Results 291 to 300 of about 409,311 (312)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Nuclear Physics A, 1994
Abstract The correlation function of two intermediate-mass fragments (IMF) is derived from first principles. Care is taken of the final-state Coulomb interaction of the observed IMF with the rest source and of the initial correlations in the source at the moment of emission. These correlations are of various origins. Due to basic conservation laws of
O. Schapiro +2 more
openaire +1 more source
Abstract The correlation function of two intermediate-mass fragments (IMF) is derived from first principles. Care is taken of the final-state Coulomb interaction of the observed IMF with the rest source and of the initial correlations in the source at the moment of emission. These correlations are of various origins. Due to basic conservation laws of
O. Schapiro +2 more
openaire +1 more source
2022
الأهداف. بفضل الدقة الزاوية العالية والحساسية ودقة الصورة وتغطية التردد لـ ALMA، نهدف إلى تحسين فهمنا لتشكيل النجوم. واحدة من الاختراقات المتوقعة من ALMA، والتي هي أساس برنامجنا الكبير للدورة 5 ALMA - IMF، هي مسألة أصل وظيفة الكتلة الأولية (IMF) للنجوم. هنا نقدم اختيار مجموعة ALMA - IMF الأولية، والنتائج الأولى، والآفاق العلمية. الطرق.
F. Motte +64 more
openaire +1 more source
الأهداف. بفضل الدقة الزاوية العالية والحساسية ودقة الصورة وتغطية التردد لـ ALMA، نهدف إلى تحسين فهمنا لتشكيل النجوم. واحدة من الاختراقات المتوقعة من ALMA، والتي هي أساس برنامجنا الكبير للدورة 5 ALMA - IMF، هي مسألة أصل وظيفة الكتلة الأولية (IMF) للنجوم. هنا نقدم اختيار مجموعة ALMA - IMF الأولية، والنتائج الأولى، والآفاق العلمية. الطرق.
F. Motte +64 more
openaire +1 more source
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Kernel vulnerabilities are critical in security because they naturally allow attackers to gain unprivileged root access. Although there has been much research on finding kernel vulnerabilities from source code, there are relatively few research on kernel fuzzing, which is a practical bug finding technique that does not require any source code. Existing
HyungSeok Han, Sang Kil Cha
openaire +1 more source
Kernel vulnerabilities are critical in security because they naturally allow attackers to gain unprivileged root access. Although there has been much research on finding kernel vulnerabilities from source code, there are relatively few research on kernel fuzzing, which is a practical bug finding technique that does not require any source code. Existing
HyungSeok Han, Sang Kil Cha
openaire +1 more source
International Journal: Canada's Journal of Global Policy Analysis, 2007
The International Monetary Fund (IMF), created at the end of the second World War at Bretton Woods, New Hampshire, to manage an international monetary system characterized by fixed exchange rates and heavily restricted international capital flows, now faces widespread questioning of its relevance.
openaire +1 more source
The International Monetary Fund (IMF), created at the end of the second World War at Bretton Woods, New Hampshire, to manage an international monetary system characterized by fixed exchange rates and heavily restricted international capital flows, now faces widespread questioning of its relevance.
openaire +1 more source

