Include my email address so I can be contacted Cancel Submit feedback Saved searches Use saved searches to filter your results more quickly Cancel Create saved search Sign in Sign up Appearance settings Resetting focus
Brown, R.:‘Groupoids and crossed objects in algebraic topology’, Homology, Homotopy and Appl. 1 (1999), 1–78. MathSciNet MATH Google Scholar Brown, R., Golasinski, M., Porter, T., and Tonks, A.:‘On function spaces of equivariant maps and the equivari-ant homotopy theory of ...
Evolving Objects - A template-based, ANSI-C++ evolutionary computation library which helps you to write your own stochastic optimization algorithms insanely fast. [LGPL] frugally-deep - Header-only library for using Keras models in C++. [MIT] Genann - Simple neural network library in C. [zlib...
, keeping in mind that actually not the vev breaks the gauge symmetry but the gauge fixing term and that the gauge-variant objects can be used to describe gauge-invariant observables with high precision for the weak sector of the standard model. since we are interested in fps where the ...
1i). Interestingly, enrichment of VHA-E was detected in RAB-A2a IPs, which is consistent with the description of clathrin-dependent trafficking from TGN to vacuoles31,32 and our previous finding that RAB-A2a strongly co-localizes with clathrin (Fig. 1a–c,g). To check PM contamination we...
Examples are: Controlfile Transaction, Datafile, Instance Recovery, Media Recovery, Transaction Recovery, Job Queue, and so on. Latches are used as a low-level serialization control mechanism used to protect shared data structures in the SGA from simultaneous access. Examples are row cache objects...
, we need to take into account that increasing amounts of physical objects take up space, and this enlarges human settlement and reduces the areas left to nature. Withthe pollution that accompanies many production and consumption activities we have a similar problem. Onlyif we eliminate all ...
Invisible cloaking is one of the major outcomes of the metamaterial research, but the practical potential, in particular for high frequencies (for example, microwave to visible light), is fatally challenged by the complex material properties they usually
positron beams. The ability of the ILC to probe these models via high-precision measurements of the forward–backward asymmetry is discussed. Alternative scenarios at other energies and beam polarization schemes are also discussed, extrapolating the estimated uncertainties from the two baseline scenarios....
As mentioned in the introduction, Checked C supports three varieties of checked (safe) pointers: pointers to single objects ; pointers to arrays , and NUL-terminated arrays . The field of , defined in Fig. 1(b), is an ; its length is specified by field in the same , as indicated by...