Results 21 - 30
of
47
port Vector Machines, Kernel Fisher Discriminant analysis
"... Abstract | This review provides an introduction to Sup- ..."
LumiNet An Organic Interactive Illumination Network Diploma Thesis at the Media Computing Group
"... I hereby declare that I have created this work completely on my own and used no other sources or tools than the ones listed, and that I have marked any citations accordingly. Hiermit versichere ich, dass ich die vorliegende Arbeit selbständig verfasst und keine anderen als die angegebenen Quellen un ..."
Abstract
- Add to MetaCart
I hereby declare that I have created this work completely on my own and used no other sources or tools than the ones listed, and that I have marked any citations accordingly. Hiermit versichere ich, dass ich die vorliegende Arbeit selbständig verfasst und keine anderen als die angegebenen Quellen und Hilfsmittel benutzt sowie Zitate kenntlich gemacht habe.
3esis Supervisor Accepted by
, 2005
"... in partial ful2llment of the requirements for the degree of ..."
Accepted by....
, 2010
"... In this thesis, two sets of experimental studies in bosonic and fermionic gases are described. In the first part of the thesis, itinerant ferromagnetism was studied in a strongly interacting Fermi gas of ultracold atoms. The observation of nonmonotonic behavior of lifetime, kinetic energy, and size ..."
Abstract
- Add to MetaCart
In this thesis, two sets of experimental studies in bosonic and fermionic gases are described. In the first part of the thesis, itinerant ferromagnetism was studied in a strongly interacting Fermi gas of ultracold atoms. The observation of nonmonotonic behavior of lifetime, kinetic energy, and size for increasing repulsive interactions pro-vides strong evidence for a phase transition to a ferromagnetic state. Our observations imply that itinerant ferromagnetism of delocalized fermions is possible without lattice and band structure, and our data validate the most basic model for ferromagnetism introduced by Stoner. In the second part of the thesis, the coherence properties of a Bose-Einstein con-densate (BEC) was studied in a radio frequency induced double-well potential imple-mented on a microfabricated atom chip. We observed phase coherence between the separated condensates for times up to 200 ms after splitting, a factor of 10 longer than the phase diffusion time expected for a coherent state for our experimental con-ditions. The enhanced coherence time is attributed to number squeezing of the initial
von:
, 2009
"... Die Theorie an und für sich ist nichts nütze, als insofern sie uns den Zusammenhang der Erscheinungen glauben macht. ..."
Abstract
- Add to MetaCart
Die Theorie an und für sich ist nichts nütze, als insofern sie uns den Zusammenhang der Erscheinungen glauben macht.
Network science Complex network Community detection
"... This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or sel ..."
Abstract
- Add to MetaCart
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit:
doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine
, 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract
- Add to MetaCart
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real
Results 21 - 30
of
47