Abstract: In this paper, we prove that a poset-block space admits a MacWilliams-type identity if and only if the poset is hierarchical, and at any level of the poset, all the blocks have the same ...
Back in the Stone Age, before we were all completely plugged in and focused on our gadgets at all times (you know, like, 2002), people would get ... bored. Of course, everyone still finds themselves ...
Effective Sept. 1, 2025, the daily rate is $262.37. Use $262.37 to determine the penalty period for case actions disposed on or after Sept. 1, 2025. Round down partial amounts to the whole number of ...
Our research proves a conjecture from string theory asserting the vanishing of a specific convolution sum arising in the 4-graviton scattering amplitude in 10-dimensional type IIB string theory. The ...
Leaflet.draw uses the L.drawLocal configuration object to set any text used in the plugin. Customizing this will allow support for changing the text or supporting another language. See Leaflet.draw.js ...
Abstract: The identity authentication of most applications is based on a symbolic password. However, incidents of password leakage emerge one after another, which brings serious hidden danger to the ...
When presenting expressions, we saw examples of common arithmetic operations: addition, subtraction, multiplication, and division. Here we will present two additional operations which are closely ...
A domination algorithm for {0,1}-instances of the travelling salesman problem ...
We determine all reduced saturated fusion systems supported on a finite p-group of nilpotency class 2. As a consequence, we obtain a new proof of Gilman and Gorenstein's classification of finite ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results