A Double Sum

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Apery's Double Sum is Plain Sailing Indeed

We demonstrate that also the second sum involved in Apéry’s proof of the irrationality of ζ(3) becomes trivial by symbolic summation. In his beautiful survey [4], van der Poorten explained that Apéry’s proof [1] of the irrationality of ζ(3) relies on the following fact: If a(n) = n

متن کامل

Laplacian Sum-Eccentricity Energy of a Graph

We introduce the Laplacian sum-eccentricity matrix LS_e} of a graph G, and its Laplacian sum-eccentricity energy LS_eE=sum_{i=1}^n |eta_i|, where eta_i=zeta_i-frac{2m}{n} and where zeta_1,zeta_2,ldots,zeta_n are the eigenvalues of LS_e}. Upper bounds for LS_eE are obtained. A graph is said to be twinenergetic if sum_{i=1}^n |eta_i|=sum_{i=1}^n |zeta_i|. Conditions ...

متن کامل

Global optimal solutions to nonconvex optimisation problems with a sum of double-well and log-sum-exp functions

This paper presents a canonical dual approach for solving a nonconvex global optimisation problem with a sum of double-well and log-sum-exp functions. Such a problem arises extensively in mechanics, robot designing, information theory and network communication systems. It includes fourth-order polynomial minimisation problems and minimax problems. Based on the canonical duality theory, this non...

متن کامل

Some Notes on Weighted Sum Formulae for Double Zeta Values

We present a unified approach which gives completely elementary proofs of three weighted sum formulae for double zeta values. This approach also leads to new evaluations of sums relating to the harmonic numbers, the alternating double zeta values, and the Witten zeta function. We discuss a heuristic for finding or dismissing the existence of similar simple sums. We also produce some new sums fr...

متن کامل

One-key Double-Sum MAC with Beyond-Birthday Security

MACs (Message Authentication Codes) are widely adopted in communication systems to ensure data integrity and data origin authentication, e.g. CBC-MACs in the ISO standard 9797-1. However, all the current designs either suffer from birthday attacks or require long key sizes. In this paper, we focus on designing beyond-birthday-bound MAC modes with a single key, and investigate their design princ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SIAM Review

سال: 1968

ISSN: 0036-1445,1095-7200

DOI: 10.1137/1010028