LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:

OpenAIRE is about to release its new face with lots of new content and services.
During September, you may notice downtime in services, while some functionalities (e.g. user registration, validation, claiming) will be temporarily disabled.
We apologize for the inconvenience, please stay tuned!
For further information please contact helpdesk[at]openaire.eu

fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Name
arXiv.org e-Print Archive
Type
Thematic Repository
Items
1427925 Publications
Compatibility
OpenAIRE Basic (DRIVER OA)
OAI-PMH
http://export.arxiv.org/oai2
More information
Detailed data provider information (OpenDOAR)

 

  • Gravitomagnetism and Angular Momenta of Black-Holes

    Berman, Marcelo Samuel (2006)
    We review the energy contents formulae of Kerr-Newman black-holes, where gravitomagnetic energy term comes to play(Berman, 2006; 2006a; 2004). Then, we obtain the angular momenta formulae, which include the gravitomagnetic effect. Three theorems can be enunciated: (1) No black-hole has its energy confined to its interior; (2) Rotating black-holes do not have confined angular momenta; (3) The energy density of a black-hole is not confined to its interior. The difference between our calculation...

    The flattening and the orbital structure of early-type galaxies and collisionless N-body binary disk mergers

    Thomas, J.; Jesseit, R.; Saglia, R. P.; Bender, R.; Burkert, A.; Corsini, E. M.; Gebhardt, K.; Magorrian, J.; Naab, T.; Thomas, D.; Wegner, G. (2008)
    We use oblate axisymmetric dynamical models including dark halos to determine the orbital structure of intermediate mass to massive Coma early-type galaxies. We find a large variety of orbital compositions. Averaged over all sample galaxies the unordered stellar kinetic energy in the azimuthal and the radial direction are of the same order, but they can differ by up to 40 percent in individual systems. In contrast, both for rotating and non-rotating galaxies the vertical kinetic energy is on ...

    Hard spectator interactions in B to pi pi at order alpha_s^2

    Pilipp, Volker (2007)
    In the present thesis I discuss the hard spectator interaction amplitude in $B\to\pi\pi$ at NLO i.e. at $\mathcal{O}(\alpha_s^2)$. This special part of the amplitude, whose LO starts at $\mathcal{O}(\alpha_s)$, is defined in the framework of QCD factorization. QCD factorization allows to separate the short- and the long-distance physics in leading power in an expansion in $\lqcd/m_b$, where the short-distance physics can be calculated in a perturbative expansion in $\alpha_s$. Compared to oth...

    Non-Convex Rank Minimization via an Empirical Bayesian Approach

    Wipf, David (2012)
    In many applications that require matrix solutions of minimal rank, the underlying cost function is non-convex leading to an intractable, NP-hard optimization problem. Consequently, the convex nuclear norm is frequently used as a surrogate penalty term for matrix rank. The problem is that in many practical scenarios there is no longer any guarantee that we can correctly estimate generative low-rank matrices of interest, theoretical special cases notwithstanding. Consequently, this paper propo...

    A Secure And High Capacity Image Steganography Technique

    S, Hemalatha; Acharya, U Dinesh; A, Renuka; Kamath, Priya R. (2013)
    Steganography is the science of invisible communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image using Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted secret images are also s...
  • No data provider research data found
  • Latest Documents Timeline

    Chart is loading... It may take a bit of time. Please be patient and don't reload the page.

    Document Types

    Chart is loading... It may take a bit of time. Please be patient and don't reload the page.

    Funders in data provider publications

    Chart is loading... It may take a bit of time. Please be patient and don't reload the page.

    Projects with most Publications

    Chart is loading... It may take a bit of time. Please be patient and don't reload the page.

Share - Bookmark

Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
More information Ok