mirage

# Browsing by Title

Sort by: Order: Results:

• (American Physical Society, 2012)
We present a search for Kaluza-Klein (KK) particles predicted by models with universal extra dimensions (UED) using a data set corresponding to an integrated luminosity of $7.3 \text{fb}^{−1}$, collected by the D0 detector ...
• (American Physical Society, 2012)
Using data collected with the D0 detector at the Fermilab Tevatron Collider, corresponding to $5.3 \text{fb}^{−1}$ of integrated luminosity, we search for violation of Lorentz invariance by examining the $t\bar{t}$ production ...
• (American Physical Society, 2012)
This report describes a search for associated production of $W$ and Higgs bosons based on data corresponding to an integrated luminosity of $\mathscr{L}≈5.3 \text{fb}^{−1}$ collected with the D0 detector at the Fermilab ...
• (Indiana University Digital Library Program, 2006-10-25)
• (Rob Kling Center for Social Informatics, 2002)
A common phenomenon in online discussion groups is the individual who baits and provokes other group members, often with the result of drawing them into fruitless argument and diverting attention from the stated purposes ...
• (The Medieval Review, 2003-03)
• (2013-03-29)
• (The Medieval Review, 2006-08)
• (The Medieval Review, 2013-10)
• (Mathematical Sciences Publishers, 2012)
Let C be the topological knot concordance group of knots $S^{1} \subset S^{3}$ under connected sum modulo slice knots. Cochran, Orr and Teichner defined a filtration: \[C \supset F_{(0)} \supset F_{(0.5)} \supset F_{(1)} ...
• (R.J. Bright, State Printer, Indianapolis, 1870)
• (2005-03)
Much of the collection development literature focuses on selection and management of collection content, but little focuses on the art of managing individual funds within the context of an institution's library materials ...
• (2012-03)
International research network connections are unusual in the operation of network connections that cross the U.S. border. This places these networks in a position to see traffic crossing national boundaries, between ...
• (ACM, 2012)
The XSEDE 12 Panel Discussed Security for Science Gateways, Campus Bridging and discussed year 2 focus on Security Guidelines, Rocks Rolls Software Distribution, InCommon Authentication.
• (12/9/1993)
This paper describes the strategy adopted by Indiana University in the design and implementation of a security model for the client/server environment. The strategic initiatives which were the catalyst for this effort are ...
• (12/9/1993)
• (2007-04-10)
Since the 1930s, researchers have framed rat locomotion in a lit open field in terms of fear and anxiety. Modern studies have continued this interpretation, describing open field behavior in terms of security optimization. ...
• (African Studies Program, IU-Bloomington, 1982)
Discusses reasons and history of the security situation in Africa in the late 1970s and places the discussion in a historical context.
• (Indiana Geological Survey, 1955-09)
Devonian rocks in southern Indiana have presented many problems of correlation; their stratigraphy has been studied during recent years by T. A. Dawson and John B. Patton. General conditions of sedimentation of the Devonian ...
• (Indiana Geological Survey, 1974)
Lake Lemon was constructed during 1953 in a hilly, Heavily wooded drainage basin. Considerable lakeside development has taken place after impoundment, and as a result concern has arisen about the sedimentation rate in the ...