Buscar
Mostrando ítems 1-10 de 20356
Thoughts on duality and fundamental constantsThoughts on duality and fundamental constants
(Revista Mexicana de Física, 2009)
A Constant Rank Constraint Qualification in Continuous-Time Nonlinear Programming
(2020-01-01)
The paper addresses continuous-time nonlinear programming problems with equality and inequality constraints. First and second order necessary optimality conditions are obtained under a constant rank type constraint ...
Time variation of fundamental constants in nonstandard cosmological models
(American Physical Society, 2017-10)
In this work we have studied the lithium problem in nonstandard cosmological models. In particular, by using the public code alterbbn, we have included in the computation of the primordial light nuclei abundances, the ...
Constant-random practice and the adaptive process in motor learning with varying amounts of constant practice
(AMMONS SCIENTIFIC, LTD, 2010)
The adaptive process in motor learning was examined in terms of effects of varying amounts of constant practice performed before random practice. Participants pressed five response keys sequentially, the last one coincident ...
Optimal Suffix Sorting And Lcp Array Construction For Constant Alphabets
(Elsevier Science BVAmsterdam, 2017)
Controllability and Observability for a Linear Time Varying System with Piecewise Constant Delay
(Springer, 2015)
In this note, we obtain some necessary and sufficient conditions for the controllability and observability in a linear time-varying control system with piecewise constant state variables. The controllability results can ...
Fuzzy optimization for rotor constant identification of an indirect FOC induction motor drive
(Ieee-inst Electrical Electronics Engineers IncNew YorkEUA, 2001)
Formally verified countermeasures against cache based attacks in virtualization platforms
(UR.FI.INCO, 2016)
Cache based attacks are a class of side-channel attacks that are particularly effective in virtualized or cloud-based environments, where they have been used to recover secret keys from cryptographic implementations. One ...