The OPAL opacity Code
نویسندگان
چکیده
منابع مشابه
Performance Characterization and Modeling of the Molecular Simulation Code Opal
In modern parallel computing there exists a large number of highly different platforms and it is important to choose the right parallel platform for a computationally intensive code. To decide about the most cost effective parallel platform, a computer scientist needs a precise characterization of the application properties, such as memory usage, computation and communication requirements. The ...
متن کاملImplementation of new OPAL tables in Eggleton’s stellar evolution code
Based on the work of OPAL (Iglesias & Rogers 1996) and Alexander & Ferguson (1994), we construct a series of opacity tables for various metallicities Z = 0, 0.000 01, 0.000 03, 0.000 1, 0.000 3, 0.001, 0.004, 0.01, 0.02, 0.03, 0.04, 0.05, 0.06, 0.08 and 0.1. These tables can be easily used in Eggleton’s stellar evolution code in place of the old tables without changing the code. The OPAL tables...
متن کاملOpal and More
We shall summarize some of the research activities performed in collaboration with Ben Shen in the OPAL experiment at LEP and in the CMS experiment at the LHC. And we shall recall the LEP legacy to particle physics in general and to the Standard Model in particular. Short recollections are made in other fields in which Ben was interested, in particular in Astroparticle Physics.
متن کاملThe Opacity of Backbones
A backbone of a boolean formula F is a collection S of its variables for which there is a unique partial assignment aS such that F [aS ] is satisfiable [MZK 99,WGS03]. This paper studies the nontransparency of backbones. We show that, under the widely believed assumption that integer factoring is hard, there exist sets of boolean formulas that have obvious, nontrivial backbones yet finding the ...
متن کاملOpacity Testing
Opacity testing is formalized and studied. We specify opacity testers as well as tested systems by (timed) process algebras. We model various testers according to how sophisticated observations of tested system they can make and which kind of conclusions they can obtain. We use this technique to define several realistic security properties. The properties are studied and compared with other sec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Highlights of Astronomy
سال: 1995
ISSN: 1539-2996
DOI: 10.1017/s1539299600012089