نتایج جستجو برای: best approximation2000 mathematics subject classication 46a30

تعداد نتایج: 762910  

2008
SAHARON SHELAH

Presented at a meeting of the British Mathematics Colloquium; received by the editors February 10,1988. 1980 Mathematics Subject Class~fication (1985 Revision). Primary 05A99; Secondary 15A03.

2012
Boris Pasquier

We describe the Minimal Model Program in the family of Q-Gorenstein projective horospherical varieties, by studying a family of polytopes defined from the moment polytope of a Cartier divisor of the variety we begin with. In particular, we generalize the results on MMP in toric varieties due to M. Reid, and we complete the results on MMP in spherical varieties due to M. Brion in the case of hor...

2012
R. Roopkumar

We extend the ridgelet transform to the space of tempered Boehmians consistent with the ridgelet transform on the space of tempered distributions. We also prove that the extended ridgelet transform is continuous, linear, bijection and the extended adjoint ridgelet transform is also linear and continuous. AMS Mathematics Subject Classification (2010): 44A15, 44A35, 42C40

2002
Jesper Michael Møller J. M. Møller

The paper contains a homotopy classification of rational equivalences between classifying spaces of compact connected Lie groups with an application to genus sets of such spaces. Mathematics Subject Classification (1991): 55R35, 55P10, 55P60, 55S37

2005
E. F. Clifford

We extend two theorems on fixpoints of f(z) by Langley and Zheng [1] to the consideration of points where f(z) = Q(z) for some rational function Q such that Q(∞) =∞. In addition, we extend the class of functions f from transcendental entire functions to meromorphic functions with relatively few poles. Mathematics Subject Classification (1991): 30D30, 30D35

2006
Liviu Cădariu

We present some theorems of stability, in the Hyers-UlamRassias sense, for functional equations of quadratic-type, extending the results from [2], [8], [16], [19] and [20]. There are used both the direct and the fixed point methods. 2000 Mathematics Subject Classification: 39B52, 39B62, 39B82, 47H09.

Journal: :CoRR 2012
Gabriele Modena

Vulnerability discovery and exploits detection are two wide areas of study in software engineering. This preliminary work tries to combine existing methods with machine learning techniques to define a metric classification of vulnerable computer programs. First a feature set has been defined and later two models have been tested against real world vulnerabilities. A relation between the classif...

Journal: :ITA 2007
Ondrej Turek

In this paper we will deal with the balance properties of the infinite binary words associated to β-integers when β is a quadratic simple Pisot number. Those words are the fixed points of the morphisms of the type φ(A) = AB, φ(B) = A for p ∈ N, q ∈ N, p ≥ q, where β = p+ √ p2+4q 2 . We will prove that such word is t-balanced with t = 1 + [(p− 1)/(p + 1 − q)]. Finally, in the case that p < q it ...

2013
GORAN PESKIR

Centre for Mathematical Physics and Stochastics (funded by the Danish National Research Foundation). Mathematics Subject Classification 2000. Primary 60H05, 60J55, 60G44. Secondary 60J60, 60J65, 35R35.

Journal: :J. Comb. Theory, Ser. A 2014
K. Gyory Lajos Hajdu Robert Tijdeman

Let S be a finite non-empty set of primes, ZS the ring of those rationals whose denominators are not divisible by primes outside S, and ZS the multiplicative group of invertible elements (S-units) in ZS . For a non-empty subset A of ZS , denote by GS(A) the graph with vertex set A and with an edge between a and b if and only if a − b ∈ ZS . This type of graphs has been studied by many people. I...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید