Weak topology

Results: 63



#Item
11An elementary approach to the Daugavet equation Dirk Werner Abstract. Let T : C(S) → C(S) be a bounded linear operator. We present a necessary and sufficient condition for the so-called Daugavet

An elementary approach to the Daugavet equation Dirk Werner Abstract. Let T : C(S) → C(S) be a bounded linear operator. We present a necessary and sufficient condition for the so-called Daugavet

Add to Reading List

Source URL: page.mi.fu-berlin.de

Language: English - Date: 2012-11-07 06:36:45
12The weak topology of locally convex spaces and the weak-* topology of their duals Jordan Bell  Department of Mathematics, University of Toronto April 3, 2014

The weak topology of locally convex spaces and the weak-* topology of their duals Jordan Bell Department of Mathematics, University of Toronto April 3, 2014

Add to Reading List

Source URL: individual.utoronto.ca

Language: English - Date: 2014-04-03 12:56:54
13

PDF Document

Add to Reading List

Source URL: individual.utoronto.ca

Language: English - Date: 2014-04-21 13:55:26
14Weak convergence of rescaled discrete objects in combinatorics Jean-Fran¸cois Marckert (LaBRI - Bordeaux) −◦−◦−◦−◦−◦−◦−◦−◦− O. What are we talking about? - Pictures I. Random variables,

Weak convergence of rescaled discrete objects in combinatorics Jean-Fran¸cois Marckert (LaBRI - Bordeaux) −◦−◦−◦−◦−◦−◦−◦−◦− O. What are we talking about? - Pictures I. Random variables,

Add to Reading List

Source URL: www.ime.usp.br

Language: English - Date: 2008-04-23 13:52:12
15The Strategic Impact of Higher-Order Beliefs⇤ Yi-Chun Chené Alfredo Di Tillioè  Eduardo Faingoldê

The Strategic Impact of Higher-Order Beliefs⇤ Yi-Chun Chené Alfredo Di Tillioè Eduardo Faingoldê

Add to Reading List

Source URL: www.parisschoolofeconomics.eu

Language: English - Date: 2013-04-26 16:42:09
16Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition Tsutomu Iijima  ∗

Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition Tsutomu Iijima ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-11-21 23:49:35
17THE HOMOTOPY THEORY OF EQUIVALENCE RELATIONS ´ FINNUR LARUSSON Abstract. We give a detailed exposition of the homotopy theory of equivalence relations, perhaps the simplest nontrivial example of a model structure.

THE HOMOTOPY THEORY OF EQUIVALENCE RELATIONS ´ FINNUR LARUSSON Abstract. We give a detailed exposition of the homotopy theory of equivalence relations, perhaps the simplest nontrivial example of a model structure.

Add to Reading List

Source URL: www.maths.adelaide.edu.au

Language: English - Date: 2007-04-22 23:25:56
18Photon Factory Activity Report 2013 #[removed]B  NW-2A/2012G017 The Diversity of Network Topology Composed of Zn(II) and Multi-Interactive Ligand TPHAP– via Weak Intermolecular Interaction

Photon Factory Activity Report 2013 #[removed]B NW-2A/2012G017 The Diversity of Network Topology Composed of Zn(II) and Multi-Interactive Ligand TPHAP– via Weak Intermolecular Interaction

Add to Reading List

Source URL: pfwww.kek.jp

Language: English - Date: 2014-07-09 22:58:46
19Randomness in Cryptography  January 24, 2013 Lecture 3: Privacy and Weak Sources Lecturer: Yevgeniy Dodis

Randomness in Cryptography January 24, 2013 Lecture 3: Privacy and Weak Sources Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2014-03-05 15:29:24
20PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 130, Number 12, Pages 3687–3692 S[removed][removed]Article electronically published on July 2, 2002

PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 130, Number 12, Pages 3687–3692 S[removed][removed]Article electronically published on July 2, 2002

Add to Reading List

Source URL: www.mat.ucm.es

Language: English - Date: 2002-08-20 10:25:38