Â

Semantic Scholar uses AI to extract papers important to this topic.

2015

2015

- Vanina V Guidi, A. N. Sytov, I. V. Kirillin, N. F. Shulâ€™ga
- 2015

An investigation on the mechanism of relaxation of axially confined 400 GeV/c protons to planar channeling in a bent crystal wasâ€¦Â (More)

Is this relevant?

2009

2009

- Chris D. Godsil, Aidan Roy
- Eur. J. Comb.
- 2009

We use difference sets to construct interesting sets of lines in complex space. Using (v, k, 1)-difference sets, we obtain k2âˆ’k+1â€¦Â (More)

Is this relevant?

2008

2008

- Florent Berthelin, Salvi JuncÃ
- 2008

We obtain several averaging lemmas for transport operator with a force term. These lemmas improve the regularity yet known by notâ€¦Â (More)

Is this relevant?

2008

2008

An investigation of the spin excitation spectrum of charge ordered (CO) Î±â€™NaV2O5 is presented. We discuss several differentâ€¦Â (More)

Is this relevant?

2008

2008

- Markus BÃ¼ttiker
- 2008

We show how many-body ground state entanglement information may be extracted from subsystem energy measurements at zeroâ€¦Â (More)

Is this relevant?

2008

2008

- Adrian Alin
- 2008

In the SchrÃ¶dinger picture of the Dirac quantum mechanics, defined in charts with spatially flat Robertson-Walker metrics andâ€¦Â (More)

Is this relevant?

2003

2003

- Colin Rourke
- 2003

A new paradigm for the structure of galaxies is proposed. The main hypothesis is that a normal galaxy contains a hypermassiveâ€¦Â (More)

Is this relevant?

2002

2002

- Mike Develin
- Ars Comb.
- 2002

In a set equipped with a binary operation, (S, Â·), a subset U is defined to be avoidable if there exists a partition {A, B} of Sâ€¦Â (More)

Is this relevant?

1998

1998

- Philippe Eyssidieux
- 1998

Let X be a smooth compact projective variety over C. Let H(Ï€1(X),R) 1,1 be the intersection of H1,1(X,R) with the image of theâ€¦Â (More)

Is this relevant?

Review

1996

Review

1996

- LÃ¼tkenhaus
- Physical review. A, Atomic, molecular, andâ€¦
- 1996

Quantum cryptography is a method for providing two parties who want to communicate securely with a secret key to be used inâ€¦Â (More)

Is this relevant?