Bounded set

Results: 57



#Item
31Linear algebra / Convex hull / Convex function / Convex set / Vector space / Basis / Norm / Bounded set / Convex cone / Algebra / Mathematics / Convex analysis

Monitoring Distributed Streams using Convex Decompositions 1 1

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-12-17 10:01:57
32Logical syntax / Philosophical logic / Philosophy of language / Theorems / Lemma / Logic / Mathematics / Logical consequence

COLLECTION, LEMMAS, REFLECTION ALBERT VISSER Σ1 -collection is a basic principle of thought. In one of its forms it tells us that a recursive function on a finite set of natural numbers is bounded. The principle is so d

Add to Reading List

Source URL: users.ox.ac.uk

Language: English - Date: 2015-03-28 11:33:55
33Polygon / Bounded set / Vertex / Angle / Triangle / Area / Geometry / Euclidean geometry / Euclidean plane geometry

Toward the Design and Analysis of Blind, Bouncing Robots Lawrence H. Erickson and Steven M. LaValle Department of Computer Science University of Illinois at Urbana-Champaign {lericks4, lavalle}@uiuc.edu

Add to Reading List

Source URL: msl.cs.uiuc.edu

Language: English - Date: 2013-02-12 17:40:31
34Formal methods / Complexity classes / Computability theory / Metalogic / NP-complete problems / FO / Model theory / First-order logic / P / Theoretical computer science / Computational complexity theory / Applied mathematics

On Bounded Reachability of Programs with Set Comprehensions Margus Veanes1 and Ando Saabas2? 1 2

Add to Reading List

Source URL: set.ee

Language: English - Date: 2009-01-06 12:05:39
35

Physics 423 — Problem set 7 — 3/16 – 3/20: Multipole expansions Reading: Griffiths[removed]A hemispherical cavity, of radius a = 10 cm, is bounded by the following surfaces (see figure) 1. the z = 0 plane is a groun

Add to Reading List

Source URL: solar.physics.montana.edu

- Date: 2015-03-06 17:41:51
    36Topology / Complete partial order / Filter / Partially ordered set / Domain theory / Ideal / Uniform space / Metric space / Lattice / Order theory / Mathematics / Structure

    Poset models of topological spaces Dongsheng Zhao Abstract. We consider poset models of topological spaces and show that every T1 -space has an bounded complete algebraic poset model, thus give a positive answer to a que

    Add to Reading List

    Source URL: math.nie.edu.sg

    Language: English - Date: 2010-07-05 04:28:20
    37Constructible universe / Ordinal number / Partial differential equations / Set theory / Sobolev spaces / Symbol / Spectral theory of ordinary differential equations / Mathematics / Mathematical analysis / Calculus

    EXISTENCE AND A PRIORI ESTIMATES FOR SEMILINEAR ELLIPTIC SYSTEMS OF HARDY TYPE ˇ J. PACUTA Abstract. We study semilinear elliptic systems of Hardy type on bounded domains. We look for conditions guaranteeing the existen

    Add to Reading List

    Source URL: www.kurims.kyoto-u.ac.jp

    Language: English - Date: 2014-01-16 05:05:13
    38General topology / Metric geometry / Dimension theory / Fractals / Borel set / Hausdorff measure / Measure / Space / Bounded variation / Topology / Mathematical analysis / Mathematics

    Real Analysis Exchange Summer Symposium 2009, pp. 50–51 Márton Elekes,∗ Alfréd Rényi Institute of Mathematics, Hungarian Academy of Sciences, P.O. Box 127, H-1364 Budapest, Hungary and Department of Analysis, Eöt

    Add to Reading List

    Source URL: www.stolaf.edu

    Language: English - Date: 2010-01-15 15:12:10
    39Functional analysis / Mathematical structures / General topology / Bounded set / Banach space / Metric space / Normed vector space / Vector space / Compact space / Mathematics / Topology / Mathematical analysis

    Mathematics 121 Midterm Terence Tao April 30, 1997 All questions are of equal value. There is plenty of working space, and a blank page at the end. Good luck!

    Add to Reading List

    Source URL: www.math.ucla.edu

    Language: English - Date: 2007-08-20 12:43:09
    40Computing / Cryptography / Communications protocol / Adversary model / Cryptographic nonce / Turing machine / Memory / Bounded set / Cryptographic protocols / Data / Information

    Bounded Memory Protocols Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , Andre Scedrov4 Abstract It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, de

    Add to Reading List

    Source URL: bib.irb.hr

    Language: English - Date: 2014-08-21 13:21:17
    UPDATE