Academic literature on the topic 'Violator model'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Violator model.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Violator model"

1

Pavlicheva, E. N., F. O. Fedin, A. S. Chiskidov, and N. F. Glybin. "MODEL OF AN INFORMATION SECURITY INTRUDER FOR AN OBJECT OF CRITICAL INFORMATION INFRASTRUCTURE OF A TRANSPORT SERVICES TRADING PLATFORM." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 203 (May 2021): 28–34. http://dx.doi.org/10.14489/vkit.2021.05.pp.028-034.

Full text
Abstract:
The paper presents an approach to the formation of a string model of an intruder of information security of objects of critical information infrastructure of trading platforms for transport services, based on an assessment of the violator's capabilities for physical and logical access to information, an assessment of his competence, equipment and motivation. The prerequisites for the appearance of an infringer of information security of objects of critical information infrastructure are considered. It is described which subjects can act as violators of information security objects of the criti
APA, Harvard, Vancouver, ISO, and other styles
2

An, Shi, Jianxun Cui, Meng Zhao, and Jian Wang. "A Study of Network Violator Interception Based on a Reliable Game Model." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/124343.

Full text
Abstract:
This study focuses on planning interceptor locations in a general transportation network to maximize the expected benefits from catching violators mixing in public traveler flow. Two reliability-related characteristics are also integrated into the planning model to make it more practical. One is that each interceptor (e.g., a sensor or a checkpoint) has a failure probability. The second is the existence of a “game” between the interceptor planner and violators. A nonlinear nonconvex binary integer programming model is presented. We develop a simulated annealing (SA) algorithm to solve this mod
APA, Harvard, Vancouver, ISO, and other styles
3

Boychenko, Oleg, and Ruslana Ziubina. "THE METHOD OF CALCULATION OF PROBABILITY OF REALIZATION OF THREATS OF INFORMATION WITH THE LIMITED ACCESS FROM AN INTERNAL USER VIOLATOR." Information systems and technologies security, no. 1 (1) (2019): 19–26. http://dx.doi.org/10.17721/ists.2019.1.19-26.

Full text
Abstract:
In the article analyzed regulatory documents which regulate the question of information security in the information and telecommunication system. According the results of the analysis the aim of scientific research, which consists in the improvement of method of calculation of probability of realization of threats of information with the limited access from an internal user violator was formed. To achieve this aim, a list of threats of information with limited access which could come from an internal user violator and the internal user violator model was developed. The method of calculation of
APA, Harvard, Vancouver, ISO, and other styles
4

Cui, Jianxun, Shi An, and Meng Zhao. "A Robust Model for the Network Violator Interception Problem." Arabian Journal for Science and Engineering 39, no. 10 (2014): 6871–81. http://dx.doi.org/10.1007/s13369-014-1271-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Loginova, A. O. "The Descriptive Model of Social Bot on the Base of American Political Discourse." Herald of the Siberian State University of Telecommunications and Information Science 18, no. 3 (2024): 3–13. https://doi.org/10.55648/1998-6920-2024-18-3-3-13.

Full text
Abstract:
The purpose of this study is to create a descriptive model of a social bot that takes into account its potential as a violator of information and psychological security. The study was made on the base of American political discourse. The model is based on the results of a comprehensive analysis of the unmarked text corpus of social bot posts on Twitter. The corpus of texts is a collection of texts of posts in English of social network accounts that were previously identified by researchers as social bot accounts involved in the president election campaign. The study is motivated by the lack of
APA, Harvard, Vancouver, ISO, and other styles
6

Sizov, Valerii A., Aleksei D. Kirov, and Viacheslav V. Aleinikov. "Development of models for the automated formation of competencies of a cybersecurity specialist based on a scenario approach." Journal Of Applied Informatics 18, no. 4 (2023): 76–96. http://dx.doi.org/10.37791/2687-0649-2023-18-4-76-96.

Full text
Abstract:
The work is devoted to the development of models for the automated formation of competencies of a cybersecurity specialist based on a scenario approach. The relevance of the work is determined by the need to timely update the requirements for professional competencies of a cybersecurity specialist in the context of the development of methods and tools for information warfare and the lack of a theoretical apparatus that allows automating this process. The purpose of this work is to develop models for the automated formation of competencies of a cybersecurity specialist based on a scenario appro
APA, Harvard, Vancouver, ISO, and other styles
7

Sawicki, Janusz. "Zaniechanie ukarania z art. 16a i 16b k.k.s. — szczególne rodzaje czynnego żalu czy niepotrzebna kazuistyka?" Przegląd Prawa i Administracji 116 (December 20, 2019): 87–101. http://dx.doi.org/10.19195/0137-1134.116.6.

Full text
Abstract:
WAIVING THE PENALTY WITH ARTICLE 16A AND 16B — ARE THESE SPECIAL TYPES OF ACTIVE GRIEF OR UNNECESSARY CASUISTRY?The article is a theoretical study of waiving the penalty of a fiscal penal law violator or a fiscal offender. The issues addressed in the article present major problems that draw the attention of both theorists and practitioners in the field. The aim of the article is to evaluate the contemporary model of waiving the penalty that is formulated by the fiscal penal code within Articles 16, 16a and 16b. The author analyzes in detail the institutions described in the Fiscal Penal Code,
APA, Harvard, Vancouver, ISO, and other styles
8

Kalashnikov, Andrey, and Konstantin Bugajskij. "A Model for Assessing the Security of a Complex Network (Part 1)." Voprosy kiberbezopasnosti, no. 4(50) (2022): 26–38. http://dx.doi.org/10.21681/2311-3456-2022-4-26-38.

Full text
Abstract:
Purpose of the article: development of mechanisms for evaluating the actions of agents of complex information systems from the point of view of information security. Research method: game-theoretic models using stochastic modeling methods. The result: the description of the subject area of application of the model is given, it is shown that the actions of the violator and defender can be considered from the point of view of obtaining and further escalation of access rights on the objects of the information system. It is shown that the model of information confrontation between the defender and
APA, Harvard, Vancouver, ISO, and other styles
9

Pilkevych, I. A., O. S. Boychenko, and I. V. Humeniuk. "Improvimg the Method of Developing a Logic-Probabilistic Model of an Internal Violator." Èlektronnoe modelirovanie 42, no. 4 (2020): 71–86. http://dx.doi.org/10.15407/emodel.42.04.071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhuk, R. "A Method for Determining the Potential of an Information Security Intruder and Realizable Software Vulnerabilities." Proceedings of Telecommunication Universities 7, no. 2 (2021): 95–101. http://dx.doi.org/10.31854/1813-324x-2021-7-2-95-101.

Full text
Abstract:
Currently, many methodological documents have been developed that regulate approaches to the development of models of threats to information security. for information systems that process information of a different nature. There are different methods of threat development and intruder model building proposed by information security regulators, depending on the direction of their activity. To support decision-making in the process of threat modeling, a databank of information security threats has been developed. However, there are a number of contradictions in existing approaches, while the met
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Violator model"

1

Швець, Валеріян Анатолійович, та Тетяна Вікторівна Мелешко. "Напрями забезпечення доступності і цілісності інформації глобальних навігаційних супутникових систем". Thesis, RS Global Sp. z O.O. Warsaw, Poland, 2020. http://er.nau.edu.ua/handle/NAU/41256.

Full text
Abstract:
Based on the analysis of reports and literature on the vulnerability of global navigation satellite systems, the robot presents a developed threat model and an intruder model for navigation information. Using the developed models, organizational and technical measures to protect information are determined. Directions for improving consumer equipment to jamming are given. Organizational measures for protecting against jamming are described.
APA, Harvard, Vancouver, ISO, and other styles
2

Escobar, Lindber Ivan Salas. "Modelos seesaw a baixas energias e modelo de violação mínima de sabor no modelo seesaw tipo III." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/43/43134/tde-26032013-145746/.

Full text
Abstract:
Enquanto todos os modelos com neutrinos massivos de Majorana levam ao mesmo operador efetivo de dimensão d = 5, que não conserva número leptônico, os operadores de dimensão d = 6, obtidos a baixas energias, conservam número leptônico e são diferentes dependendo do modelo de alta energia da nova física. Derivamos os operadores de dimensão d = 6 que são característicos de modelos Seesaw genéricos, no qual a massa do neutrino resulta do intercâmbio de campos pesados que podem ser tanto singletos fermiônicos, tripletos fermiônicos ou tripletos escalares. Os operadores resultantes podem conduzir a
APA, Harvard, Vancouver, ISO, and other styles
3

Colón, Samuel Santana. "Phenomenological model combining flavor symmetry violation and lepton number violation in neutrino physics." [Bloomington, Ind.] : Indiana University, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3334993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sundu, Hayriye. "Lepton Flavor Violation In The Two Higgs Doublet Model." Phd thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608359/index.pdf.

Full text
Abstract:
The lepton flavor violating interactions are interesting in the sense that they are sensitive the physics beyond the standard model and they ensure considerable information about the restrictions of the free parameters, with the help of the possible accurate measurements. In this work, we investigate the lepton flavor violating H+ ! W+l and the lepton flavor conserving H+ ! W+l decays in the general two Higgs doublet model and we estimate decay widths of these decays. After that, we analyze lepton flavor violating decay ! i in the same model and calculate its branching ratio. We observe th
APA, Harvard, Vancouver, ISO, and other styles
5

anderson, David L. "Studies in CPT violation and 331 models." W&M ScholarWorks, 2006. https://scholarworks.wm.edu/etd/1539623495.

Full text
Abstract:
The Standard Model of particles and fields has been around for about 30 years, and has been remarkably successful. However, it is widely believed to be incomplete, and theorists have studied various extensions to the model. These extensions can take many forms. An example of this is the framework Colladay and Kostelecky have proposed for studying Lorentz and CPT violation in a natural extension of the Standard Model. We determined the first bounds on the parameters in the Higgs sector. The bounds on the CPT---even asymmetric coefficients arise from the one-loop contributions to the photon prop
APA, Harvard, Vancouver, ISO, and other styles
6

Cronin, Alexander D. "New techniques for measuring atomic parity violation /." Thesis, Connect to this title online; UW restricted, 1999. http://hdl.handle.net/1773/9766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gupta, Vivek. "Probability of SLA Violation for Semi-Markov Availability." Ohio University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1235610777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hayes, Jonathan Geoffrey. "On lepton flavour violation in realistic supergravity models." Thesis, University of Southampton, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.433965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dent, Thomas Edward. "CP violation and supersymmetry-breaking in superstring models." Thesis, University of Sussex, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.323022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Magleby, Stephanie Allred. "The Violation of Bell's Inequality in a Deterministic but Nonlocal Model." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1197.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Violator model"

1

Kaplow, Louis. Any non-individualistic social welfare function violates the Pareto principle. National Bureau of Economic Research, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

I, Sanda A., and Suzuki S, eds. 1994 International Workshop on B Physics: Physics beyond the standard model at the B factory : Nagoya, Japan, 26-28 October, 1994. World Scientific, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Theoretical, Advanced Study Institute in Elementary Particle Physics (1994 University of Colorado Boulder). CP violation and the limits of the standard model: Proceedings of the 1994 Theoretical Advanced Study Institute in Elementary Particle Physics, TASI-94, University of Colorado at Boulder, 29 May - 24 June 1994. World Scientific, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

-H, Guo X., Sevior M, Thomas A. W. 1949-, National Institute for Theoretical Physics (Australia), and Special Research Centre for the Subatomic Structure of Matter (Australia), eds. Proceedings of the workshop on CP violation: 3-8 July 1998, Adelaide. World Scientific, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hillion, Pierre H. "Size-sorted portfolios and the violation of the random walk hypothesis: Additional empirical evidence and implication for tests of asset pricing models". INSEAD, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tuzov, Andrey, and Nikolay Stoyko. Verification proceedings in the criminal proceedings of the Czech Republic. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2056731.

Full text
Abstract:
The monograph examines the verification proceedings in the criminal proceedings of the Czech Republic. In addition to describing the theoretical model of verification proceedings, the authors thoroughly describe the proceedings on complaints, appeals, cassations, complaints of violation of the law, petitions for the resumption of proceedings, i.e. all types of proceedings in which the legality, validity and motivation of decisions are checked. In describing the proceedings, the authors are based on the text of the Criminal Procedure Law of the Czech Republic (Zákon ze dne 29. listopadu 1961 o
APA, Harvard, Vancouver, ISO, and other styles
7

Levchenko, Boris. Criteria for testing hypotheses about uniformity. Application manual. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/986695.

Full text
Abstract:
The guide discusses the use of statistical criteria focused on the testing of hypotheses about uniformity of laws, which belong to the analyzed sample, of the homogeneous medium (about equality of the mathematical expectations), about the homogeneity of variance (equality of variances of compared samples). The disadvantages and advantages of various criteria are indicated, and the application of criteria in conditions of violation of standard assumptions is considered. Tables containing percentage points and statistical distribution models necessary for the correct application of the criteria
APA, Harvard, Vancouver, ISO, and other styles
8

Blaha, Stephen. The origin of the standard model: The genesis of four quark and lepton species, parity violation, the electro weak sector, color SU(3), three visible generations of fermions, and one generation of dark matter with dark energy ; Quantum theory of the third kind : a new type of divergence-free quantum field theory supporting a unified standard model of elementary particles and quantum gravity based on a new method in the calculus of variations. Pingree-Hill Publishing, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dent, Thomas Edward. CP violation and supersymmetry-breaking in superstring models. 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

CP Violation and the Limits of the Standard Model: Proceedings of the 1994 Theoretical Advanced Study Institute in Elementary Particle Physics Tasi-. World Scientific Pub Co Inc, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Violator model"

1

Khalil, Shaaban, and Stefano Moretti. "CP Violation." In Standard Model Phenomenology. CRC Press, 2022. http://dx.doi.org/10.1201/9780429443015-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mandritsa, I. V., V. I. Petrenko, O. V. Mandritsa, and T. V. Minkina. "Mathematical Concept of a Model for Processing Metadata of Employee’s Psycho-States for Identifying Him as an Internal Violator (Insider)." In Current Problems in Applied Mathematics and Computer Science and Systems. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-34127-4_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Coenen, Norine, Raimund Dachselt, Bernd Finkbeiner, et al. "Explaining Hyperproperty Violations." In Computer Aided Verification. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13185-1_20.

Full text
Abstract:
AbstractHyperproperties relate multiple computation traces to each other. Model checkers for hyperproperties thus return, in case a system model violates the specification, a set of traces as a counterexample. Fixing the erroneous relations between traces in the system that led to the counterexample is a difficult manual effort that highly benefits from additional explanations. In this paper, we present an explanation method for counterexamples to hyperproperties described in the specification logic HyperLTL. We extend Halpern and Pearl’s definition of actual causality to sets of traces witnes
APA, Harvard, Vancouver, ISO, and other styles
4

Zeng, Reng, Zhuo Sun, Su Liu, and Xudong He. "McPatom: A Predictive Analysis Tool for Atomicity Violation Using Model Checking." In Model Checking Software. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31759-0_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kleinknecht, Konrad. "Models of CP Violation." In Springer Tracts in Modern Physics. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-44916-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Giudice, Gian Francesco. "Physics Beyond the Standard Model." In CP Violation in Particle, Nuclear and Astrophysics. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47895-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kleinknecht, Konrad. "10.4 Models of CP Violation." In Theory and Experiments. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-74203-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Beyer, Dirk, and Sudeep Kanav. "An Interface Theory for Program Verification." In Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61362-4_9.

Full text
Abstract:
Abstract Program verification is the problem, for a given program $$P$$ and a specification $$\phi $$, of constructing a proof of correctness for the statement “program $$P$$ satisfies specification $$\phi $$” ($$P \models \phi $$) or a proof of violation ("Equation missing"). Usually, a correctness proof is based on inductive invariants, and a violation proof on a violating program trace. Verification engineers typically expect that a verification tool exports these proof artifacts. We propose to view the task of program verification as constructing a behavioral interface (represented e.g. by
APA, Harvard, Vancouver, ISO, and other styles
9

Borgohain, Happy, and Mrinal Kumar Das. "Lepton Number Violation and Lepton Flavour Violation in Left-Right Symmetric Model." In XXII DAE High Energy Physics Symposium. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73171-1_164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kleinknecht, Konrad. "Weak Mixing, CP Violation and the Standard Model." In Physics for a New Generation. Springer Berlin Heidelberg, 1990. http://dx.doi.org/10.1007/978-3-642-75567-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Violator model"

1

Romanova, Nadezhda, and Vitaly Gryzunov. "OSINT Model of Privacy Violator." In 2025 International Russian Smart Industry Conference (SmartIndustryCon). IEEE, 2025. https://doi.org/10.1109/smartindustrycon65166.2025.10985976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

M, Prathilothamai, Sujan K, Ganapathi G, Nandagopal B, and Varnika Ramkumar. "Traffic Rules Violation Detection System using YOLO v8 Model." In 2024 10th International Conference on Electrical Energy Systems (ICEES). IEEE, 2024. https://doi.org/10.1109/icees61253.2024.10776906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fridell, Kåre, Lukas Graf, Julia Harz, and Chandan Hati. "Simplified models of $d=7$ lepton number violation." In 42nd International Conference on High Energy Physics. Sissa Medialab, 2024. https://doi.org/10.22323/1.476.0187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Hosuk, Gennady A. Smolyakov, and Marek Osiński. "Reciprocity Principle and Structure-Induced Asymmetry between Counterpropagating Modes in Whistle-Geometry Ring Lasers." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.jtu2a.37.

Full text
Abstract:
The asymmetry between the counterpropagating modes in whistle-geometry semiconductor ring lasers might be misconstrued as a violation of the Helmholtz reciprocity principle. We confirm the unidirectionality of the whistle-geometry configuration through rigorous 3D FDTD simulation.
APA, Harvard, Vancouver, ISO, and other styles
5

Ерышов, Вадим Георгиевич, and Никита Вадимович Ерышов. "MODEL OF THE PROCESS OF PROTECTING INFORMATION FROM ITS SECRET RECEIPT BY THE VIOLATOR OF INFORMATION SECURITY ON PROTECTED OBJECTS." In Высокие технологии и инновации в науке: сборник избранных статей Международной научной конференции (Санкт-Петербург, Июль 2020). Crossref, 2020. http://dx.doi.org/10.37539/vt186.2020.12.50.003.

Full text
Abstract:
В статье рассмотрена имитационная модель, позволяющая оценивать потенциальные возможности нарушителя информационной безопасности, эффективность процесса защиты информации от негласного получения информации, а также разрабатывать требования для перспективных систем защиты информации. The article considers a simulation model that allows evaluating the potential capabilities of an information security violator, the effectiveness of the process of protecting information from covert receipt of information, as well as developing requirements for advanced information security systems.
APA, Harvard, Vancouver, ISO, and other styles
6

Ilina, D. V., and V. G. Eryshov. "Analytical Model of Actions of the Information Security Violator on Covert Extraction of Confidential Information Processed on the Protected Object." In 2021 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). IEEE, 2021. http://dx.doi.org/10.1109/weconf51603.2021.9470745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fleischer, Robert. "Current issues in CP violation." In Beyond the standard model. American Institute of Physics, 1997. http://dx.doi.org/10.1063/1.54470.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Valencia, G. "CP violation in W production and decay." In Beyond the standard model. American Institute of Physics, 1997. http://dx.doi.org/10.1063/1.54508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Freitas dos Santos, Thiago, Stephen Cranefield, Bastin Tony Roy Savarimuthu, Nardine Osman, and Marco Schorlemmer. "Cross-community Adapter Learning (CAL) to Understand the Evolving Meanings of Norm Violation." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/13.

Full text
Abstract:
Cross-community learning incorporates data from different sources to leverage task-specific solutions in a target community. This approach is particularly interesting for low-resource or newly created online communities, where data formalizing interactions between agents (community members) are limited. In such scenarios, a normative system that intends to regulate online interactions faces the challenge of continuously learning the meaning of norm violation as communities' views evolve, either with changes in the understanding of what it means to violate a norm or with the emergence of new vi
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Jike. "Beyond Standard Model searches at LHC." In Flavor Physics and CP Violation. Sissa Medialab, 2017. http://dx.doi.org/10.22323/1.280.0027.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Violator model"

1

Lavoura, L. Superweak-like models of CP violation. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/6949960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lavoura, L. Superweak-like models of CP violation. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/10187704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chang, Darwin. Ruling out the Weinberg Model of Spontaneous CP Violation. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/784778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chang, Darwin. Ruling out the Weinberg Model of Spontaneous CP Violation. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/784808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Faraggi, A. E. R-parity violation in superstring derived models. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/446358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Athanasiu, Gregory George. Restrictions on Two Higgs Doublet Models and CP Violation at the Unification Scale. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1454027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Athanasiu, G. G. Restrictions on two Higgs doublet models and CP violation at the unification scale. Office of Scientific and Technical Information (OSTI), 1987. http://dx.doi.org/10.2172/6172237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Woods, Michael B. A Search for Direct CP Violation in the 2 pi Decay Modes of Neutral Kaons. Office of Scientific and Technical Information (OSTI), 1988. http://dx.doi.org/10.2172/1433212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lavoura, L. Comment on Flavor-changing processes and CP violation in the S sub 3 times Z sub 3 model''. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/7200442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lavoura, L. Comment on ``Flavor-changing processes and CP violation in the S{sub 3} {times} Z{sub 3} model``. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/10187890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!