Results for "Michael Sadovsky"

total 25795took 0.18s
Eight-cluster structure of chloroplast genomes differs from similar one observed for bacteriaFeb 08 2018Previously, a seven-cluster pattern claiming to be a universal one in bacterial genomes has been reported. Keeping in mind the most popular theory of chloroplast origin, we checked whether a similar pattern is observed in chloroplast genomes. Surprisingly, ... More
The simplest model of spatially distributed population with reasonable migration of organismsOct 02 2005The simplest model of a smart spatial redistribution of individuals is proposed. A single-species population is considered, to be composed of two discrete subpopulations inhabiting two stations; migration is a transfer between them. The migration is not ... More
The role of blood circulatory system in thermal regulation of animals explained by entropy production analysisAug 16 2013A novel model of thermal regulation of homoeothermic animals has been implemented. The model is based on a non-equilibrium thermodynamic approach which introduces entropy balance and the rate of entropy generation as a formulation of The Second Law. The ... More
A relative information approach to financial time series analysis using binary $N$-grams dictionariesAug 13 2013Here we present a novel approach to statistical analysis of financial time series. The approach is based on $n$-grams frequency dictionaries derived from the quantized market data. Such dictionaries are studied by evaluating their information capacity ... More
Evidence for strong co-evolution of mitochondrial and somatic genomesMay 20 2014We studied a relations between the triplet frequency composition of mitochondria genomes, and the phylogeny of their bearers. First, the clusters in 63dimensional space were developed due to $K$-means. Second, the clade composition of those clusters has ... More
New Error Tolerant Method to Search Long Repeats in Symbol SequencesApr 05 2016A new method to identify all sufficiently long repeating substrings in one or several symbol sequences is proposed. The method is based on a specific gauge applied to symbol sequences that guarantees identification of the repeating substrings. It allows ... More
Dynamic origin of speciesApr 24 2008A simple model of species origin resulted from dynamic features of a population, solely, is developed. The model is based on the evolution optimality in space distribution, and the selection is gone over the mobility. Some biological issues are discussed. ... More
Information Capacity of Biological Macromoleculae ReloadedJan 10 2005Information capacity of a symbol sequence is a measure of the unexpectedness of a continuation of given string of symbols. Continuation of a string is determined through the maximum entropy of the reconstructed frequency dictionary; the capacity, in turn, ... More
Reflexive spatial behaviour does not guarantee evolution advantage in prey--predator communitiesMay 12 2014We consider the model of spatially distributed population consisting of two species with "\textsl{predator\,--\,prey}" interaction; each of the species occupies two stations. Transfer of individuals between the stations (migration) is not random and yields ... More
Towards the Typology of Elections at RussiaJun 24 2007A distinction in reasons and motives for choosing a particular political leader establishes the key difference between older and young democracy. The former is based on electoral history, while the latter is based on feelings and personal attitude. Besides, ... More
Codon Usage Bias Measured Through Entropy ApproachJun 14 2007Codon usage bias measure is defined through the mutual entropy calculation of real codon frequency distribution against the quasi-equilibrium one. This latter is defined in three manners: (1) the frequency of synonymous codons is supposed to be equal ... More
GIS-aided simulation of spatial distribution of some pollutants at "Stolby" state reservationDec 10 2005Reserved territories seem to be best reference sites of wildnature, where the long-term observations are carried out. Simulation model of spatially distributed processes of contamination of the state reservation is developed, and the dynamics of some ... More
Simple Model of Complex Reflection Behaviour in Two-Species CommunityJun 14 2007The model of smart migration for two-species community is developed, where the individuals implement reflexive strategy of spatial redistribution. Simulations have been used to figure out the situations where reflexy gives an advantage over a non-reflexive ... More
Intriguing symmetry in statistical structures of Siberian larch transcriptomeMar 31 2016The paper presents a novel approach to infer a structuredness in a set of symbol sequences such as transcriptome nucleotide sequences. A distribution pattern of triplet frequencies in the Siberian larch (\textit{Larix sibirica}~Ledeb.) transcriptome sequences ... More
Chloroplast Genome Yields Unusual Seven-Cluster Structure CApr 15 2016We studied the structuredness in a chloroplast genome of Siberian larch. The clusters in 63-dimensional space were identified with elastic map technique, where the objects to be clusterized are the different fragments of the genome. A seven-cluster structure ... More
New symmetry in nucleotide sequencesMar 05 2005Information valuable words are the strings with the significant deviation of real frequency from the expected one. The expected frequency is determined through the maximum entropy principle of the reconstructed (extended) frequency dictionary of strings ... More
Coherent gamma-gamma and gamma-A interactions in very peripheral collisions at relativistic ion collidersDec 14 2001Due to coherence, there are strong electromagnetic fields of short duration in very peripheral collisions. They give rise to photon-photon and photon-nucleus collisions with a high flux up to an invariant mass region hitherto unexplored experimentally. ... More
Direct Photon Identification with Artificial Neural Network in the Photon Spectrometer PHOSOct 29 2004A neural network method is developed to discriminate direct photons from the neutral pion background in the PHOS spectrometer of the ALICE experiment at the LHC collider. The neural net has been trained to distinguish different classes of events by analyzing ... More
CPT and Other Symmetries in String/M TheorySep 20 2004Feb 05 2005We initiate a search for non-perturbative consistency conditions in M theory. Some non-perturbative conditions are already known in Type I theories; we review these and search for others. We focus principally on possible anomalies in discrete symmetries. ... More
Linear programming methods for exponential dominationJan 19 2018For a graph $G,$ we consider $D \subset V(G)$ to be a porous exponential dominating set if $1 \le \sum_{d \in D}$ $\left( \tfrac{1}{2} \right)^{dist(d,v) -1}$ for every $v \in V(G),$ where $dist(d,v)$ denotes the length of the shortest $dv$ path. The ... More
Comparison between step strains and slow steady shear in a bubble raftDec 20 2004We report on a comparison between stress relaxations after an applied step strain and stress relaxations during slow, continuous strain in a bubble raft. A bubble raft serves as a model two-dimensional foam and consists of a single layer of bubbles on ... More
The periodic Floer homology of a Dehn twistOct 04 2004May 02 2005The periodic Floer homology of a surface symplectomorphism, defined by the first author and M. Thaddeus, is the homology of a chain complex which is generated by certain unions of periodic orbits, and whose differential counts certain embedded pseudoholomorphic ... More
A Variant of K-theory: K_{+-}Feb 11 2003We describe a variant of K-theory for spaces with involution, built from vector bundles which are sent to their negative under the involution.
Evaluation of Contactless Smartcard AntennasJul 23 2015This report summarizes the results of our evaluation of antennas of contactless and dual interface smartcards and our ideas for user-switchable NFC antennas. We show how to disassemble smartcards with contactless capabilities in order to obtain the bare ... More
On Covert Acoustical Mesh Networks in AirJun 04 2014Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. We construct a covert channel between different computing systems that utilizes audio ... More
Open Mobile API: Accessing the UICC on Android DevicesJan 12 2016This report gives an overview of secure element integration into Android devices. It focuses on the Open Mobile API as an open interface to access secure elements from Android applications. The overall architecture of the Open Mobile API is described ... More
Hysteresis and phase transitions in a lattice regularization of an ill-posed forward-backward diffusion equationOct 18 2016We consider a lattice regularization for an ill-posed diffusion equation with trilinear constitutive law and study the dynamics of phase interfaces in the parabolic scaling limit. Our main result guarantees for a certain class of single-interface initial ... More
An algorithm for quantifying dependence in multivariate data setsJul 04 2012Sep 27 2012We describe an algorithm to quantify dependence in a multivariate data set. The algorithm is able to identify any linear and non-linear dependence in the data set by performing a hypothesis test for two variables being independent. As a result we obtain ... More
Logic Programming with Graph Automorphism: Integrating naut with Prolog (Tool Description)Jul 17 2016Aug 01 2016This paper presents the plnauty~library, a Prolog interface to the nauty graph-automorphism tool. Adding the capabilities of nauty to Prolog combines the strength of the "generate and prune" approach that is commonly used in logic programming and constraint ... More
Slow Steady-Shear of Plastic Bead RaftsOct 12 2004Experimental measurements of the response of a two dimensional system of plastic beads subjected to steady shear are reported. The beads float at the surface of a fluid substrate and are subjected to a slow, steady-shear in a Couette geometry. The flow ... More
Asymmetric response of a jammed plastic bead raftMay 18 2006Fluctuation-dissipation relations have received significant attention as a potential method for defining an effective temperature in nonequilibrium systems. The successful development of an effective temperature would be an important step in the application ... More
Interface dynamics in discrete forward-backward diffusion equationsApr 05 2013We study the motion of phase interfaces in a diffusive lattice equation with bistable nonlinearity and derive a free boundary problem with hysteresis to describe the macroscopic evolution in the parabolic scaling limit. The first part of the paper deals ... More
Examples of nonpolygonal limit shapes in i.i.d. first-passage percolation and infinite coexistence in spatial growth modelsSep 13 2010Mar 13 2013We construct an edge-weight distribution for i.i.d. first-passage percolation on $\mathbb{Z}^2$ whose limit shape is not a polygon and whose extreme points are arbitrarily dense in the boundary. Consequently, the associated Richardson-type growth model ... More
Group analysis of differential equations and generalized functionsDec 28 1999We present an extension of the methods of classical Lie group analysis of differential equations to equations involving generalized functions (in particular: distributions). A suitable framework for such a generalization is provided by Colombeau's theory ... More
What the characters of irreducible subrepresentations of Jordan cells can tell us about LCFTJul 22 2013Jan 04 2014In this article, we review some aspects of logarithmic conformal field theories which can be inferred from the characters of irreducible submodules of indecomposable modules. We will mainly consider the W(2,2p-1,2p-1,2p-1) series of triplet algebras and ... More
Coherent Interactions with heavy ions at CMSApr 16 1999Aug 24 1999Due to coherence, there are strong electromagnetic fields of short duration in very peripheral collisions. They give rise to photon-photon and photon-nucleus collisions with high flux up to an invariant mass region hitherto unexplored experimentally. ... More
Renormalization of unicritical analytic circle mapsSep 23 2016In this paper we generalize renormalization theory for analytic critical circle maps with a cubic critical point to the case of maps with an arbitrary odd critical exponent by proving a quasiconformal rigidity statement for renormalizations of such maps. ... More
Introducing Molly: Distributed Memory Parallelization with LLVMSep 07 2014Programming for distributed memory machines has always been a tedious task, but necessary because compilers have not been sufficiently able to optimize for such machines themselves. Molly is an extension to the LLVM compiler toolchain that is able to ... More
Algorithmic Diversity for Software SecurityDec 13 2013Software diversity protects against a modern-day exploits such as code-reuse attacks. When an attacker designs a code-reuse attack on an example executable, it relies on replicating the target environment. With software diversity, the attacker cannot ... More
Recent reproducibility estimates indicate that negative evidence is observed over 30 times before publicationMay 19 2016Sep 12 2016The Open Science Collaboration recently reported that 36% of published findings from psychological studies were reproducible by independent researchers. We can use this information together with Bayes theorem to estimate the statistical power needed to ... More
Singular sets and parameters of generalized triangle orbifoldsMar 03 2001Aug 22 2001We study groups generated by three half-turns in Lobachevsky space and their factor-orbifolds. This generalized triangle groups are directly connected with the arbitrary 2-generator Kleinian groups. Our main result is a complete description of the singular ... More
Malliavin calculus method for asymptotic expansion of dual control problemsSep 28 2012Oct 14 2013We develop a technique based on Malliavin-Bismut calculus ideas, for asymptotic expansion of dual control problems arising in connection with exponential indifference valuation of claims, and with minimisation of relative entropy, in incomplete markets. ... More
Semi-static hedging for certain Margrabe type options with barriersOct 28 2008Feb 12 2010It turns out that in the bivariate Black-Scholes economy Margrabe type options exhibit symmetry properties leading to semi-static hedges of rather general barrier options. Some of the results are extended to variants obtained by means of Brownian subordination. ... More
Small product sets in compact groupsFeb 07 2014Jun 03 2016We show in this paper that a sub-critical pair $(A,B)$ of sufficiently "spread-out" Borel sets in a compact and second countable group $K$ with an \emph{abelian} identity component, must reduce to a Sturmian pair in either $\bT$ or $\bT \rtimes \{-1,1\}$. ... More
On the antiderivative of inverse functionsDec 12 2013Jun 05 2014One of the basics of calculus is the following proposition: If $F$ and $G$ are antiderivatives of two real functions $f$ and $g$ resp., then an antiderivative of $\lambda f+g$ is $\lambda F + G$. It may be surprising that such systematic an integration ... More
An asymptotic approach in Mahler's methodNov 24 2015Nov 25 2015We provide a general result for the algebraic independence of Mahler functions by a new method based on asymptotic analysis. As a consequence of our method, these results hold not only over $\mathbb{C}(z)$, but also over $\mathbb{C}(z)(\mathcal{M})$, ... More
Concordance of certain 3-braids and Gauss diagramsApr 14 2016Let $\beta:=\sigma_1\sigma_2^{-1}$ be a braid in $B_3$, where $B_3$ is the braid group on 3 strings and $\sigma_1, \sigma_2$ are the standard Artin generators. We use Gauss diagram formulas to show that for each natural number $n$ not divisible by $3$ ... More
Link invariants via counting surfacesSep 03 2012Nov 22 2013A Gauss diagram is a simple, combinatorial way to present a knot. It is known that any Vassiliev invariant may be obtained from a Gauss diagram formula that involves counting (with signs and multiplicities) subdiagrams of certain combinatorial types. ... More
On quasi-morphisms from knot and braid invariantsJul 15 2009Jul 02 2012We study quasi-morphisms on the groups Pn of pure braids on n strings and on the group D of compactly supported area-preserving diffeomorphisms of an open two-dimensional disc. We show that it is possible to build quasi-morphisms on Pn by using knot invariants ... More
Griffiths singularities and algebraic order in the exact solution of an Ising model on a fractal modular networkJan 15 2007Apr 12 2007We use an exact renormalization-group transformation to study the Ising model on a complex network composed of tightly-knit communities nested hierarchically with the fractal scaling recently discovered in a variety of real-world networks. Varying the ... More
Product set phenomena for measured groupsJun 02 2016Following the works of Furstenberg and Glasner on stationary means, we strengthen and extend in this paper some recent results by Di Nasso, Goldbring, Jin, Leth, Lupini and Mahlburg on piecewise syndeticity of product sets in countable \textsc{amenable} ... More
Speeding-Up Convergence via Sequential Subspace Optimization: Current State and Future DirectionsDec 31 2013This is an overview paper written in style of research proposal. In recent years we introduced a general framework for large-scale unconstrained optimization -- Sequential Subspace Optimization (SESOP) and demonstrated its usefulness for sparsity-based ... More
The Evening Tutoring Center at the United States Air Force AcademyFeb 09 2011The United States Air Force Academy (USAFA) has opened an Evening Tutoring Center to provide after-hours tutoring every evening before class days. The center focuses on first and second year courses in challenging quantitative disciplines: mathematics, ... More
pyro: A teaching code for computational astrophysical hydrodynamicsJun 28 2013Jun 12 2014We describe pyro: a simple, freely-available code to aid students in learning the computational hydrodynamics methods widely used in astrophysics. pyro is written with simplicity and learning in mind and intended to allow students to experiment with various ... More
Hilbert C*-modules over monotone complete C*-algebrasAug 31 1994Jul 27 2010The aim of the present paper is to describe self-duality and C*- reflexivity of Hilbert {\bf A}-modules $\cal M$ over monotone complete C*-algebras {\bf A} by the completeness of the unit ball of $\cal M$ with respect to two types of convergence being ... More
The primitive ontology of quantum physics: guidelines for an assessment of the proposalsJun 03 2014The paper seeks to make progress from stating primitive ontology theories of quantum physics, notably Bohmian mechanics, the GRW matter density theory and the GRW flash theory, to assessing these theories. Four criteria are set out: (a) internal coherence; ... More
Interest Rates and InflationApr 12 2011A relation between interest rates and inflation is presented using a two component economic model and a simple general principle. Preliminary results indicate a remarkable similarity to classical economic theories, in particular that of Wicksell.
The Cayley Trick for Tropical Hypersurfaces With a View Toward Ricardian EconomicsJun 29 2016The purpose of this survey is to summarize known results about tropical hypersurfaces and the Cayley Trick from polyhedral geometry. This allows for a systematic study of arrangements of tropical hypersurfaces and, in particular, arrangements of tropical ... More
Bounds on Integrals with Respect to Multivariate CopulasJun 28 2016Jun 30 2016Finding upper and lower bounds to integrals with respect to copulas is a quite prominent problem in applied probability. In their 2014 paper, Hofer and Iaco showed how particular two dimensional copulas are related to optimal solutions of the two dimensional ... More
Generalized Splines and Graphic ArrangementsJun 09 2016We define a chain complex for generalized splines on graphs, analogous to that introduced by Billera and refined by Schenck-Stillman for splines on polyhedral complexes. The hyperhomology of this chain complex yields bounds on the projective dimension ... More
Large deviations and rain showersJun 09 2015Rainfall from ice-free cumulus clouds requires collisions of large numbers of microscopic droplets to create every raindrop. The onset of rain showers can be surprisingly rapid, much faster than the mean time required for a single collision. Large-deviation ... More
Reply to Comment by M. Rohloff, T. Lapp and J. VollmerOct 25 2014This is a reply to a Comment on 'A test-tube model for rainfall', {\it Europhys. Lett.}, {\bf 106}, 40001, (2014).
Three Generative, Lexicalised Models for Statistical ParsingJun 17 1997In this paper we first propose a new statistical parsing model, which is a generative model of lexicalised context-free grammar. We then extend the model to include a probabilistic treatment of both subcategorisation and wh-movement. Results on Wall Street ... More
Syllable parsing in English and FrenchJun 02 1995In this paper I argue that Optimality Theory provides for an explanatory model of syllabic parsing in English and French. The argument is based on psycholinguistic facts that have been mysterious up to now. This argument is further buttressed by the computational ... More
The complexity of normal form rewrite sequences for AssociativityJun 20 1994Jun 20 1994The complexity of a particular term-rewrite system is considered: the rule of associativity (x*y)*z --> x*(y*z). Algorithms and exact calculations are given for the longest and shortest sequences of applications of --> that result in normal form (NF). ... More
A Computational Model of Syntactic Processing: Ambiguity Resolution from InterpretationJun 20 1994Syntactic ambiguity abounds in natural language, yet humans have no difficulty coping with it. In fact, the process of ambiguity resolution is almost always unconscious. But it is not infallible, however, as example 1 demonstrates. 1. The horse raced ... More
Free field construction for the eight-vertex model: representation for form factorsMar 18 2001Dec 06 2001The free field realization of the eight-vertex model is extended to form factors. It is achieved by constructing off-diagonal with respect to the ground state sectors matrix elements of the $\Lambda$ operator which establishes a relation between corner ... More
Long-range Fermi sea correlations as the resource for encoding quantum informationMay 14 2014An extra constant phase can be added to the wave function of a finite-length portion of a chiral Fermi sea. This phase can be read-out with the help of an imbalanced interferometer, where such a phase carrier interferes with the reference Fermi sea. As ... More
Half-levitons -- zero-energy excitations of a driven Fermi seaMar 15 2016A voltage pulse of a Lorentzian shape carrying a half of the flux quantum excites out of a zero-temperature Fermi sea an electron in a mixed state, which looks like a quasi-particle with an effectively fractional charge $e/2$. A prominent feature of such ... More
Toward the Graphics Turing Scale on a Blue Gene SupercomputerJan 09 2008We investigate raytracing performance that can be achieved on a class of Blue Gene supercomputers. We measure a 822 times speedup over a Pentium IV on a 6144 processor Blue Gene/L. We measure the computational performance as a function of number of processors ... More
On Griess AlgebrasFeb 03 2003Aug 13 2008In this paper we prove that for any commutative (but in general non-associative) algebra $A$ with an invariant symmetric non-degenerate bilinear form there is a graded vertex algebra $V = V_0 \oplus V_2 \oplus V_3\oplus ...$, such that $\dim V_0 = 1$ ... More
Combinatorial Structure of Finite Dimensional Representations of Yangians: the Simply-Laced CaseNov 25 1996Mar 18 1997We compute the decomposition of representations of Yangians into g-modules for simply-laced Lie algebras g. The decomposition has an interesting combinatorial tree structure. Results depend on a conjecture of Kirillov and Reshetikhin.
Verbesserung von OS- und Service-Fingerprinting mittels FuzzingMar 03 2014Fingerprinting of services and operating systems is an essential part of penetration tests. In order to successfully penetrate the computing system's security measurements, preexisting fingerprinting methods are described and the paradigm of fingerprinting ... More
Exponential Lower Bounds for Quasimodes of Semiclassical Schrödinger OperatorsAug 22 2008Dec 18 2008We prove quantitative unique continuation results for the semiclassical Schrodinger operator on smooth, compact domains. These take the form of exponentially decreasing (in h) local L^{2} lower bounds for exponentially precise quasimodes. We also show ... More
L^p Estimates for Maximal Averages Along One-variable Vector Fields in R^2Feb 01 2008We prove a conjecture of Lacey and Li in the case that the vector field depends only on one variable. Specifically: let v be a vector field defined on the unit square such that v(x,y) = (1,u(x)) for some measurable u from [0,1] to [0,1]. Fix a small parameter ... More
Kakeya Sets and Directional Maximal Operators in the PlaneMar 19 2007We completely characterize the boundedness of planar directional maximal operators on L^p. More precisely, if Omega is a set of directions, we show that M_Omega, the maximal operator associated to line segments in the directions Omega, is unbounded on ... More
An arithmetical excursion via Stoneham numbersDec 14 2012Nov 28 2013Let $p$ be a prime and $b$ a primitive root of $p^2$. In this paper, we give an explicit formula for the number of times a value in ${0,1,...,b-1}$ occurs in the periodic part of the base $b$ expansion of $1/p^m$. As a consequence of this result, we prove ... More
Precomplete clones on infinite sets which are closed under conjugationSep 13 2004Jul 31 2005We show that on an infinite set, there exist no other precomplete clones closed under conjugation except those which contain all permutations. Since on base sets of some infinite cardinalities, in particular on countably infinite ones, the precomplete ... More
Maximal clones on uncountable sets that include all permutationsJan 10 2004May 14 2005We first determine the maximal clones on a set X of infinite regular cardinality which contain all permutations but not all unary functions, extending a result of Heindorf's for countably infinite X. If |X| is countably infinite or weakly compact, this ... More
Stable maps and singular curves on K3 surfacesJul 01 2015In this thesis we study singular curves on K3 surfaces. Let $\mathcal{B}_g$ denote the stack of polarised K3 surfaces of genus $g$ and set $p(g,k)=k^2(g-1)+1$. There is a stack $ \mathcal{T}^n_{g,k} \to \mathcal{B}_g$ with fibre over the polarised surface ... More
The Moduli of Singular Curves on K3 SurfacesJan 06 2014Mar 07 2015In this article we consider moduli properties of singular curves on K3 surfaces. Let $\mathcal{B}_g$ denote the stack of primitively polarized K3 surfaces $(X,L)$ of genus $g$ and let $\mathcal{T}^n_{g,k} \to \mathcal{B}_g$ be the stack parametrizing ... More
Reidemeister torsion in generalized Morse theoryJul 12 1999Apr 06 2000In two previous papers with Yi-Jen Lee, we defined and computed a notion of Reidemeister torsion for the Morse theory of closed 1-forms on a finite dimensional manifold. The present paper gives an a priori proof that this Morse theory invariant is a topological ... More
Beyond ECH capacitiesSep 04 2014Apr 04 2015ECH (embedded contact homology) capacities give obstructions to symplectically embedding one four-dimensional symplectic manifold with boundary into another. These obstructions are known to be sharp when the domain and target are ellipsoids (proved by ... More
Lecture notes on embedded contact homologyMar 22 2013Feb 06 2014These notes give an introduction to embedded contact homology (ECH) of contact three-manifolds, gathering together many basic notions which are scattered across a number of papers. We also discuss the origins of ECH, including various remarks and examples ... More
Sup-norm-closable bilinear forms and LagrangiansJul 04 2014We consider symmetric non-negative definite bilinear forms on algebras of bounded real valued functions and investigate closability with respect to the supremum norm. In particular, any Dirichlet form gives rise to a sup-norm closable bilinear form. Under ... More
Representations of polygons of finite groupsSep 30 2003Oct 20 2005We construct discrete and faithful representations into the isometry group of a hyperbolic space of the fundamental groups of acute negatively curved even-sided polygons of finite groups.
Probabilistic Quantitative Precipitation Forecasting Using Ensemble Model Output StatisticsFeb 04 2013Statistical post-processing of dynamical forecast ensembles is an essential component of weather forecasting. In this article, we present a post-processing method that generates full predictive probability distributions for precipitation accumulations ... More
NJL-model analysis of dense quark matterFeb 23 2004Jan 27 2005Investigations of deconfined quark matter within NJL-type models are reviewed, focusing on the regime of low temperatures and ``moderate'' densities, which is not accessible by perturbative QCD. Central issue is the interplay between chiral symmetry restoration ... More
Triangle inequalities in path metric spacesNov 06 2006We study side-lengths of triangles in path metric spaces. We prove that unless such a space X is bounded, or quasi-isometric to line or half-line, every triple of real numbers satisfying the strict triangle inequalities, is realized by the side-lengths ... More
Assessment of the Effects of Azimuthal Mode Number Perturbations upon the Implosion Processes of Fluids in CylindersFeb 04 2016Fluid instabilities arise in a variety of contexts and are often unwanted results of engineering imperfections. In one particular model for a magnetized target fusion reactor, a pressure wave is propagated in a cylindrical annulus comprised of a dense ... More
Glycol-Water Interactions and co-existing phases and Temperature Dependent Solubility. An Example Of Carbon-Hydrogen Chemistry In WaterOct 26 2010Recently there has been great interest in Glycol-Water chemistry and solubility and temperature dependent phase dynamics. The Glycol-Water biochemistry of interactions is present in plant biology and chemistry, is of great interest to chemical engineers ... More
On a problem of NeumannSep 22 2015Oct 20 2015A conjecture widely attributed to Neumann is that all finite non-desarguesian projective planes contain a Fano subplane. In this note, we show that any finite projective plane of even order which admits an orthogonal polarity contains a Fano subplane. ... More
Effective T-odd P-even hadronic interactions from quark modelsMay 13 1996Tests of time reversal symmetry at low and medium energies may be analyzed in the framework of effective hadronic interactions. Here, we consider the quark structure of hadrons to make a connection to the more fundamental degrees of freedom. It turns ... More
Light-front field theory of hot and dense quark matterOct 01 2004Extending the concepts of light-front field theory to quantum statistics provides a novel approach towards nuclear matter under extreme conditions. Such conditions exist, e.g., in neutron stars or in the early stage of our universe. They are experimentally ... More
How often is a permutation an n'th power?Dec 03 1997We give a short argument that for any fixed n, the probability that a permutation on m letters is an n'th power is asymptotically C m^{phi(n)/n - 1}.
Calculating two- and three-body decays with FeynArts and FormCalcOct 30 2002The Feynman diagram generator FeynArts and the computer algebra program FormCalc allow for an automatic computation of 2->2 and 2->3 scattering processes in High Energy Physics. We have extended this package by four new kinematical routines and adapted ... More
J/Psi production in direct and resolved gamma gamma collisionsOct 09 2002The production of J/Psi mesons in gamma gamma collisions allows for a test of factorization in color-octet processes as predicted by NRQCD and observed at the Tevatron. We calculate the cross sections for J/Psi production with direct and resolved photons, ... More
When Newton meets Descartes: A Simple and Fast Algorithm to Isolate the Real Roots of a PolynomialSep 28 2011We introduce a new algorithm denoted DSC2 to isolate the real roots of a univariate square-free polynomial f with integer coefficients. The algorithm iteratively subdivides an initial interval which is known to contain all real roots of f. The main novelty ... More
Approximation properties for free orthogonal and free unitary quantum groupsMar 01 2011Oct 10 2011We show that the reduced von Neumann algebras of the free orthogonal and free unitary quantum groups have the Haagerup approximation property. Using this result and a Haagerup-type inequality for these quantum groups due to Vergnioux (J. Operator Theory ... More
Hofer's norm and disk translations in an annulusNov 08 2011Let D be a non-displaceable disk in an annulus A. Suppose that g is a compactly supported Hamiltonian which preserves D with translation number n. We show that Hofer's norm |g| is bounded from below by cn for a certain constant c. We also give example ... More