We analyse the Virtual Element Methods (VEM) on a simple elliptic model problem, allowing for more general meshes than the one typically considered i…

We prove a rigorous convergence result for the compressible to incompressible limit of weak entropy solutions to the isothermal 1D Euler equations.

Consider two domains connected by a thin tube: it can be shown that the resolvent of the Dirichlet Laplacian is continuous with respect to the channe…

We present a traffic flow model consisting of a gluing between the Lighthill-Whitham and Richards macroscopic model with a first order microscopic fo…

We construct non-geometric AdS$_4$ solutions of IIB string theory where the fields in overlapping patches are glued by elements of the S-duality grou…

Over the last years, analyses performed on a stochastic model of catalytic reaction networks have provided some indications about the reasons why wet…

The worldvolume theory of M5-branes on an ADE singularity $\mathbb{R}^5/\Gamma_G$ can be Higgsed in various ways, corresponding to the possible nilpo…

Let G be a h.c.c.b. profinite group. In this section we determine when the topological group Comm(G)A is Hausdorff and when Comm(G)A is locally compact. The answers to both questions are expressed in terms of certain finiteness conditions on the aut…

In this paper we initiate a systematic study of the abstract commensurators of profinite groups. The abstract commensurator of a profinite group $G$ …

For three-dimensional ${\cal N}=4$ super Chern-Simons-matter theories associated to necklace quivers $U(N_0) \times U(N_1) \times \cdots U(N_{2r-1}) …

We analyze in this paper a virtual element approximation for the acoustic vibration problem. We consider a variational formulation relying only on th…

We study how the phenomenon of contagion can take place in the network of the world's stock exchanges due to the behavioral trait "blindeness to smal…

Given a tetrahedral mesh and objective functionals measuring the mesh quality which take into account the shape, size, and orientation of the mesh el…

A novel family of twelve mixture models with random covariates, nested in the linear $t$ cluster-weighted model (CWM), is introduced for model-based …

In this paper we give the complete classification of solitons for a cubic NLS equation on the simplest network with a non-trivial topology: the tadpo…

With the increasing availability of AI-based decision support, there is an increasing need for their certification by both AI manufacturers and notif…

Quasiclassical approximation in the intrinsic description of the vortex filament dynamics is discussed. Within this approximation the governing equat…

In this section we prove that computing if there exists a feasible solution of C-LCS is not only NP-complete, but it is also W[1]-hard when the parameter is the number of string in Cs and the alphabet Σ (see [7] for an exposition on the consequences…

In this work, we consider a variant of the classical Longest Common Subsequence problem called Doubly-Constrained Longest Common Subsequence (DC-LCS)…

Axiom pinpointing refers to the task of finding the specific axioms in an ontology which are responsible for a consequence to follow. This task has b…

In [14] height estimates for compact graphs of constant mean curvature in three-dimensional product manifolds are used in order to obtain some information on the topology at infinity of properly embedded surfaces of constant mean curvature. The proo…

In this paper we obtain a sharp height estimate concerning compact hypersurfaces immersed into warped product spaces with some constant higher order …

In this paper we show how to simulate and estimate a COGARCH(p,q) model in the R package yuima. Several routines for simulation and estimation are av…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account