Privacy is an increasingly important aspect of data publishing. Reasoning about privacy, however, is fraught with pitfalls. One of the most significa…

This paper presents two algorithms for calculating an ensemble of solutions to laminar natural convection problems. The ensemble average is the most …

We show that for small values of the chemical potential the curvature of the phase transition line can be deduced from an analysis of scaling propert…

Efficiency at maximum power (MP) output for an engine with a passive piston without mechanical controls between two reservoirs is theoretically studi…

In order to study the response of the quantum chromodynamic matter to finite electromagnetic fields, we utilize the Polyakov linear - sigma model (PL…

We present an ab initio analysis for the ground-state properties of a correlated organic compound $\kappa$-(BEDT-TTF)2Cu(NCS)2. First, we derive an e…

The syntactic structure of a sentence can be modeled as a tree where vertices are words and edges indicate syntactic dependencies between words. It i…

We report a Lagrangian study on the evolution of material surfaces in the K-type temporal transitional channel flow. Based on the Eulerian velocity f…

In Model-Based Design of Cyber-Physical Systems (CPS), it is often desirable to develop several models of varying fidelity. Models of different fidel…

Many robotic tasks rely on the accurate localization of moving objects within a given workspace. This information about the objects' poses and veloci…

The progression of scientific computing resources has enabled the numerical approximation of mathematical models describing complex physical phenomen…

Recommender systems have emerged as a new weapon to help online firms to realize many of their strategic goals (e.g., to improve sales, revenue, cust…

We evaluate quark number densities at imaginary chemical potential by lattice QCD with clover-improved two-flavor Wilson fermion. The quark number de…

Motivated by the broadcast view of the interference channel, the new problem of communication with disturbance constraints is formulated. The rate-di…

We present an algorithm that takes as input an $n$-vertex planar graph $G$ and a $k$-vertex pattern graph $P$, and computes the number of (induced) c…

The author wishes to acknowledge the support of the US AFOSR during the preparation of this work.

The aim of this paper is to establish a theory of random variables on domains. Domain theory is a fundamental component of theoretical computer scien…

In recent years, data has played an increasingly important role in the economy as a good in its own right. In many settings, data aggregators cannot …

I review some selected aspects of the phenomenology of multiquark states discovered in high energy experiments. They have four valence quarks (called…

We develop a theoretical framework to investigate the two-body composite structure of a resonance as well as a bound state from its wave function. Fo…

We perform lattice numerical simulations to study the phase transition of QCD at finite temperature to clarify the nature of the transition of massle…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account