摘要 :
Over a field of characteristic zero we prove two formality conditions. We prove that a dg Lie algebra is formal if and only if its universal enveloping algebra is formal. We also prove that a commutative dg algebra is formal as a ...
展开
Over a field of characteristic zero we prove two formality conditions. We prove that a dg Lie algebra is formal if and only if its universal enveloping algebra is formal. We also prove that a commutative dg algebra is formal as a dg associative algebra if and only if it is formal as a commutative dg algebra. We present some consequences of these theorems in rational homotopy theory.
收起
摘要 :
Security is an afterthought process for the development of software in earlier days but now the time has been changed. Now, security is on top priority and involved from the beginning of software development. Security requirements...
展开
Security is an afterthought process for the development of software in earlier days but now the time has been changed. Now, security is on top priority and involved from the beginning of software development. Security requirements are the prime concern for the development and quality of any software product. The specification and verification of security requirements need a lot of attention from the computer science community in the process of the software development life cycle. Formal Methods are a widely used and well-recognized approach for the specification and verification of any safety-critical system. Formal methods play an important role in the requirement phase to the design phase of software development. In this study, we summarized the outcomes of related papers to find out the current state of the art in the proposed area. In this manuscript, three research questions are frame and we try to find the answer to these research questions to the best of our effort and knowledge. The objective of this research paper is to find out the gap analysis, state of art, and trends in the proposed area. The academician needs to pursue more effort toward the formal specification of security requirements, providing a deeper understanding to help security experts in the development of systems.
收起
摘要 :
Copper(I) and nickel(0) complexes catalyze the formal [4 + 2] cycloaddition reactions of 1,2-diazines and siloxyalkynes, a reaction hitherto best catalyzed by silver salts. These catalysts based on earth abundant metals are not on...
展开
Copper(I) and nickel(0) complexes catalyze the formal [4 + 2] cycloaddition reactions of 1,2-diazines and siloxyalkynes, a reaction hitherto best catalyzed by silver salts. These catalysts based on earth abundant metals are not only competent, but the copper catalyst, in particular, promotes cycloadditions of pyrido[2,3-d]pyridazine and pyrido[3,4- d]pyridazine, enabling a new synthesis of quinoline and isoquinoline derivatives, as well as the formal [2 + 2] cycloaddition reaction of cyclohexenone with a siloxyalkyne.
收起
摘要 :
This paper considers hyperbolic formal groups, which come from the elliptic curve theory, in the context of the theory of formal modules. In the first part of the paper, the characteristics of hyperbolic formal groups are consider...
展开
This paper considers hyperbolic formal groups, which come from the elliptic curve theory, in the context of the theory of formal modules. In the first part of the paper, the characteristics of hyperbolic formal groups are considered, i.e., the explicit formulas for the formal logarithm and exponent; their convergence is studied. In the second part, the isogeny and its kernel and height are found; a p-typical logarithm is defined. The Artin-Hasse and Vostokov functions are then constructed; their correctness and main properties are evaluated.
收起
摘要 :
Formal O-0-modules over the ring of integers O of a local field, i.e., formal groups over O with endomorphism ring including a fixed ring O-0 are studied. A complete description of the logarithms of all such modules is obtained in...
展开
Formal O-0-modules over the ring of integers O of a local field, i.e., formal groups over O with endomorphism ring including a fixed ring O-0 are studied. A complete description of the logarithms of all such modules is obtained in the case of small ramification. Earlier it was shown that in the case of small ramification (e(O/O-0) < q), any O-0-module is strictly isomorphic to an O-0-module the logarithm of which can be represented in the form vu(-1)(X), where u and v are certain matrices over the ring of operators described in the paper. The result obtained in the present paper enables one to determine the type (u and v) of a formal O-0-module by the form of its logarithm, and provides a way for constructing all formal O-0-modules.
收起
摘要 :
Requirements analysts write requirements for a system that the client both wants and needs - seems straightforward enough. Requirements analysts are ideally placed to innovate. They understand the business problem, have up-to-date...
展开
Requirements analysts write requirements for a system that the client both wants and needs - seems straightforward enough. Requirements analysts are ideally placed to innovate. They understand the business problem, have up-to-date knowledge of the available technology, blamed if the new product doesn't please the customer, and know if inventions are appropriate to the work being studied. In short, requirements analysts are the people whose skills and position allows, indeed encourages, creativity.
收起
摘要 :
Requirements analysts write requirements for a system that the client both wants and needs - seems straightforward enough. Requirements analysts are ideally placed to innovate. They understand the business problem, have up-to-date...
展开
Requirements analysts write requirements for a system that the client both wants and needs - seems straightforward enough. Requirements analysts are ideally placed to innovate. They understand the business problem, have up-to-date knowledge of the available technology, blamed if the new product doesn''t please the customer, and know if inventions are appropriate to the work being studied. In short, requirements analysts are the people whose skills and position allows, indeed encourages, creativity.
收起
摘要 :
The variation in the irregularity degree of a finite unramified local field extensions of a local field is investigated with respect to a polynomial formal group and in the multiplicative case. The necessary and sufficient conditi...
展开
The variation in the irregularity degree of a finite unramified local field extensions of a local field is investigated with respect to a polynomial formal group and in the multiplicative case. The necessary and sufficient conditions for the existence of the p(s)th primitive roots of the p(s)th power of 1 and (endomorphism [p(s)](Fm)) in the Lth unramified extension of the local field K (for all positive integers s) are found. The conditions depend only on the ramification index of the maximal Abelian subextension of the field K K-a/Q(p).
收起
摘要 :
In this paper, we have looked at formalization. A computer program must be and is a formalization. Basic data and processes must always be given a formalized description. We can use the computer to perform tasks that would have be...
展开
In this paper, we have looked at formalization. A computer program must be and is a formalization. Basic data and processes must always be given a formalized description. We can use the computer to perform tasks that would have been considered intelligent if they were performed by humans, such as navigation or playing chess. But after the problem is formalized, the computer finds solutions by adding numbers. No intelligence is involved.
收起
摘要 :
We respond to criticism by D. Berry and W. Tichy of our paper that appeared in the March 2002 issue of IEEE Transactions on Software Engineering. Many of the supposed faults they identify in our experiment are a result of a misund...
展开
We respond to criticism by D. Berry and W. Tichy of our paper that appeared in the March 2002 issue of IEEE Transactions on Software Engineering. Many of the supposed faults they identify in our experiment are a result of a misunderstanding on their part, while others are inherent aspects of an educational experiment. We present counterarguments that explain why our experiment is valid.
收起