Results 51 to 60 of about 1,535 (98)

Interpolation Hilbert spaces between Sobolev spaces

open access: yes, 2014
We explicitly describe all Hilbert function spaces that are interpolation spaces with respect to a given couple of Sobolev inner product spaces considered over $\mathbb{R}^{n}$ or a half-space in $\mathbb{R}^{n}$ or a bounded Euclidean domain with ...
Mikhailets, Vladimir A.   +1 more
core   +1 more source

Ab Initio Molecular Dynamics Study of Quadrupolar Spin Relaxation in an Ionic Liquid

open access: yesJournal of Computational Chemistry, Volume 47, Issue 3, 30 January 2026.
This study presents a methodology for describing the relaxation of nuclear spins (with I > 1/2), applicable to ionic liquids of a general nature. Based on ab initio molecular dynamics, we demonstrate the importance of explicit solvation in calculating the relaxation times of the quadrupolar mechanism.
Luciano N. Vidal   +2 more
wiley   +1 more source

A Refined Graph Container Lemma and Applications to the Hard‐Core Model on Bipartite Expanders

open access: yesRandom Structures &Algorithms, Volume 68, Issue 1, January 2026.
ABSTRACT We establish a refined version of a graph container lemma due to Galvin and discuss several applications related to the hard‐core model on bipartite expander graphs. Given a graph G$$ G $$ and λ>0$$ \lambda >0 $$, the hard‐core model on G$$ G $$ at activity λ$$ \lambda $$ is the probability distribution μG,λ$$ {\mu}_{G,\lambda } $$ on ...
Matthew Jenssen   +2 more
wiley   +1 more source

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi   +2 more
wiley   +1 more source

Interpolation between H^p spaces and non-commutative generalizations, I

open access: yes, 1991
We give an elementary proof that the $H^p$ spaces over the unit disc (or the upper half plane) are the interpolation spaces for the real method of interpolation between $H^1$ and $H^\infty$. This was originally proved by Peter Jones.
Pisier, Gilles
core   +1 more source

Whatever Happened to Formal Methods for Security? [PDF]

open access: yesComputer (Long Beach Calif), 2016
Voas J, Schaffer K.
europepmc   +1 more source

Home - About - Disclaimer - Privacy