Several descriptions of basically one transformation technique, viz. accumulation, are compared. Their basis, viz. the associativity and the existence of a neutral element inherent in a monoid, is identified
We study a model of growth of tumors with a free boundary delaying the tumor region. We take into ac...
We study continuous maps of the unit interval into itself. We determine necessary and suffcient cond...
AbstractCoalgebras of set functors preserving weak pullbacks are particularly well-behaved. Invoking...
In a linear differential algebraic equation with properly stated leading term, the involved derivati...
In this paper we give sharp explicit estimates for the difference of the Weil height and the Néron -...
The paper generalizes results of [B] by formulating their background in categories with a sufficient...
We present a non-looping method to construct Kripke trees refuting the non-theorems of intuitionisti...
In this paper, the concept of Abramov’s method for transferring boundary conditions posed for regula...
A multipartite tournament is an orientation of a complete multipartite graph. Simple derivations are...
We give a general method for computing the cyclic cohomology of crossed products by etale groupoids ...
A shooting method for two-point-boundary value problems for fully implicit index-1 and -2 differenti...
A new measure of risk is introduced for a sequence of random incomes adapted to some filtration. Thi...
We present the derivation of a solution to a LISP programming exercise. The derivation is in three s...
A recursive algorithm for generating the prefix and infix traversaCls of a binary tree is inverted t...
In papers [1,2] there were consider different assumptions for averaging methods along the vertical c...
We study a model of growth of tumors with a free boundary delaying the tumor region. We take into ac...
We study continuous maps of the unit interval into itself. We determine necessary and suffcient cond...
AbstractCoalgebras of set functors preserving weak pullbacks are particularly well-behaved. Invoking...
In a linear differential algebraic equation with properly stated leading term, the involved derivati...
In this paper we give sharp explicit estimates for the difference of the Weil height and the Néron -...
The paper generalizes results of [B] by formulating their background in categories with a sufficient...
We present a non-looping method to construct Kripke trees refuting the non-theorems of intuitionisti...
In this paper, the concept of Abramov’s method for transferring boundary conditions posed for regula...
A multipartite tournament is an orientation of a complete multipartite graph. Simple derivations are...
We give a general method for computing the cyclic cohomology of crossed products by etale groupoids ...
A shooting method for two-point-boundary value problems for fully implicit index-1 and -2 differenti...
A new measure of risk is introduced for a sequence of random incomes adapted to some filtration. Thi...
We present the derivation of a solution to a LISP programming exercise. The derivation is in three s...
A recursive algorithm for generating the prefix and infix traversaCls of a binary tree is inverted t...
In papers [1,2] there were consider different assumptions for averaging methods along the vertical c...
We study a model of growth of tumors with a free boundary delaying the tumor region. We take into ac...
We study continuous maps of the unit interval into itself. We determine necessary and suffcient cond...
AbstractCoalgebras of set functors preserving weak pullbacks are particularly well-behaved. Invoking...