Results 1  10
of
134,399
Synchronization and linearity: an algebra for discrete event systems
, 2001
"... The first edition of this book was published in 1992 by Wiley (ISBN 0 471 93609 X). Since this book is now out of print, and to answer the request of several colleagues, the authors have decided to make it available freely on the Web, while retaining the copyright, for the benefit of the scientific ..."
Abstract

Cited by 382 (11 self)
 Add to MetaCart
community. Copyright Statement This electronic document is in PDF format. One needs Acrobat Reader (available freely for most platforms from the Adobe web site) to benefit from the full interactive machinery: using the package hyperref by Sebastian Rahtz, the table of contents and all LATEX cross
Gravity coupled with matter and the foundation of non commutative geometry
, 1996
"... We first exhibit in the commutative case the simple algebraic relations between the algebra of functions on a manifold and its infinitesimal length element ds. Its unitary representations correspond to Riemannian metrics and Spin structure while ds is the Dirac propagator ds = ×— × = D −1 where D i ..."
Abstract

Cited by 343 (17 self)
 Add to MetaCart
We first exhibit in the commutative case the simple algebraic relations between the algebra of functions on a manifold and its infinitesimal length element ds. Its unitary representations correspond to Riemannian metrics and Spin structure while ds is the Dirac propagator ds = ×— × = D −1 where D
Differential Fault Analysis of Secret Key Cryptosystems
, 1997
"... In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to find cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems suc ..."
Abstract

Cited by 315 (3 self)
 Add to MetaCart
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to find cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems
Coherent Population Transfer among Three States: Full Algebraic Solutions and the Relevance of Non Adiabatic Processes to Transfer by Delayed Pulses
"... Ongoing work aimed at developing highly e–cient methods of populating a chosen sublevel of an energy level highlights the need to understand ofiresonant efiects in coherent excitation. This motivated us to reexamine some aspects of the theory of coherent excitation in a threestate system with a v ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
view to obtaining algebraic expressions for ofiresonant eigenvalues and eigenvectors. Earlier work gives simple closedform expressions for the eigenvalues this system, expressions applying even when the system is not on twophoton resonance. We present here expressions of similar simplicity
SEMIORTHOGONAL DECOMPOSITIONS FOR ALGEBRAIC VARIETIES
, 1995
"... A criterion for a functor between derived categories of coherent sheaves to be full and faithful is given. A semiorthogonal decomposition for the derived category of coherent sheaves on the intersection of two even dimensional quadrics is obtained. The behaviour of derived categories with respect to ..."
Abstract

Cited by 183 (11 self)
 Add to MetaCart
A criterion for a functor between derived categories of coherent sheaves to be full and faithful is given. A semiorthogonal decomposition for the derived category of coherent sheaves on the intersection of two even dimensional quadrics is obtained. The behaviour of derived categories with respect
Reasoning about Temporal Relations: A Maximal Tractable Subclass of Allen's Interval Algebra
 Journal of the ACM
, 1995
"... We introduce a new subclass of Allen's interval algebra we call "ORDHorn subclass," which is a strict superset of the "pointisable subclass." We prove that reasoning in the ORDHorn subclass is a polynomialtime problem and show that the pathconsistency method is sufficient ..."
Abstract

Cited by 199 (9 self)
 Add to MetaCart
is sufficient for deciding satisfiability. Further, using an extensive machinegenerated case analysis, we show that the ORDHorn subclass is a maximal tractable subclass of the full algebra (assuming<F NaN> P6=NP). In fact, it is the unique greatest tractable subclass amongst the subclasses that contain
FullDiversity, HighRate SpaceTime Block Codes from Division Algebras
 IEEE TRANS. INFORM. THEORY
, 2003
"... We present some general techniques for constructing fullrank, minimaldelay, rate at least one spacetime block codes (STBCs) over a variety of signal sets for arbitrary number of transmit antennas using commutative division algebras (field extensions) as well as using noncommutative division algeb ..."
Abstract

Cited by 177 (55 self)
 Add to MetaCart
We present some general techniques for constructing fullrank, minimaldelay, rate at least one spacetime block codes (STBCs) over a variety of signal sets for arbitrary number of transmit antennas using commutative division algebras (field extensions) as well as using noncommutative division
THE ALGEBRA OF STRONGLY FULL TERMS
"... Abstract. The wellknown connection between hyperidentities of an algebra and identities satisfied by the clone of this algebra is studied here in a restricted setting, that of nary strongly full hyperidentities and identities of the nary clone of term operations of an algebra induced by strongly ..."
Abstract
 Add to MetaCart
Abstract. The wellknown connection between hyperidentities of an algebra and identities satisfied by the clone of this algebra is studied here in a restricted setting, that of nary strongly full hyperidentities and identities of the nary clone of term operations of an algebra induced by strongly
Results 1  10
of
134,399