorem of existence of most general unifiers in first-order signatures in the higher-order proof assistant PVS.
A. B. Avelar +23 more
core +2 more sources
Idempotents et échantillonnage parcimonieux [PDF]
Comment reconstituer un signal, assimilé à une fonction x définie sur le groupe cyclique ZN, quʼon sait porté par T points, en nʼutilisant sa transformée de Fourier xˆ que sur un ensemble Ω de fréquences ? Le procédé indiqué par Candès (2006) [1], Candès, Romberg et Tao (2006) [2] est lʼextrapolation minimale de xˆ|Ω dans Fℓ1.
openaire +2 more sources
ABSTRACT The evaluation and assessment of network security is a decision‐making (DM) problem that occurs in an environment with multiple criteria, which have uncertainty, bipolarity, and extra‐related information. The traditional approaches fail to address the need to acquire a wide range of information for the assessment, especially in situations ...
Walid Emam +3 more
wiley +1 more source
A novel reconstruction-based video anomaly detection with idempotent generative network
Video anomaly detection (VAD) is vital in intelligent security for public safety. Reconstruction-based VAD has received increasing research attention, but faces challenges such as missing anomalies for the reconstruction error as a criterion, and ...
Wenmin Dong +4 more
doaj +1 more source
Meta SOS - A Maude Based SOS Meta-Theory Framework
Meta SOS is a software framework designed to integrate the results from the meta-theory of structural operational semantics (SOS). These results include deriving semantic properties of language constructs just by syntactically analyzing their rule-based ...
Aceto, Luca +2 more
core +2 more sources
Evaluating power system performance based on a q‐fractional hesitant fuzzy model. ABSTRACT This study introduces novel q‐fractional hesitant fuzzy multicriteria decision‐making (MCDM) approaches aimed at optimizing power system performance under uncertain and imprecise conditions. We extend hesitant fuzzy set theory by formulating q‐fractional hesitant
Zanyar A. Ameen +3 more
wiley +1 more source
The Doxastic Interpretation of Team Semantics [PDF]
We advance a doxastic interpretation for many of the logical connectives considered in Dependence Logic and in its extensions, and we argue that Team Semantics is a natural framework for reasoning about beliefs and belief ...
Galliani, Pietro
core

