Results 71 to 80 of about 587 (209)

FTheoryTools: Advancing Computational Capabilities for F‐Theory Research

open access: yesFortschritte der Physik, Volume 74, Issue 1, January 2026.
Abstract A primary goal of string phenomenology is to identify realistic four‐dimensional physics within the landscape of string theory solutions. In F‐theory, such solutions are encoded in the geometry of singular elliptic fibrations, whose study often requires particularly challenging and cumbersome computations.
Martin Bies   +2 more
wiley   +1 more source

Random Lie bracket on sl2(Fp)

open access: yesRandom Structures &Algorithms, Volume 68, Issue 1, January 2026.
ABSTRACT We study a random walk on the Lie algebra sl2(Fp)$$ {\mathfrak{sl}}_2\left({\mathbf{F}}_p\right) $$ where new elements are produced by randomly applying adjoint operators of two generators. Focusing on the generic case where the generators are selected at random, we analyze the limiting distribution of the random walk and the speed at which it
Urban Jezernik, Matevž Miščič
wiley   +1 more source

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

(Not Surprising) Attacks on Recent Pairing‐Free Attribute‐Based Encryption Schemes

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
The fact that designing secure and efficient identity or attribute‐based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community. However, some journals whose main topics are not cryptographic still publish papers proposing, for instance, ABE schemes in ...
Javier Herranz, Thomas Haines
wiley   +1 more source

Strong prime LI-ideals in lattice implication algebras [PDF]

open access: gold, 2007
Bai Li-jun   +3 more
openalex   +1 more source

A unified thermo‐chemo‐mechanical model for passive, active, and interfacial oxidation of silicon carbide

open access: yesJournal of the American Ceramic Society, Volume 109, Issue 1, January 2026.
Abstract Silicon carbide (SiC) is a promising material for hypersonic thermal protection systems, but its complex oxidation behavior—marked by transitions between passive, active, and interfacial bubbling regimes—can lead to catastrophic failure. Existing SiC models typically focus exclusively on either passive or active oxidation.
Théo A. Rulko, Raúl A. Radovitzky
wiley   +1 more source

When do pseudo‐Gorenstein rings become Gorenstein?

open access: yesBulletin of the London Mathematical Society, Volume 58, Issue 1, January 2026.
Abstract We discuss the relationship between the trace ideal of the canonical module and pseudo‐Gorensteinness. In particular, under certain mild assumptions, we show that every positively graded domain that is both pseudo‐Gorenstein and nearly Gorenstein is Gorenstein. As an application, we clarify the relationships among nearly Gorensteinness, almost
Sora Miyashita
wiley   +1 more source

On higher Jacobians, Laplace equations, and Lefschetz properties

open access: yesBulletin of the London Mathematical Society, Volume 58, Issue 1, January 2026.
Abstract Let A$A$ be a standard graded Artinian K$\mathbb {K}$‐algebra over a field of characteristic zero. We prove that the failure of strong Lefschetz property (SLP) for A$A$ is equivalent to the osculating defect of a certain rational variety.
Charles Almeida   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy