نتایج جستجو برای: prime strong co

تعداد نتایج: 731423  

Journal: :The Journal of infectious diseases 2011
Lilin Lai Suefen Kwa Pamela A Kozlowski David C Montefiori Guido Ferrari Welkin E Johnson Vanessa Hirsch Francois Villinger Lakshmi Chennareddi Patricia L Earl Bernard Moss Rama Rao Amara Harriet L Robinson

A simian immunodeficiency virus (SIV) vaccine coexpressing granulocyte-macrophage colony stimulating factor (GM-CSF) prevented infection in 71% of macaques that received 12 rectal challenges. The SIVsmE660 challenge had the tropism of incident human immunodeficiency virus (HIV) infections and a similar genetic distance from the SIV239 vaccine as intraclade HIV isolates. The heterologous prime-b...

Journal: :INFORMS Journal on Computing 2008
H. Neil Geismar Gilbert Laporte Lei Lei Chelliah Sriskandarajah

T integrated production and transportation scheduling problem (PTSP) with capacity constraints is common in many industries. An optimal solution to PTSP requires one to simultaneously solve the production scheduling and the transportation routing problems, which requires excessive computational time, even for relatively small problems. In this study, we consider a variation of PTSP that involve...

1996
Lee Smolin

A string theory in 3 euclidean spacetime dimensions is found to describe the semiclassical behavior of a certain exact physical state of quantum general relativity in 4 dimensions. Both the worldsheet and the three dimensional metric emerge as collective coordinates that describe a sector of the solution space of quantum general relativity. Additional collective coordinates exist which are inte...

2009
BENOÎT PERTHAME

We are concerned with the hyperbolic Keller-Segel model with quorum sensing, a model describing the collective cell movement due to chemical signalling with a flux limitation for high cell densities. This is a first order quasilinear equation, its flux depends on space and time via the solution to an elliptic PDE in which the right-hand side is the solution to the hyperbolic equation. This mode...

1997
Stathes D. Paganis Takeshi Udagawa G. W. Hoffmann

Using the QCD sum rule approach, we show that the flavor-nonsinglet H dibaryon states with Jπ = 1+, Jπ = 0+, I=1 (27plet) are nearly degenerate with the Jπ = 0+, I=0 singlet H0 dibaryon, which has been predicted to be stable against strong decay, but has not been observed. Our calculation, which does not require an instanton correction, suggests that the H0 is slightly heavier than these flavor...

2005
Siegfried M. Rump

In this paper we give very sharp bounds for the distance between regularity and strong regularity. The solution of this problem uses a general matrix analogue [18] of the Perron-Frobenius Theory. This theory has been graded as a challenge problem for future research by the International Linear Algebra Society [7]. An interval matrix [A] ∈ IIMn(IR) is called regular, if every A ∈ [A] is nonsingu...

2005
Andrew S. Toms

Let (G,G+) be an ordered abelian group. We say that G has strong perforation if there exists x ∈ G, x / ∈ G+, such that nx ∈ G+, nx 6= 0 for some natural number n. Otherwise, the group is said to be weakly unperforated. Examples of simple C-algebras whose ordered K0-groups have this property and for which the entire order structure on K0 is known have, until now, been restricted to the case whe...

1999
A. Pich

The Standard Model (SM) constitutes one of the most successful achievements in modern physics. It provides a very elegant theoretical framework, which is able to describe all known experimental facts in particle physics. A detailed description of the SM and its impressive phenomenological success can be found in Refs. [1] and [2], which discuss the electroweak and strong sectors, respectively. ...

1997
Yair Frankel Peter Gemmell Philip D. MacKenzie Moti Yung

We introduce new eecient techniques for sharing cryptographic functions in a distributed dynamic fashion. These techniques dynamically and securely transform a distributed function (or secret sharing) representation between tout of -l (polynomial sharing) and tout of -t (additive sharing). We call the techniques poly-to-sum and sum-to-poly, respectively. Employing these techniques, we solve a n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید