Observation of a Zero-Energy Resonance in Cs-Cs Collisions

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cs 294-121 – Secure Computation Lecture 7: Zero Knowledge Ii

Suppose we have some undirected graph G = (GV , GE) represented as an adjacency matrix with |GV | rows and |GV | columns. G is said to be Hamiltonian if there exists a cycle CH that passes through each vertex in GV exactly once. This cycle is called a Hamiltonian cycle. Finding a Hamiltonian cycle in a graph if one exists is an NP-complete problem. We would like to use a zeroknowledge protocol ...

متن کامل

Cs 59000 Ctt Current Topics in Theoretical Cs Lecture 1

The use of randomness in designing algorithms that deal with large data sets can lead to vast improvements in performance compared to deterministic algorithms for the same problems. In this course we will be looking at a few computational models that use randomness as a means to finding efficient or super-efficient algorithms for various computational problems specific to graphs, error-correcti...

متن کامل

CS 262 a

(1) True/False [14 points, 2 each] For each answer provide a one sentence explanation. a) Aries could do " time travel " if you kept the whole log and a set of archived snapshots. True. Time travel is the ability to go back to previous point in " serialization " time (which is well defined for ACID transactions). You can start from a fuzzy snapshot and roll forward to the target time using the ...

متن کامل

Cs 59000 Ctt Current Topics in Theoretical Cs

We introduced error-correcting codes and linear codes in the last lecture. In this lecture we will discuss in some more details properties of linear codes and we’ll describe classical examples of linear codes. We will also show the Hamming bound, which is a bound that relates the distance, rate, and block length parameters of codes and is tight for the Hamming codes. Recall that a (n, k, d)q co...

متن کامل

Cs 59000 Ctt Current Topics in Theoretical Cs Lecture 12

Our goal is to store S (a set of keys) in such a way that we can quickly (i.e. with few memory accesses) answer queries of the form “Is i ∈ S?”. So we want to encode S in a table via some encoding scheme S → E(S). An algorithm for the membership problem takes a query “Is i ∈ S” and makes a few ‘probes’ into the table E(S), where a probe is just an index (cell) in the table. Based on the values ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review Letters

سال: 1997

ISSN: 0031-9007,1079-7114

DOI: 10.1103/physrevlett.79.625