Results 11 to 20 of about 25,288 (188)
Counter Simulations via Higher Order Quantifier Elimination: a preliminary report [PDF]
Quite often, verification tasks for distributed systems are accomplished via counter abstractions. Such abstractions can sometimes be justified via simulations and bisimulations.
Ghilardi, Silvio, Pagani, Elena
core +2 more sources
Revolutions and evolutions in Russia: In search of a solution to the path dependence problem
Russian history demonstrates its propensity to “revolving motions,” particularly in regard to the institutions of serfdom and autocracy, thus illustrating the existence of path dependence.
Alexander Auzan
doaj +1 more source
Chilecomadia valdiviana (Philippi) (Lepidoptera: Cossidae) is a native xylophagous pest in apple orchards in Chile. A series of experiments evaluated the efficacy of trap type, sex pheromone (Z7,Z10-16:Ald) dose, and trap location in the apple tree ...
Wilson Barros-Parada +5 more
doaj +1 more source
Well-posedness and asymptotic behavior of a multidimensional model of morphogen transport [PDF]
Morphogen transport is a biological process, occurring in the tissue of living organisms, which is a determining step in cell differentiation. We present rigorous analysis of a simple model of this process, which is a system coupling parabolic PDE with ...
A. Kicheva +9 more
core +2 more sources
A study was conducted to investigate the effects of natural zeolites as a water clarifier on the heavy metal removal efficiency from the underground saltwater used for rearing Dicentrarchus labrax fry. Five concentrations of zeolites were tested: 0 (Z0),
Aly Hadir A. +4 more
doaj +1 more source
بررسی برخی شاخصهای رشد، نشت الکترولیت و محتوای نسبی آب ریحان تحت سطوح آبیاری و نانوزئولیت [PDF]
یکی از روشهای نوین صرفهجویی در مصرف آب و کاهش هزینههای آبیاری استفاده از سوپرجاذبها میباشد. ازآنجاکه نانوذره زئولیت سطح ویژه بزرگتری دارد، لذا میتواند آب و عناصر غذایی را جذب کرده و در زمان نیاز گیاه آزاد نماید.
سمانه نوری +5 more
doaj +1 more source
Towards Human Computable Passwords [PDF]
An interesting challenge for the cryptography community is to design authentication protocols that are so simple that a human can execute them without relying on a fully trusted computer.
Blocki, Jeremiah +3 more
core +2 more sources
Vector valued hermitian and quaternionic modular forms [PDF]
Extending the method of the paper [FS3] we prove three structure theorems for vector valued modular forms, where two correspond to 4-dimensional cases (two hermitian modular groups, one belonging to the field of Eisenstein numbers, the other to the field
Freitag, Eberhard +1 more
core +4 more sources
Culture-Laden Imports: International Market Entry and Cultural Taboos
This empirical study investigates American market responses to a Spanish product that is strongly culture-laden and may violate cultural taboos. Surveys were conducted in two contrasting US universities in Arkansas and California.
Brice William David +2 more
doaj +1 more source
The distinction between shallow coral reefs and mesophotic coral ecosystems (MCEs) has not been fully clarified yet. The original definition of MCEs, by depths of 30–150 m, fixes their bathymetrical limits and fails to accommodate environmental and ...
Miguel Ángel Pérez-Castro +4 more
doaj +1 more source

