Results 61 to 70 of about 885 (149)

Poisson Reduction and Branes in Poisson?Sigma Models [PDF]

open access: yesLetters in Mathematical Physics, 2004
18 pages. Version to appear in Lett.
Calvo, Iván, Falceto, Fernando
openaire   +2 more sources

Normalization of a Poisson algebra is Poisson [PDF]

open access: yesProceedings of the Steklov Institute of Mathematics, 2009
We prove that the integral closure of a Poisson algebra $A$ over a field of characteristic 0 is again a Poisson algebra.
openaire   +2 more sources

A law of the iterated logarithm for small counts in Karlin’s occupancy scheme

open access: yesModern Stochastics: Theory and Applications
In the Karlin infinite occupancy scheme, balls are thrown independently into an infinite array of boxes $1,2,\dots $ , with probability ${p_{k}}$ of hitting the box k.
Alexander Iksanov, Valeriya Kotelnikova
doaj   +1 more source

Kähler–Poisson algebras

open access: yesJournal of Geometry and Physics, 2019
We introduce K hler-Poisson algebras as analogues of algebras of smooth functions on K hler manifolds, and prove that they share several properties with their classical counterparts on an algebraic level. For instance, the module of inner derivations of a K hler-Poisson algebra is a finitely generated projective module, and allows for a unique ...
Joakim Arnlind, Ahmed Al-Shujary
openaire   +3 more sources

Poisson

open access: yesImpressions d’Extrême-Orient, 2020
Presentation Alai, un ecrivain d'origine tibetaine couronne du prix Maodun Ne en 1959 dans une famille aux racines tibetaines (藏族 Zangzu), Alai vit dans la region du Sichuan peuplee de plusieurs ethnies dont certaines sont tibetaines. Il a passe les trente-six premieres annees de sa vie dans sa ville natale de Barkham (transcrit en chinois Ma’erkang ...
Xiao, Wei, Guyot, Michèle
openaire   +2 more sources

Connectivity in Secure Wireless Sensor Networks under Transmission Constraints

open access: yes, 2015
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few ...
Gligor, Virgil, Yağan, Osman, Zhao, Jun
core   +1 more source

About Thinning Invariant Partition Structures

open access: yes, 2012
Bernoulli-$p$ thinning has been well-studied for point processes. Here we consider three other cases: (1) sequences $(X_1,X_2,...)$; (2) gaps of such sequences $(X_{n+1}-X_1)_{n\in\mathbb{N}}$; (3) partition structures. For the first case we characterize
Starr, Shannon   +2 more
core   +1 more source

One more approach to the convergence of the empirical process to the Brownian bridge

open access: yes, 2008
A theorem of Donsker asserts that the empirical process converges in distribution to the Brownian bridge.
Jean-françois Marckert   +1 more
core   +2 more sources

Home - About - Disclaimer - Privacy