Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Topic List  Advanced Search  
Sample search results for: a4 parity violation

Page:   2  3  4  5 
 
1 Neutral Kaons and CP Violation Jason Andrews University of Washington
 

Summary:  Neutral Kaons and CP Violation Jason Andrews · University of Washington Phys 487 · May 23rd, 2011... · Rotation · Parity · Charge Conjugation · Time reversal Physical transformations continuous discrete #12... ;Parity #12;Parity #12;Parity #12;Parity ...

  

Source: Garcia, Alejandro - Department of Physics, University of Washington at Seattle

 

Collection: Physics

 
2 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 1, JANUARY 2010 233 Linear Time Encoding of LDPC Codes
 

Summary:  be an arbitrary parity bit in the th tier. By conditions (A3) and (A4), there is only one check node in the lower... -TREE A pseudo-tree is a connected Tanner graph that satisfies the following conditions (A1) through (A4). (A1... that connect to . We call the parent of and the child of . ...

  

Source: Moura, José - Department of Electrical and Computer Engineering, Carnegie Mellon University

 

Collection: Engineering

 
3 Violation of Bell's inequality with continuous spatial variables Ayman F. Abouraddy,1,
 

Summary:  it corresponds exactly to the Sx spatial-parity operator. VIOLATION OF BELL's INEQUALITY WITH ... PHYSICAL REVIEW... for violating Bell's inequality in the spatial domain. Each photon is guided to a separate parity analyzer... in parity space through superpositions of them. V. ...

  

Source: Teich, Malvin C. - Departments of Biomedical Engineering & Electrical and Computer Engineering, Boston University

 

Collection: Biology and Medicine

 
4 MeanPayoff Parity Games Krishnendu Chatterjee + Thomas A. Henzinger +# Marcin Jurdzinski
 

Summary:  for a sufficiently long time, followed by a finite strategy to ensure that the parity objective is not violated... nivReach(T 1 ). 6.2.a.4. For every vertex v # U nivReach(T 1 ), set Val(v) = g. goto Step. 6.3. 6.2.b... Mean­Payoff Parity Games Krishnendu Chatterjee + Thomas A. Henzinger ...

  

Source: Henzinger, Thomas A. - Faculté Informatique et Communications, Ecole Polytechnique Fédérale de Lausanne; Jurdziñski, Marcin - Department of Computer Science, University of Warwick

 

Collection: Computer Technologies and Information Sciences

 
5 Mean-Payoff Parity Games Krishnendu Chatterjee
 

Summary:  strategy to ensure that the parity objective is not violated; and this alternation of mean... and (v, w) E}. 6.2.a.3. W0 = W0 U nivReach(T1). 6.2.a.4. For every vertex v U nivReach(T1), set Val... Mean-Payoff Parity Games Krishnendu Chatterjee Thomas A. Henzinger Marcin Jurdzi´nski§ ...

  

Source: Henzinger, Thomas A. - Faculté Informatique et Communications, Ecole Polytechnique Fédérale de Lausanne

 

Collection: Computer Technologies and Information Sciences

 
6 C:\DATA\PAVAN Int Programs\PROGRAM.INT-08-3/ParitySymposiumAgenda INT Symposium on
 

Summary:  Tests with Parity-Violating Electron Scattering in the LHC Era November 6-8, 2008 Agenda Thursday... of Parity-Violating Electron Scattering Experiments #12;C:\DATA\PAVAN Int Programs\PROGRAM.INT-08-3/Parity... Caltech Beyond the Standard Model in Parity-Violating Electron Scattering 12:00 ~ 2:00 Lunch ...

  

Source: Washington at Seattle, University of - Department of Physics, Electroweak Interaction Research Group - Neutron Beta Decay Time Reversal Invariance Test

 

Collection: Physics

 
7 in2p3-00116670,version1-27Nov2006 EPJ manuscript No.
 

Summary:  . The origin of parity violation in physics is still unknown. At the present time, it is introduced... and antiparticles could be like "stereo-isomeric" molecules, which would naturally provides parity violation... , that the parity symmetry could be violated in weak ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
8 arXiv:0711.2233v1[nucl-th]14Nov2007 Parity-violating two-pion exchange nucleon-nucleon interaction
 

Summary:  arXiv:0711.2233v1[nucl-th]14Nov2007 Parity-violating two-pion exchange nucleon-nucleon interaction... Abstract We calculate in chiral perturbation theory the parity-violating two-pion exchange nucleon... % of the parity-violating 1-exchange potential. We evalu- ate also the parity-violating effects arising ...

  

Source: Weise, Wolfram - Physik Department, Technische Universität München

 

Collection: Physics

 
9 LE JOURNAL DE PHYSIQUE New possible manifestations of parity violation in forbidden
 

Summary:  LE JOURNAL DE PHYSIQUE New possible manifestations of parity violation in forbidden magnetic... In this paper, we shall present new approaches to the problem of finding a parity violation in for- bidden... the electric dipole amplitude induced by the parity violating ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
10 November 4, 2004 17:36 WSPC/INSTRUCTION FILE dpf_04 International Journal of Modern Physics A
 

Summary:  because of parity violation, but are given by: dN d cos #18; = N 0 2 (1 + #11;P p cos #18;); (1) where P p... of the CP asymme- tries #12;nds 0:3#2;10 4 #20;A#3;#20;0:4#2;10 4 and 0:2#2;10 4 #20;A#4;#20;0:1#2;10 4 . 4... by kaon CP measurements because hyperon CP violation probes both ...

  

Source: Fermilab Experiment E871 - CP Violation in Hyperon Decays

 

Collection: Physics

 
11 Discrete symmetries P, C, T (Srednicki, Chs. 40)
 

Summary:  Discrete symmetries P, C, T (Srednicki, Chs. 40) · Definitions: ­ Parity (P): x - -x ­ Charge... , C, and T separately ­ Weak: P and C "100%" violated; PC and T almost exact · All relativistic QFTs... /3 #12;What does it mean to say a theory is/is not parity invariant? · Let be column vector of fields

  

Source: Collins, John - Department of Physics, Pennsylvania State University

 

Collection: Physics

 
12 Rparity Violating SUSY Searches at the
 

Summary:  R­parity Violating SUSY Searches at the Fermilab Tevatron Greg Landsberg Brown University (for... @ the Tevatron" 2 Outline l R­parity Phenomenology l Current Constraints on R­parity Violation l HERA High Q 2... Event Excess Saga l Tevatron Searches for R­parity ...

  

Source: Landsberg, Greg - Department of Physics, Brown University

 

Collection: Physics

 
13 Frascati Physics Series Vol. VVVVVV (xxxx), pp. 000-000 DA NE 2004: Physics at meson factories { Frascati, June. 7-11 , 2004
 

Summary:  is sensitive to CP violation in both #4; and #3; decays: A#4;#3; #17; A#3; +A#4; #24; = #11;#3;#11;#4; #11... in their two-body nonleptonic weak decays. These distributions are not isotropic because of parity violation... asymmetries has val- ues ...

  

Source: Fermilab Experiment E871 - CP Violation in Hyperon Decays

 

Collection: Physics

 
14 LHCb 2004-009 February 2004
 

Summary:  Conserving (PC) and the Parity Violating (PV) parts. From this lagrangian, the matrix element describing... . While P(b) = P() = +1, the following relations can be inferred : = 0 P() = -1 = Parity Violation 2 #12... , this distribution violates parity symmetry because ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
15 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 16, NO. 7, JULY 1997 783 [16] Layout synthesis benchmark set, Microelectronics Center of North
 

Summary:  a transitive fan-in of more than one PO in a parity group, thus violating the constraints. Therefore, in SCLO... are in the same parity group, then this extraction will violate the constraints because y7 will fan out to both Z2... are detected using a parity-check code. The synthesis ...

  

Source: Touba, Nur A. - Department of Electrical and Computer Engineering, University of Texas at Austin

 

Collection: Computer Technologies and Information Sciences

 
16 The polynomial and linear time hierarchies in V0 Leszek Aleksander Kolodziejczyk
 

Summary:  of length |A|4 and thus contains a prefix parity for every such string. But (A) is true in Mi, since Ui... of X for any choice of auxiliary strings. Let (A) be the formula "for some X with |X| = |A|4... . This allows us to violate Theorem 3 by defining a bounded depth ...

  

Source: Academy of Sciences of the Czech Republic, Institute of Mathematics

 

Collection: Mathematics

 
17 The polynomial and linear time hierarchies in V0 Leszek Aleksander Kolodziejczyk
 

Summary:  as M for all strings of length |A|4 and thus contains a prefix parity for every such string. But (A... choice of auxiliary strings. 5 #12;Let (A) be the formula "for some X with |X| = |A|4, there is no prefix... correctly calculates parity(Xk+1) with too high (or too ...

  

Source: Academy of Sciences of the Czech Republic, Institute of Mathematics

 

Collection: Mathematics

 
18 Logic Synthesis Techniques for Reduced Area Implementation of Multilevel Circuits with Concurrent Error Detection
 

Summary:  resubstitution is considered) becomes a transitive fan-in of more than one PO in a parity group, thus violating... on a parity-check code scheme that can detect all errors caused by single stuck-at faults. These synthesis... reducing the cost of concurrent error detection. An algorithm is described for selecting a good ...

  

Source: Stanford University - Department of Computer Science, Center for Reliable Computing; Touba, Nur A. - Department of Electrical and Computer Engineering, University of Texas at Austin

 

Collection: Computer Technologies and Information Sciences

 
19 Ecient failure recovery in multi-disk multimedia servers Harrick M. Vin, Prashant J. Shenoy, and Sriram S. Rao
 

Summary:  : Reconstructed image for N = 4; 8; 12; 16 with a single disk failure A2 A3 A4 A1 A5 A6 A7 A8 A9 A10 A11 A12 A13 A... C14 C15 D1 D2 D3 D4 D5 D6 D7 D8 D9 D10 D11 D12 D13 D14 D15 A4 A8 A12 A1 A5 A9 A13 A2 A6 A10 A14 B1 B... for recovering from disk failure utilize either mirroring 2 or ...

  

Source: Shenoy, Prashant - Department of Computer Science, University of Massachusetts at Amherst

 

Collection: Computer Technologies and Information Sciences

 
20 Symmetries in Nature A glimpse into the beauty and art of science
 

Summary:  is ... The standard model of particle physics assumes the weak interaction is V A which maximally violates parity... "gauge" symmetry ... ... #12; History of parity #12; History of parity 1786: Kant debates... the nature of incongruent counterparts Hmmmm ... #12; History of ...

  

Source: 

 

Collection: Physics


Page:   2  3  4  5 
Page:   1  2  3  4  5 
 
21 FINITE STATE MACHINE SYNTHESIS WITH CONCURRENT ERROR DETECTION
 

Summary:  finite state machines with on-line parity checking is presented. The output logic and the next... -state logic of the finite state ma- chines are checked independently. By checking parity on the present state... specifica- tions. This paper also examines design choices with re- spect to parity prediction circuits. Two

  

Source: Stanford University - Department of Computer Science, Center for Reliable Computing

 

Collection: Computer Technologies and Information Sciences

 
22 Use of Parity Checks Inherent in LDPC Codes for Dominant Error Events Detection and k-Constraint Enforcement
 

Summary:  events at the output of trellis detectors, and once the parity constraints are violated, error event... on the hard decisions of the trellis detection soft output. Once the parity constraints are violated, we may... operation, when one parity constraint is violated ...

  

Source: Zhang, Tong - Department of Electrical, Computer and Systems Engineering, Rensselaer Polytechnic Institute

 

Collection: Engineering

 
23 A Flexible Hardware Encoder for Systematic Low-Density Parity-Check Codes
 

Summary:  A Flexible Hardware Encoder for Systematic Low-Density Parity-Check Codes Hemesh Yasotharan... --This paper proposes a flexible low density parity check encoder. This encoder simplifies the calculations... Density Parity Check (LDPC) [1] codes have been shown to perform extremely close to the Shannon limit

  

Source: Chan Carusone, Tony - Department of Electrical and Computer Engineering, University of Toronto

 

Collection: Engineering

 
24 VOLUME 78, NUMBER 20 P H Y S I C A L R E V I E W L E T T E R S 19 MAY 1997 Measurement of the Proton's Neutral Weak Magnetic Form Factor
 

Summary:  , Massachusetts 02139 (Received 24 February 1997) We report the first measurement of the parity-violating... be measured in parity-violating electron scattering, [2], thus providing information on the ss content... for the proton can be measured via elastic parity-violating electron scattering at backward angles [2

  

Source: Maryland at College Park, University of - Experimental Nuclear Physics Group

 

Collection: Physics

 
25 Vol. 39 (2008) ACTA PHYSICA POLONICA B No 2 THE DOWNFALL OF PARITY --THE REVOLUTION
 

Summary:  Rose Cafe near 125th and Broadway and discussed the possibility that parity could be violated in weak... of the experiments at Columbia. First readings confirming parity violation were obtained by Wu's team on December 27... . The hypothesis was rejected in 1933 by Pauli [42] because it would ...

  

Source: Magiera, Andrzej - Instytut Fizyki, Uniwersytet Jagiellonski

 

Collection: Physics

 
26 Greenberger-Horne-Zeilinger nonlocality in phase space P. van Loock and Samuel L. Braunstein
 

Summary:  ,a4 FIG. 1. Violations of the inequality BN 2 imposed by local realistic theories with the en... inequality for the cor- relation functions can be derived: 1 2 C a1 ,a2 ,a3 ,a4 C a1 ,a2 ,a3 ,a4 C a1 ,a2 ,a3... ...

  

Source: Braunstein, Samuel L. - Department of Computer Science, University of York (UK)

 

Collection: Computer Technologies and Information Sciences ; Physics

 
27 High Availability in Clustered Multimedia Servers Renu Tewari \Lambda Daniel M. Dias Rajat Mukherjee Harrick M. Vin
 

Summary:  a node. The stream­ ing RAID proposed by Tobagi et al. [20], divides the disks into parity groups 1... a parity group in a single cycle, but plays it out over n cycles, roughly halv­ ing the memory requirements... While they refer to parity groups as clusters of disks, we avoid this terminology as we focus

  

Source: Vin, Harrick M. - Department of Computer Sciences, University of Texas at Austin

 

Collection: Computer Technologies and Information Sciences

 
28 214 IEEE TRANSACTIONS ON MAGNETICS, VOL. 42, NO. 2, FEBRUARY 2006 Tensor-Product Parity Codes: Combination
 

Summary:  214 IEEE TRANSACTIONS ON MAGNETICS, VOL. 42, NO. 2, FEBRUARY 2006 Tensor-Product Parity Codes... Research, University of California at San Diego, La Jolla, CA 92093 USA A parity code and a distance... for magnetic recording. The tensor-product parity coding scheme helps to improve efficiency of the parity ...

  

Source: Siegel, Paul H. - Department of Electrical and Computer Engineering, University of California at San Diego

 

Collection: Engineering

 
29 The polynomial and linear hierarchies in V0 Leszek Aleksander Kolodziejczyk
 

Summary:  as M for all strings of length |A|4 and thus contains a prefix parity for every such string. But (A... of X for any choice of auxiliary strings. Let (A) be the formula "for some X with |X| = |A|4... a lower bound for bounded depth circuits computing prefix parity, ...

  

Source: Kolodziejczyk, Leszek - Instytut Matematyki, Uniwersytet Warszawski

 

Collection: Mathematics

 
30 A First Look at Systematic Uncertainties in a 12 GeV Moller Experiment
 

Summary:  Violation Scattering Experiment electron target (LH2) detector #12;Generic Parity Violation Scattering... Experiment #12;Generic Parity Violation Scattering Experiment #12;Generic Parity Violation Scattering... Experiment parityreversed ...

  

Source: Martin, Jeff - Kellogg Radiation Laboratory, California Institute of Technology

 

Collection: Physics

 
31 High Availability in Clustered Multimedia Servers Renu Tewari
 

Summary:  into parity groups1. In their scheme, entire par- ity groups are read out in one cycle and sent on the network... stripe scheme, reads a parity group in a single cycle, but plays it out over n cycles, roughly halv- ing... and or disk failures in such a 1While they refer to parity groups as clusters of disks, we avoid

  

Source: Vin, Harrick M. - Department of Computer Sciences, University of Texas at Austin

 

Collection: Computer Technologies and Information Sciences

 
32 Failure Recovery Algorithms for Multimedia Servers \Lambda Prashant J. Shenoy and Harrick M. Vin
 

Summary:  multiple blocks. 6 #12; A2 A3 A4 A1 A5 A6 A7 A8 A9 A10 A11 A12 A13 A14 A15 B1 B2 B3 B4 B5 B6 B7 B8 B9 B10 B... D11 D12 D13 D14 D15 A4 A8 A12 A1 A5 A9 A13 A2 A6 A10 A14 B1 B5 B9 B13 B2 B6 B10 B14 B3 B7 B11 B15 B4... are recovered from the replicas stored 13 #12; a1 a2 a3 ...

  

Source: Massachusetts at Amherst, University of - Architecture and Language Implementation; Vin, Harrick M. - Department of Computer Sciences, University of Texas at Austin

 

Collection: Computer Technologies and Information Sciences

 
33 Failure Recovery Algorithms for Multimedia Servers Prashant J. Shenoy and Harrick M. Vin
 

Summary:  multiple blocks. 6 #12;A2 A3 A4 A1 A5 A6 A7 A8 A9 A10 A11 A12 A13 A14 A15 B1 B2 B3 B4 B5 B6 B7 B8 B9 B10 B... D11 D12 D13 D14 D15 A4 A8 A12 A1 A5 A9 A13 A2 A6 A10 A14 B1 B5 B9 B13 B2 B6 B10 B14 B3 B7 B11 B15 B4... the replicas stored 13 #12;a1 a2 a3 a4 a5 mva a0 b1 ...

  

Source: Vin, Harrick M. - Department of Computer Sciences, University of Texas at Austin

 

Collection: Computer Technologies and Information Sciences

 
34 Sublinear Algorithms Sofya Raskhodnikova
 

Summary:  ( , ) is violated if < Proof: Every sorted partial list can be extended to a sorted list. 7 Claim. A 1-sided error... test can reject only if it finds a violated pair. 1 ? ? 4 ... 7 ? ? 9 #12;Yao's Principle Game [Jha... ] Lola's distribution is uniform over the following log lists: 8 Claim 2. Every pair ( , ) is violated

  

Source: Princeton University, Institute for Advanced Study, School of Mathematics

 

Collection: Mathematics

 
35 Vol. 39 (2008) ACTA PHYSICA POLONICA B No 2 PARITY NON-CONSERVATION
 

Summary:  of weak (parity violating) interaction terms in the nuclear Hamiltonian and precise calculations... of parity violation until now [3,4]. No other nucleus has been found where the parity non-conserving effect... obtained (presented in Fig. 2) show the parity-violating ...

  

Source: Magiera, Andrzej - Instytut Fizyki, Uniwersytet Jagiellonski

 

Collection: Physics

 
36 POSITIONAL DETERMINACY OF GAMES WITH INFINITELY MANY ERICH GRADEL AND IGOR WALUKIEWICZ
 

Summary:  ) by Player 0, which she now uses as her next move in the first play. There Player 0 responds by a4 = f(a0a1a2... that have been seen infinitely often; an important special case are parity games where the least (or... greatest) priority occurring infinitely often determines the winner. It is well-known that ...

  

Source: Graedel, Erich - Mathematische Grundlagen der Informatik, Fachgruppe Informatik, Rheinisch-Westfälische Technische Hochschule Aachen (RWTH)

 

Collection: Mathematics ; Computer Technologies and Information Sciences

 
37 Logical Methods in Computer Science Vol. 2 (4:6) 2006, pp. 122
 

Summary:  ) by Player 0, which she now uses as her next move in the first play. There Player 0 responds by a4 = f(a0a1a2... often; an important special case are parity games where the least (or greatest) priority occurring... infinitely often determines the winner. It is well-known that parity games are positionally ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
38 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 8, AUGUST 2006 1547 Short Papers
 

Summary:  , AUGUST 2006 1547 Short Papers Entropy-Driven Parity-Tree Selection for Low-Overhead Concurrent Error... --This paper presents discuss the problem of parity-tree selec- tion for performing concurrent error detection... based on compaction of the state/output bits of an FSM via parity trees and comparison to the correct

  

Source: Drineas, Petros - Department of Computer Science, Rensselaer Polytechnic Institute; Makris, Yiorgos - Department of Electrical Engineering, Yale University

 

Collection: Computer Technologies and Information Sciences ; Engineering

 
39 Sommerfeld Theory Colloquium Prof. Goran Senjanovic
 

Summary:  stands out: the one between left and right, called parity. Its breaking in beta decay created a bombshell... . The Standard Model is based on the premise of parity being broken al- ways, at all energies. I argue... the spectacular signatures of lepton number violation. Wednesday, 30 November 2011, 16:15h, Room A348

  

Source: Kersting, Roland - Fakultät für Physik, Ludwig-Maximilians-Universität München

 

Collection: Physics

 
40 COLLOQUE DE PHYSIQUE Colloque C6, suppl6ment au n022, Tome 51, 15 novembre 1990
 

Summary:  was used to determine the root-mean-squared parity-violating matrix element for the mixing of p- wave and S... -wavestates to be M = 0.58&:::: meV. This corresponds to a parity-violating spreading width of rPV= 1.0. 10-? e... and make parity violation easily observable. For instance, large ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics


Page:   1  2  3  4  5 
Page:   1  2  3  4  5 
 
41 Electric Dipole Moment of Atomic Yb Arising from an Electron-Nucleus Interaction Angom Dilip Singh, Bhanu Pratap Das, M. K. Samal
 

Summary:  dipole moment(EDM) of an atom implies simultaneous parity and time reversal violation. Within... radius as N (r) = 0/2 and a is related to the skin thickness t as t/a = 4 ln 3. 2 #12;Atomic Yb... the electron-correlation effects within {|i }. Introducing the parity and time- reversal(PT) ...

  

Source: Perger, Warren F. - Departments of Electrical and Computer Engineering & Physics, Michigan Technological University

 

Collection: Physics

 
42 Rebuilding for Array Codes in Distributed Storage Systems
 

Summary:  ,3, a2,4, a2,5, a4,5, a3,2 from the systematic nodes. Altogether, we send 16 blocks, the number... , the corresponding recovered blocks are: ax,1+x, ax,1, a2x,1, a3x,1+x, a3x,1, a4x,1, . . . , a(p-2)x,1+x, a(p-2)x,1... (one or more binary bits), and the parities are computed by XORing some ...

  

Source: Bruck, Jehoshua (Shuki) - Department of Electrical Engineering, California Institute of Technology; Winfree, Erik - Computer Science Department, California Institute of Technology

 

Collection: Biology and Medicine ; Computer Technologies and Information Sciences ; Engineering

 
43 CSC 310, Spring 2004 | Assignment #4 Due 4:00pm April 8 (drop it o in my oce, SS 6016A).
 

Summary:  /radford/310/a4-H on CDF contains the parity check matrix, H, for the code you should use. This code has rate 3... to be set at run time). The #12;le /u/radford/310/a4-r contains 50 received messages, obtained by erasing... the web page. You should try to decode the 50 messages in ...

  

Source: Roweis, Sam - Department of Computer Science, University of Toronto

 

Collection: Biology and Medicine ; Computer Technologies and Information Sciences

 
44 CSC 310, Spring 2004 --Assignment #4 Due 4:00pm April 8 (drop it off in my office, SS 6016A).
 

Summary:  a message if the decoded vector has no erasures, but is not a codeword. The file /u/radford/310/a4-H on CDF... at run time). The file /u/radford/310/a4-r contains 50 received messages, obtained by erasing the bits... . You should try to decode the 50 messages in a4-r. ...

  

Source: Roweis, Sam - Department of Computer Science, University of Toronto

 

Collection: Biology and Medicine ; Computer Technologies and Information Sciences

 
45 Paula Eerola Lund University 94 Space-time symmetries Particle Physics
 

Summary:  parity transformation if Parity is not an exact symmetry: it is violated in weak interaction => absolute... => x'= -x parity "handedness" (absolute generalized right/left) #12;Paula Eerola Lund University 95... Physics Parity Parity transformation is the ...

  

Source: Eerola, Paula - Division of Experimental High Energy Physics, Fysiska Institutionen, Lunds Universitet

 

Collection: Physics

 
46 OnLine Data Reconstruction In Redundant Disk Arrays A dissertation submitted to the Department of Electrical and Computer Engineering,
 

Summary:  _to_spare_space 214 A.4. adjust_params 215 Appendix B: Block Designs 217 B.1. Block designs on v > 43 217 B.2. Designs... techniques for parity­based arrays 47 3.1.2.1. Multiple independent groups 47 3.1.2.2. Distributing... the failure­induced workload 49 #12; vi 3.1.3. Summary 51 3.2. Disk array layouts for ...

  

Source: Carnegie Mellon University, Department of Electrical and Computer Engineering, Parallel Data Lab.

 

Collection: Computer Technologies and Information Sciences

 
47 On-Line Data Reconstruction In Redundant Disk Arrays A dissertation submitted to the Department of Electrical and Computer Engineering,
 

Summary:  _to_spare_space 214 A.4. adjust_params 215 Appendix B: Block Designs 217 B.1. Block designs on v > 43 217 B.2. Designs... techniques for parity-based arrays 47 3.1.2.1. Multiple independent groups 47 3.1.2.2. Distributing... the failure-induced workload 49 #12;vi 3.1.3. Summary 51 3.2. Disk array layouts for ...

  

Source: Carnegie Mellon University, Department of Electrical and Computer Engineering, Parallel Data Lab.

 

Collection: Computer Technologies and Information Sciences

 
48 Magnetic knots of deconfined CP-odd matter in heavy-ion collisions
 

Summary:  to local parity violating effects. These knots are stabilized by strong magnetic fields which induce... -ion collisions. For example, the quark- gluon plasma may contain parity-violating domains due to instanton... and sphaleron transitions. In the parity-violating background the external magnetic field B ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
49 Surface states and topological invariants in three-dimensional topological insulators: Application to Bi1-xSbx
 

Summary:  . Inversion-symmetric band structures are characterized by eight Z2 "parity invariants," which include... fermion parity," which specifies which surface TRIM are enclosed by an odd number of electron or hole... -state structure and the parity eigenvalues characterizing the bulk. Using this result, we make specific

  

Source: Kane, Charles - Department of Physics and Astronomy, University of Pennsylvania

 

Collection: Materials Science ; Physics

 
50 Measuring and Synthesizing Systems in Probabilistic Environments
 

Summary:  is clearly better than the value of system M1 for specification A. 4 Synthesizing Optimal Systems... -time algorithm for computing optimal strategies in MDPs with mean-payoff parity objectives. We present some... of Boolean thinking, where a system fails to satisfy a property if even a single behavior ...

  

Source: Jobstmann, Barbara - VERIMAG, Grenoble, France

 

Collection: Computer Technologies and Information Sciences

 
51 Nirmalya Parua Curriculum Vitae
 

Summary:  . D. in Physics, University of Mumbai, India, 1998 Dissertation : Search for R-parity violating... boards. R-parity violating SUSY search in dimuon channel & Search for Resonant Slepton Production through... R-parity Violation in the D0 Experiment. Both these ...

  

Source: Parua, Nirmalya - Fermi National Accelerator Laboratory

 

Collection: Physics

 
52 JOURNAL DE PHYSIQUE Colloque C3, supple'ment au no 11-12, Tome 34, Novembre-De'cernbre1973,page C3-33 LOW ENERGY AND NUCLEAR PHYSICS, P AND T VIOLATION*
 

Summary:  on the low energy and nuclear phenomena, in particular on the discussion of the parity violating nucleon... . Emphasis will be on the dis- cussions of the parity-violating nucleon-nucleon potential due to the P... consideration had never been given to parity until the discovery of the ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
53 Energy and MeanPayoff Parity Markov Decision Processes #
 

Summary:  Energy and Mean­Payoff Parity Markov Decision Processes # Krishnendu Chatterjee 1 and Laurent Doyen... Abstract. We consider Markov Decision Processes (MDPs) with mean­payoff parity and energy parity objectives... . In system design, the parity objective is used to encode #­regular specifications, while the ...

  

Source: Ecoles Normales Supérieures de Cachan, Laboratoire Spécification et Vérification

 

Collection: Computer Technologies and Information Sciences

 
54 Energy and Mean-Payoff Parity Markov Decision Processes
 

Summary:  Energy and Mean-Payoff Parity Markov Decision Processes Krishnendu Chatterjee1 and Laurent Doyen2... Abstract. We consider Markov Decision Processes (MDPs) with mean-payoff parity and energy parity objectives... . In system design, the parity objective is used to encode -regular specifications, while the mean

  

Source: Ecoles Normales Supérieures de Cachan, Laboratoire Spécification et Vérification

 

Collection: Computer Technologies and Information Sciences

 
55 Tests for Time Reversal Violation E. Di Salvo1,2
 

Summary:  interactions. But this equality is forbidden by parity violation of weak interactions. Therefore, as regards... non-leptonic decays where more spinning particles are involved, parity violation automatically implies... . As an example, consider the decay - p. Parity ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
56 Atomic Parity Violation Junghyun Lee
 

Summary:  Atomic Parity Violation Junghyun Lee APV proposes new physics beyond the standard model... prominent when one discovers parity violation or parity non-conservation (PNC) such as mirror symmetry... , the existence of parity-violation effects was in complete ...

  

Source: Rosner, Jonathan L. - Enrico Fermi Institute & Department of Physics, University of Chicago

 

Collection: Physics

 
57 JOURNAL DE PHYSIQUE Colloque C3, supplement au n3, Tome 15, mars 198f page C3-99
 

Summary:  and preliminary test results are given. Introduction The search for a parity violation in the NN system (n... accurate detectors The low energy beam fed from the PN7 apparatus (A'' = 4.5 AO) allows the scatte- ring... -p interaction) is based on the hypothesis of the universality of weak interaction ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
58 Parity Lost and Parity Regained Andrew Krioukov # , Lakshmi N. Bairavasundaram # , Garth R. Goodson + , Kiran Srinivasan + ,
 

Summary:  Parity Lost and Parity Regained Andrew Krioukov # , Lakshmi N. Bairavasundaram # , Garth R. Goodson... model checking to evaluate whether common protection techniques used in parity­based RAID systems... . In particular, we identify a parity pol­ lution problem that spreads corrupt data (the result of a ...

  

Source: Liblit, Ben - Department of Computer Sciences, University of Wisconsin at Madison

 

Collection: Computer Technologies and Information Sciences

 
59 Parity Lost and Parity Regained Andrew Krioukov
 

Summary:  Parity Lost and Parity Regained Andrew Krioukov , Lakshmi N. Bairavasundaram , Garth R. Goodson... model checking to evaluate whether common protection techniques used in parity-based RAID systems... . In particular, we identify a parity pol- lution problem that spreads corrupt data (the result of a single ...

  

Source: Liblit, Ben - Department of Computer Sciences, University of Wisconsin at Madison

 

Collection: Computer Technologies and Information Sciences

 
60 On the Computation of the Minimum Distance of Low-Density Parity-Check Codes
 

Summary:  to find nearby codewords under the constraint of t5c8Ä" . A.4 Generalization The single-position impulse... On the Computation of the Minimum Distance of Low-Density Parity-Check Codes Xiao­Yu Hu and Marc... Email: marc@spectra.eng.hawaii.edu Abstract-- Low-density parity-check (LDPC) codes in their ...

  

Source: MacKay, David J.C. - Cavendish Laboratory, University of Cambridge

 

Collection: Engineering ; Computer Technologies and Information Sciences


Page:   1  2  3  4  5 
Page:   1  2  3  4  5 
 
61 Qweak: a parityviolation experiment Jeff Martin
 

Summary:  Experiment U. Winnipeg #12; MiniReview from Last Class Precise Parity Violation Experiment > Precision... up this experiment (systematic errors) #12; Generic Parity Violation Scattering Experiment... electron target (LH2) detector #12; Generic Parity ...

  

Source: Martin, Jeff - Kellogg Radiation Laboratory, California Institute of Technology

 

Collection: Physics

 
62 Finitary Winning in #Regular Games # Krishnendu Chatterjee 1 and Thomas A. Henzinger 1,2
 

Summary:  ) that ensures that the finitary parity objective is violated against all player 1 strategies. Similar to games... games with finitary parity and Streett (fairness) objectives. We prove the de­ terminacy of these games... will not do anything ``bad'' (such as violate an invariant) within any finite number of ...

  

Source: Henzinger, Thomas A. - Faculté Informatique et Communications, Ecole Polytechnique Fédérale de Lausanne

 

Collection: Computer Technologies and Information Sciences

 
63 Finitary Winning in -Regular Games Krishnendu Chatterjee1
 

Summary:  is violated against all player 1 strategies. Similar to games with infinitary parity objectives, we establish... games with finitary parity and Streett (fairness) objectives. We prove the de- terminacy of these games... will not do anything "bad" (such as violate an invariant) within any finite number of ...

  

Source: Henzinger, Thomas A. - Faculté Informatique et Communications, Ecole Polytechnique Fédérale de Lausanne

 

Collection: Computer Technologies and Information Sciences

 
64 arXiv:hep-ph/9810536v212Nov1998 SLAC-PUB-7853
 

Summary:  October 1998 (S)neutrino properties in R-parity violating supersymmetry: I. CP-conserving Phenomena Yuval... Fermi National Accelerator Laboratory, P.O. Box 500, Batavia, IL 60510 Abstract R-parity-violating supersymmetry... ) violating in- teractions. We examine in detail the structure of the most general ...

  

Source: Belanger, David P. - Physics Department, University of California at Santa Cruz

 

Collection: Physics

 
65 Uniform Solution of Parity Games on Prefix-Recognizable Thierry Cachat
 

Summary:  `Ytacbud@¡(' x9¤eA ¤© © ¤`4 . X`Ytacbud@¡('gx¤eA ¤© © ¤`4 X`YacbcdU¡(' ¤eA ¤© © ¤`4 X`YacbcdU¡('Ut ¤e... ¤© © ¤`4 , by choosing always ¡© ¤52 ' x I§ after a ¢¡b Y node, and, of course, going from 'qx A to ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
66 Introduction In physics, the discrete symmetries Charge conjugation (C), Parity (P) and Time
 

Summary:  understanding open. For instance, the number of particle generations, the origin of parity violation... in the universe, called baryogenesis. In the SM the combined charge conjugation and parity symmetry is violated... particle would violate parity P and time ...

  

Source: Groningen, Rijksuniversiteit - Centre for Ecological and Evolutionary Studies, Department of Marine Benthic Ecology and Evolution,

 

Collection: Biology and Medicine ; Environmental Sciences and Ecology

 
67 XXIV Physics in Collision -Boston, June 27-29, 2004 THE SEARCH FOR CP VIOLATION IN HYPERON DECAYS
 

Summary:  . These distribu- tions are not isotropic because of parity violation, but are given by: dN d cos #18; = N 0 2 (1... that range from 0:3#2;10 4 #20;A #3; #20;0:4#2;10 4 and 0:2#2;10 4 #20;A #4; #20;0:1#2;10 4 [6... hyperon CP violation probes both parity-conserving ...

  

Source: Fermilab Experiment E871 - CP Violation in Hyperon Decays

 

Collection: Physics

 
68 On the utility of fast transforms in parity-mixed PDEs: Part I. Numerical techniques and analysis
 

Summary:  to preserve the applicability (accuracy) of fast transforms under parity violating operations (e.g, Examples 1... , (A.3) we find (after some standard manipulation) that, Id(z; ) = 2 arctan 2 sin(z) 1 - 2 . (A.4... On the utility of fast transforms in parity-mixed PDEs: Part I. Numerical ...

  

Source: Julien, Keith - Department of Applied Mathematics, University of Colorado at Boulder

 

Collection: Physics ; Mathematics

 
69 International Conference on Dependable Systems & Networks: Anchorage, Alaska, June 24-27 2008 Enhancing Data Availability in Disk Drives through Background Activities*
 

Summary:  by adding redundancy. Data re- dundancy is traditionally provided using parity locally in the form of disk... recovery technique that adds another level of redundancy in the data by adding parity for sets (segments... ), because the parity must be updated. Consequently, both scrubbing and intra-disk parity ...

  

Source: Riska, Alma - Seagate Research Center

 

Collection: Engineering

 
70 LH*RS: A High-Availability Scalable Distributed Data Structure using Reed Solomon Codes
 

Summary:  , we form the vector a = (5,1,4,9) and multiply by G to obtain code word u = (5,1,4,9,F,8,A,4,B,1... *RS are basically these of the well-known LH* SDDS. LH*RS manages in addition the parity information to tolerate... decline. The parity calculus uses the Reed-Solomon Codes. The storage and access performance ...

  

Source: Paris-Dauphine, Université - Centre d'Etude et de Recherche en Informatique Appliquée

 

Collection: Computer Technologies and Information Sciences

 
71 COLLOQUE DE PHYSIQUE Colloque C6, suppl6ment au n022, Tome 51, 15 novembre 1990
 

Summary:  COLLOQUE DE PHYSIQUE Colloque C6, suppl6ment au n022, Tome 51, 15 novembre 1990 PARITY VIOLATION... -nucleon system and light nuclei, which isolate the weak interaction via its parity-violating signature. The weak... respected by the strong interaction, such as parity violation or quark ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
72 Experimental Violation of Bell's Inequality in Spatial-Parity Space Timothy Yarnall,1
 

Summary:  Experimental Violation of Bell's Inequality in Spatial-Parity Space Timothy Yarnall,1 Ayman F... -4307, USA (Received 21 July 2007; published 26 October 2007) We report the first experimental violation... generated via optical spontaneous parametric down-conversion are shown to be entangled in the parity

  

Source: Teich, Malvin C. - Departments of Biomedical Engineering & Electrical and Computer Engineering, Boston University

 

Collection: Biology and Medicine

 
73 International Europhysics Conference on HEP PROCEEDINGS
 

Summary:  | the experiment is by necessity sensitive to CP violation in both: A#4;#3; = #11;#4;#11;#3; #11; #4; #11; #3; #11... observable being A#4;#3; = (#11;#4; #11;#3; #11; #4; #11; #3; )=(#11; #4;#11;#3; + #11; #4; #11; #3... ;#4;#11;#3;+#11; #4; #11; #3; #24; = ...

  

Source: Virginia, University of - Department of Physics, Antimatter Asymmetry Group

 

Collection: Physics

 
74 LowDensity ParityCheck Codes Robert G. Gallager
 

Summary:  Low­Density Parity­Check Codes Robert G. Gallager 1963 #12; Preface The Noisy Channel Coding... . . . . . . . . . . . . . . . 4 1.2 Low­Density Parity­Check Codes . . . . . . . . . . . . . . . . . . 7 1.3 Summary of Results... .1 Equiprobable Ensemble of Parity­Check Codes . . . . . . . . . . 11 2.2 Distance Properties of ...

  

Source: MacKay, David J.C. - Cavendish Laboratory, University of Cambridge

 

Collection: Engineering ; Computer Technologies and Information Sciences

 
75 A Deterministic Subexponential Algorithm for Parity by M. Jurdziski, M. Paterson and U. Zwick
 

Summary:  \reachi (A)) 4 if Wj = then (Wi , Wj) (V (G) , ) 5 else 1 (W0 , W1 ) win G\reachj Wj 2 (Wi , Wj ) (Wi , V... A Deterministic Subexponential Algorithm for Parity Games by M. Jurdziski, M. Paterson and U. Zwick... (Presented by Dean DoronTel Aviv University)Parity Games December 2011 1 / 33 #12;Outline of ...

  

Source: Rabinovich, Alexander - School of Computer Science, Tel Aviv University

 

Collection: Computer Technologies and Information Sciences

 
76 Qualitative Concurrent Parity Games Krishnendu Chatterjee
 

Summary:  when = 0, and the simplified situation is 12 #12;a3 [0] a1 b1 b2 b3 b4 b1 b2 b3 b4a4 a3 a2 a1 s1 : s3... : [2 ] [1] [] [1] a4 a2 [1] [0] [0] [0] b1 b2 b3 b4a4 a3 a2 a1 s2 : a a b b Dest(s, a, b) X = Arrow... Qualitative Concurrent Parity Games ...

  

Source: de Alfaro, Luca - Department of Computer Engineering, University of California at Santa Cruz

 

Collection: Computer Technologies and Information Sciences

 
77 Shameless Advertising: Particle Physics Week at UWinnipeg
 

Summary:  the weak force. ­ It's so darn weak. ­ It violates parity (mirror symmetry). ­ It is perhaps the most... the same when viewed in the mirror. mirror This is called "parity violation" In fact, that... 's how we isolate the weak force. #12; Halftime: MiniReview Precise ...

  

Source: Martin, Jeff - Kellogg Radiation Laboratory, California Institute of Technology

 

Collection: Physics

 
78 LH*RS A Highly-Available Scalable Distributed Data Structure
 

Summary:  211 c2 67 D2 59 e2 95 F2 213 83 247 93 119 a3 91 b3 171 c3 216 D3 82 e3 176 F3 233 84 140 94 38 a4 149... -availability management uses a novel parity calculus that we have developed, based on the Reed-Salomon erasure correcting... coding. The resulting parity storage overhead is about the minimal ever ...

  

Source: Paris-Dauphine, Université - Centre d'Etude et de Recherche en Informatique Appliquée

 

Collection: Computer Technologies and Information Sciences

 
79 IEEE TMNSACTTONS OK AUTOMATIC CONTROL, VOL. AC-29,NO. 7. JULY 1984 603 Analytical Redundancy and the Design of
 

Summary:  the parity relati& involving it will be violated,' while those excluding it will still hold. This means... the component that is common to all violated parity relations is readily identified as failed. This is the basic... , then -violation of all parity ...

  

Source: Willsky, Alan S. - Computer Science and Artificial Intelligence Laboratory & Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (MIT)

 

Collection: Computer Technologies and Information Sciences

 
80 A Study of Domino-Parity and k-Parity Constraints for the TSP
 

Summary:  that the support graph G is planar. For this we proceed in three steps. First, we characterize violated k-parity... inequalities. Second, we characterize violated k-parity inequalities under the ad- ditional assumptions... handled clique-trees are super-connected. 3.1 Characterizations of ...

  

Source: Cook, William - School of Industrial and Systems Engineering, Georgia Institute of Technology

 

Collection: Computer Technologies and Information Sciences


Page:   1  2  3  4  5 
Page:   1  2  3  4  5 
 
81 Progressive Parity-Based Hardening of Data Stores Ahmed Amer Jehan-Francois P^aris Darrell D. E. Long Thomas Schwarz
 

Summary:  B3D3 C4 A4B4 D4 Declustering Figure 3: Declustering data across devices aids in reducing recovery... Progressive Parity-Based Hardening of Data Stores Ahmed Amer Jehan-Franc¸ois P^aris Darrell D. E... Cruz §Santa Clara University Abstract We propose the use of parity-based redundant data lay- outs

  

Source: Pâris, Jehan-François - Department of Computer Science, University of Houston

 

Collection: Computer Technologies and Information Sciences

 
82 arXiv:hepph/0512169 hep-ph/0512169
 

Summary:  )(#22;sd) (V A) (#22;sd) (V A) ; (4.29) where x i = m 2 i =M 2 WL , m i and m j are the masses... ;(#22;sd) (V A) (#22;sd) (V A) ; (4.30) where e S 0 (x i ; x j ) = F (x i ; x i ; MWL ) 2F (x i ; x j ; MWL... in the equations in [18], and removed also the contributions from diagrams that ...

  

Source: Cornell University, Floyd R. Newman Laboratory of Nuclear Studies (LNS)

 

Collection: Physics

 
83 1962 IRE TRANSACTIONS ON INFORMATION THEORY 21 Low-Density Parity-Check Codes*
 

Summary:  , and 11 would be violated, and all three parity-check equations checking digit 1 would be violated... be violated. To see how an arbitrary digit d can be corrected even if its parity-check sets contain more than... is changed whenever b or more of the parity-check ...

  

Source: Li, Tiffany Jing - Department of Electrical and Computer Engineering, Lehigh University

 

Collection: Engineering

 
84 Laboratoire Specification & Verification Ecole Normale Superieure de Cachan
 

Summary:  parity automaton recognizing W, and thus B is of size O(|A|4 +|V |+3). By [11], since the Rabin pairs... (v))c ) if (q) c Fig. 1. Transitions for AC . there exists an alternating tree automaton B of size O(|A|4... · |A (QA )| = O(|A|4 ). (1) ...

  

Source: Berwanger, Dietmar - Laboratoire Spécification et Vérification, Ecole Normale Supérieure de Cachan

 

Collection: Computer Technologies and Information Sciences

 
85 Synthesizing Interconnect-Efficient Low Density Parity Check Codes
 

Summary:  . A larger height means longer wires and therefore, greater interconnect capacitance, (a) 4 5 7 8 89 8 7 1 2... Synthesizing Interconnect-Efficient Low Density Parity Check Codes Marghoob Mohiyuddin... codes, low-density parity-check codes, routing congestion. 1. INTRODUCTION Error correcting codes

  

Source: Aziz, Adnan - Department of Electrical and Computer Engineering, University of Texas at Austin

 

Collection: Computer Technologies and Information Sciences

 
86 "Anatomy" of the CP violation Author:Denis Golez
 

Summary:  |, |A4|). But in the last diagram is a loop, where the contribution of the new physics can be included... Seminar "Anatomy" of the CP violation Author:Denis Golez Menthor: prof. dr. Svjetlana Fajfer... Ljubljana, February 2010 Abstract The origin of the CP violation in the standard model is briefly described

  

Source: Prosen, Tomaž - Department of Physics, University of Ljubljana

 

Collection: Physics

 
87 Biographical Sketch: Tsung Dao Lee (published under T.D. Lee) is a Chineseborn American physicist well known
 

Summary:  well known for his work on parity violation, the Lee Model, the KinoshitaLeeNauenberg (KLN) theorem... . In 1957, at the age of 31, Lee shared the Nobel Prize in Physics for violation of parity law in weak... an indication of a 2 standard deviation effect of possible parity ...

  

Source: Qian, Ning - Center for Neurobiology and Behavior & Department of Physiology and Cellular Biophysics, Columbia University

 

Collection: Biology and Medicine

 
88 Parity Declustering for Continuous Operation in Redundant Disk Arrays We describe and evaluate a strategy for declustering the
 

Summary:  that violates our distributed parity criterion (3). To resolve this violation, we derive a layout as above... Parity Declustering for Continuous Operation in Redundant Disk Arrays Abstract We describe... and evaluate a strategy for declustering the parity encoding in a redundant disk ...

  

Source: Carnegie Mellon University, Department of Electrical and Computer Engineering, Parallel Data Lab.

 

Collection: Computer Technologies and Information Sciences

 
89 Parity Declustering for Continuous Operation in Redundant Disk Arrays We describe and evaluate a strategy for declustering the
 

Summary:  -1. It is apparent from Figure 2-3 that this approach pro- duces a layout that violates our distributed parity... Parity Declustering for Continuous Operation in Redundant Disk Arrays Abstract We describe... and evaluate a strategy for declustering the parity encoding in a redundant disk array. This ...

  

Source: Carnegie Mellon University, Department of Electrical and Computer Engineering, Parallel Data Lab.

 

Collection: Computer Technologies and Information Sciences

 
90 This paper describes and evaluates two algorithms for performing online failure recovery (data reconstruction)
 

Summary:  violate these requirements. The declustered parity disk array organization [Muntz90, Holland92, Merchant92... architectures: the RAID level 5 organization, and the declustered parity organization. The benefits of the disk... achieved either by disk mirroring [Bitton88, Cope­ land89], or parity encoding ...

  

Source: Carnegie Mellon University, Department of Electrical and Computer Engineering, Parallel Data Lab.

 

Collection: Computer Technologies and Information Sciences

 
91 This paper describes and evaluates two algorithms for performing on-line failure recovery (data reconstruction)
 

Summary:  . The long queueing delays caused by saturation can violate these requirements. The declustered parity disk... architectures: the RAID level 5 organization, and the declustered parity organization. The benefits of the disk... achieved either by disk mirroring [Bitton88, Cope- land89], or parity encoding ...

  

Source: Carnegie Mellon University, Department of Electrical and Computer Engineering, Parallel Data Lab.

 

Collection: Computer Technologies and Information Sciences

 
92 LAPP-EXP 2000-09 November 2000
 

Summary:  LAPP-EXP 2000-09 November 2000 Search for R{parity Violating Decays of Supersymmetric Particles... particles decaying with a single non{zero trilinear R{parity violating coupling, in e+ e; collisions ranging... FOR R{PARITY VIOLATING DECAYS OF SUPERSYMMETRIC PARTICLES ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
93 Hyperfine Interact (2006) 172:4551 DOI 10.1007/s10751-007-9523-6
 

Summary:  stems from parity-violating nucleon­nucleon interactions. To get a larger observable, and more... importantly, to obtain a parity-violating signature in the experiment, the interference between the anapole... .V., Sarkisyan, D.: New manifestation of atomic parity violation in cesium: a chiral optical gain ...

  

Source: Orozco, Luis A. - Department of Physics, University of Maryland at College Park

 

Collection: Physics

 
94 Fairness Through Awareness Cynthia Dwork
 

Summary:  µx = M(x) (A). 4 #12;opt(I) def = min {µx}xV ¾ xV ¾ aµx L(x, a) (2) subject to x, y V, : D(µx, µy... ) d(x, y) (3) x V : µx (A) (4) Figure 1: The Fairness LP: Loss minimization subject to fairness... , that is, the extent to which any Lipschitz mapping can violate statistical ...

  

Source: Zemel, Richard - Department of Computer Science, University of Toronto

 

Collection: Computer Technologies and Information Sciences

 
95 Design Issues Scalable Availability LH* Schemes with Record Grouping1
 

Summary:  ,4,4,4,4,4,4,4,4,4,4,4,4,0). Next vector a is (5,1,4,9) leading to u = (5,1,4,9,F,8,A,4,B,1,1,2,7,E,9... a different data storage site (data bucket). Each group has n 1 parity records, each in a different parity... , by messages sent to buckets with parity records. Three SDDS schemes ...

  

Source: Argonne National Laboratory, Mathematics and Computer Science Division (MCS); Paris-Dauphine, Université - Centre d'Etude et de Recherche en Informatique Appliquée; Risch, Tore - Department of Information Technology, Uppsala Universitet

 

Collection: Computer Technologies and Information Sciences ; Mathematics

 
96 Attribute dependencies, understandability and split selection in tree based Marko Robnik
 

Summary:  ­ tant attributes: f = A 1 2A 2 + 3A 3 3A 4 . The at­ tributes are continuous with values chosen randomly... ­ amples defined in Boolean space. 1. Let class value be defined as XOR (parity) of two at­ tributes C = X... F's estimate to number of nearest neighbors taken into account. The estimates are for a ...

  

Source: Robnik-Sikonja, Marko - Faculty of Computer and Information Science, University of Ljubljana

 

Collection: Computer Technologies and Information Sciences

 
97 An Accelerated Algorithm for 3Color Parity Games with an Application to Timed Games #
 

Summary:  B: bool var cA, dA, cB, dB: clock oinv: (activeA ­> dA <= 3) & (activeB ­> dB <= 5) iinv: (cA <= 4) & (c... ' & doneB' } input periodA: { local: doneA & cA = 4 ==> cA' := 0, doneA' := false } input periodB: { local... An Accelerated Algorithm for 3­Color ...

  

Source: de Alfaro, Luca - Department of Computer Engineering, University of California at Santa Cruz

 

Collection: Computer Technologies and Information Sciences

 
98 An Accelerated Algorithm for 3Color Parity Games with an Application to Timed Games #
 

Summary:  B: bool var cA, dA, cB, dB: clock oinv: (activeA ­> dA <= 3) & (activeB ­> dB <= 5) iinv: (cA <= 4) & (c... ' & doneB' } input periodA: { local: doneA & cA = 4 ==> cA' := 0, doneA' := false } input periodB: { local... An Accelerated Algorithm for 3­Color ...

  

Source: Faella, Marco - Computer Science Division, Dipartimento di Scienze Fisiche, Università degli Studi di Napoli "Federico II"

 

Collection: Computer Technologies and Information Sciences

 
99 An Accelerated Algorithm for 3-Color Parity Games with an Application to Timed Games
 

Summary:  A, doneB: bool var cA, dA, cB, dB: clock oinv: (activeA -> dA <= 3) & (activeB -> dB <= 5) iinv: (cA <= 4... ' & doneB' } input periodA: { local: doneA & cA = 4 ==> cA' := 0, doneA' := false } input periodB: { local... An Accelerated Algorithm for 3-Color ...

  

Source: Faella, Marco - Computer Science Division, Dipartimento di Scienze Fisiche, Università degli Studi di Napoli "Federico II"

 

Collection: Computer Technologies and Information Sciences

 
100 An Accelerated Algorithm for 3-Color Parity Games with an Application to Timed Games
 

Summary:  ) iinv: (cA <= 4) & (cB <= 9) input startA : { local: ~doneA & ~activeA & ~cpu ==> activeA' := true, cpu... B' & ~cpu' & doneB' } input periodA: { local: doneA & cA = 4 ==> cA' := 0, doneA' := false } input period... An Accelerated Algorithm for 3-Color ...

  

Source: de Alfaro, Luca - Department of Computer Engineering, University of California at Santa Cruz

 

Collection: Computer Technologies and Information Sciences


Page:   1  2  3  4  5