نتایج جستجو برای: best approximation2000 mathematics subject classication 46a30
تعداد نتایج: 762910 فیلتر نتایج به سال:
Presented at a meeting of the British Mathematics Colloquium; received by the editors February 10,1988. 1980 Mathematics Subject Class~fication (1985 Revision). Primary 05A99; Secondary 15A03.
We describe the Minimal Model Program in the family of Q-Gorenstein projective horospherical varieties, by studying a family of polytopes defined from the moment polytope of a Cartier divisor of the variety we begin with. In particular, we generalize the results on MMP in toric varieties due to M. Reid, and we complete the results on MMP in spherical varieties due to M. Brion in the case of hor...
We extend the ridgelet transform to the space of tempered Boehmians consistent with the ridgelet transform on the space of tempered distributions. We also prove that the extended ridgelet transform is continuous, linear, bijection and the extended adjoint ridgelet transform is also linear and continuous. AMS Mathematics Subject Classification (2010): 44A15, 44A35, 42C40
The paper contains a homotopy classification of rational equivalences between classifying spaces of compact connected Lie groups with an application to genus sets of such spaces. Mathematics Subject Classification (1991): 55R35, 55P10, 55P60, 55S37
We extend two theorems on fixpoints of f(z) by Langley and Zheng [1] to the consideration of points where f(z) = Q(z) for some rational function Q such that Q(∞) =∞. In addition, we extend the class of functions f from transcendental entire functions to meromorphic functions with relatively few poles. Mathematics Subject Classification (1991): 30D30, 30D35
We present some theorems of stability, in the Hyers-UlamRassias sense, for functional equations of quadratic-type, extending the results from [2], [8], [16], [19] and [20]. There are used both the direct and the fixed point methods. 2000 Mathematics Subject Classification: 39B52, 39B62, 39B82, 47H09.
Vulnerability discovery and exploits detection are two wide areas of study in software engineering. This preliminary work tries to combine existing methods with machine learning techniques to define a metric classification of vulnerable computer programs. First a feature set has been defined and later two models have been tested against real world vulnerabilities. A relation between the classif...
In this paper we will deal with the balance properties of the infinite binary words associated to β-integers when β is a quadratic simple Pisot number. Those words are the fixed points of the morphisms of the type φ(A) = AB, φ(B) = A for p ∈ N, q ∈ N, p ≥ q, where β = p+ √ p2+4q 2 . We will prove that such word is t-balanced with t = 1 + [(p− 1)/(p + 1 − q)]. Finally, in the case that p < q it ...
Centre for Mathematical Physics and Stochastics (funded by the Danish National Research Foundation). Mathematics Subject Classification 2000. Primary 60H05, 60J55, 60G44. Secondary 60J60, 60J65, 35R35.
Let S be a finite non-empty set of primes, ZS the ring of those rationals whose denominators are not divisible by primes outside S, and ZS the multiplicative group of invertible elements (S-units) in ZS . For a non-empty subset A of ZS , denote by GS(A) the graph with vertex set A and with an edge between a and b if and only if a − b ∈ ZS . This type of graphs has been studied by many people. I...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید