Results 71 to 80 of about 587 (209)
FTheoryTools: Advancing Computational Capabilities for F‐Theory Research
Abstract A primary goal of string phenomenology is to identify realistic four‐dimensional physics within the landscape of string theory solutions. In F‐theory, such solutions are encoded in the geometry of singular elliptic fibrations, whose study often requires particularly challenging and cumbersome computations.
Martin Bies +2 more
wiley +1 more source
ABSTRACT We study a random walk on the Lie algebra sl2(Fp)$$ {\mathfrak{sl}}_2\left({\mathbf{F}}_p\right) $$ where new elements are produced by randomly applying adjoint operators of two generators. Focusing on the generic case where the generators are selected at random, we analyze the limiting distribution of the random walk and the speed at which it
Urban Jezernik, Matevž Miščič
wiley +1 more source
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
Systems of Precision: Coherent Probabilities on Pre-Dynkin Systems and Coherent Previsions on Linear Subspaces. [PDF]
Derr R, Williamson RC.
europepmc +1 more source
(Not Surprising) Attacks on Recent Pairing‐Free Attribute‐Based Encryption Schemes
The fact that designing secure and efficient identity or attribute‐based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community. However, some journals whose main topics are not cryptographic still publish papers proposing, for instance, ABE schemes in ...
Javier Herranz, Thomas Haines
wiley +1 more source
Strong prime LI-ideals in lattice implication algebras [PDF]
Bai Li-jun +3 more
openalex +1 more source
Abstract Silicon carbide (SiC) is a promising material for hypersonic thermal protection systems, but its complex oxidation behavior—marked by transitions between passive, active, and interfacial bubbling regimes—can lead to catastrophic failure. Existing SiC models typically focus exclusively on either passive or active oxidation.
Théo A. Rulko, Raúl A. Radovitzky
wiley +1 more source
When do pseudo‐Gorenstein rings become Gorenstein?
Abstract We discuss the relationship between the trace ideal of the canonical module and pseudo‐Gorensteinness. In particular, under certain mild assumptions, we show that every positively graded domain that is both pseudo‐Gorenstein and nearly Gorenstein is Gorenstein. As an application, we clarify the relationships among nearly Gorensteinness, almost
Sora Miyashita
wiley +1 more source
On Boolean elements and derivations in 2-dimension linguistic lattice implication algebras
Hua Zhu, Jianbin Zhao, Hairui Jia
openalex +1 more source
On higher Jacobians, Laplace equations, and Lefschetz properties
Abstract Let A$A$ be a standard graded Artinian K$\mathbb {K}$‐algebra over a field of characteristic zero. We prove that the failure of strong Lefschetz property (SLP) for A$A$ is equivalent to the osculating defect of a certain rational variety.
Charles Almeida +2 more
wiley +1 more source

