Using a Corner Transfer Matrix approach, we compute the bipartite entanglement R\'enyi entropy in the off-critical perturbations of non-unitary confo…

We study the following separation problem: Given a collection of colored objects in the plane, compute a shortest "fence" $F$, i.e., a union of curve…

Estimating spot covariance is an important issue to study, especially with the increasing availability of high-frequency financial data. We study the…

Contrary to some claims in the literature [31], we have demonstrated that it is indeed possible to implement PT-symmetry on noncommutative spaces while keeping the noncommutative constants real. Starting from a generic Ansatz for the canonical varia…

We provide a systematic procedure to relate a three dimensional q-deformed oscillator algebra to the corresponding algebra satisfied by canonical var…

All known algorithms for the Fr\'echet distance between curves proceed in two steps: first, they construct an efficient oracle for the decision versi…

In this paper we compute the leading correction to the bipartite entanglement entropy at large sub-system size, in integrable quantum field theories …

We present a new backfitting algorithm estimating the complex structured non-parametric survival model of Scheike (2001) without having to use smooth…

This manuscript is a review of the main results obtained in a series of papers involving the present authors and their collaborator J.L. Cardy over t…

From (12) we have that

Modern developments in population dynamics emphasize the role of the turnover of individuals. In the new approaches stable population size is a dynam…

In a setting of noncommutative space with minimal length we confirm the general assertion that the more nonclassical an input state for a beam splitt…

We consider the harvesting of a population in a stochastic environment whose dynamics in the absence of harvesting is described by a one dimensional …

Millions of users routinely use Google to log in to websites supporting OAuth 2.0 or OpenID Connect; the security of OAuth 2.0 and OpenID Connect is …

Integrability is believed to underlie the AdS3/CFT2 correspondence with sixteen supercharges. We elucidate the role of massless modes within this int…

We elaborate further on the metric representation that is obtained by transferring the time-dependence from a Hermitian Hamiltonian to the metric ope…

The i* modeling language was introduced to fill the gap in the spectrum of conceptual modeling languages, focusing on the intentional (why?), social …

Transfer Learning is concerned with the application of knowledge gained from solving a problem to a different but related problem domain. In this pap…

The blockchain technology promises to transform finance, money and even governments. However, analyses of blockchain applicability and robustness typ…

Explainability in Artificial Intelligence has been revived as a topic of active research by the need of conveying safety and trust to users in the `h…

LSTMs promise much to financial time-series analysis, temporal and cross-sectional inference, but we find they do not deliver in a real-world financi…

We have systematically constructed all exact solutions for the metric operator which is of exponential form with PT-symmetric real and cubic argument and adjointly complex conjugates the most generic Hamiltonian of cubic order (2), (3). Our solution…

We investigate properties of the most general PT-symmetric non-Hermitian Hamiltonian of cubic order in the annihilation and creation operators as a t…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account