Found 1073106 results in 240836 files, showing top 450 files (show more).
0703:hep-ex0703020/Analysis.tex : [ ]
0807:0807.3367/analysis.tex : [ ]
0112:math0112146/analysis.fig : [ ]
0501:cs0501069/analysis-fof.tex : [ ]
0712:0712.0803/analysis.tex : [ ]
0806:0806.0404/AnalysisAnti2.pdf : [ ]
0712:0712.2534/analysisNumbers.tex : [ ]
0501:cs0501069/analysis-lkpconsistency.tex : [ ]
0710:0710.0270/analysis-lkpconsistency_jan25.tex : [ ]
0710:0710.4255/figures/analysis.setup.tex : [ ]
0109:astro-ph0109030/analysis_jonesforman.ps : [ ]
0706:0706.0939/analysis.eps : [ ]
0211:hep-ex0211013/analysis_flow.eps : [ ]
0307:astro-ph0307384/analysis.eps : [ ]
0602:cond-mat0602142/AnalysisFig3.eps : [ ]
0702:hep-ph0702204/analysis-angles.eps : [ ]
0702:hep-ph0702204/analysis-noangles.eps : [ ]
0602:cs0602020/analysis.tex.cry : [ ]
0710:0710.1250/analysis.eps : [ ]
0808:0808.3937/analysis.tex.cry : [ ] Duplicate result
0604:cond-mat0604625/analysis-box.eps : [ ] Duplicate result
0807:0807.2687/analysis_mask.png : [ ] Duplicate result
0604:cond-mat0604625/analysis-harmonic.eps : [ ] Duplicate result
0806:0806.0404/AnalysisPerfect.pdf : [ ] Duplicate result
0408:hep-ph0408079/analysis-angles.eps : [ ] Duplicate result
0501:hep-ph0501199/analysis-angles.eps : [ ] Duplicate result
0408:hep-ph0408079/analysis-everything.eps : [ ] Duplicate result
0501:hep-ph0501199/analysis-everything.eps : [ ] Duplicate result
0510:hep-ph0510077/analysis-everything.ps : [ ] Duplicate result
0703:cond-mat0703423/Analysisfigure.eps : [ ]
0804:0804.3706/figures/EventView/Analysisitr.pdf : [ ] Duplicate result
0501:hep-ex0501010/bib-analysis.tex : [ ]
0404:hep-ex0404038/Bona-analysis.tex : [ ]
0804:0804.2827/B1608acsAnalysis.bbl : [ ]
0402:cond-mat0402179/CeXanalysis.eps : [ ]
0510:cond-mat0510696/EigenChannelAnalysis.bbl : [ ]
0508:cond-mat0508244/F5_analysis_pe.eps : [ ]
0402:cond-mat0402179/UPt3analysis.eps : [ ]
0804:0804.2827/B1608acsAnalysis_macro.tex : [ ]
0402:cond-mat0402179/UBe13analysis.eps : [ ]
0402:cond-mat0402179/CeSn3analysis.eps : [ ]
0402:cond-mat0402179/In1analysisRh.eps : [ ]
0402:cond-mat0402179/CePtSiAnalysis.eps : [ ]
0402:cond-mat0402179/URu2Si2analysis.eps : [ ]
0402:cond-mat0402179/CeAl3analysis.eps : [ ]
0402:cond-mat0402179/Ce343analysis.eps : [ ]
0506:physics0506176/workloadAnalysis.bbl : [ ]
0408:hep-lat0408017/GM1_compare_analysis2.ps : [ ]
0805:0805.2751/galcount_analysis.eps : [ ]
0402:cond-mat0402179/CeCoIn5In1analysis.eps : [ ]
0402:cond-mat0402179/CeCoIn5In2analysis.eps : [ ]
0608:quant-ph0608001/SecurityAnalysis13.bbl : [ ]
0712:0712.2149/sections/SimulationsAnalysis.tex : [ ]
0801:0801.3806/symmetry_analysis.bbl : [ ]
0704:0704.1688/Fig3_ScalingAnalysis.eps : [ ]
0311:hep-ex0311019/figures_sleptons_analysis.tex : [ ]
0311:hep-ex0311019/figures_neutralino_analysis.tex : [ ]
0607:cond-mat0607819/textAnalysis005.bbl : [ ]
0607:cond-mat0607819/textAnalysis005.tex : [ ]
0008:hep-ex0008053/lds/lds_analysis.tex : [ ]
0703:cs0703042/graphs/lbrozovsky-colfi-analysis-values-frequencies-libimseti.txt : [ ]
0703:cs0703042/graphs/lbrozovsky-colfi-analysis-ratings-frequencies-libimseti.txt : [ ]
0703:cs0703042/graphs/lbrozovsky-colfi-analysis-similarities-ratings-pearson-libimseti.txt : [ ]
0703:cs0703042/graphs/lbrozovsky-colfi-analysis-similarities-scores-adjusted-libimseti.txt : [ ]
0210:astro-ph0210010/phasemod_analysis.eps : [ ]
0702:math0702136/Delaunay05_V4_Analysis.tex : [ ]
0702:math0702136/Delaunay05_V4_Analysis.texx : [ ] Duplicate result
0811:0811.4643/13_ZFR_analysis.eps : [ ]
0505:astro-ph0505623/figures/misc/graphical_analysis.ps : [ ]
0805:0805.3598/Rplot_Sox2_analysis_anno.eps : [ ]
0808:0808.1844/fig7_sedov_peak_analysis.ps : [ ]
0709:0709.0147/chi2_analysis_run5pp_final.eps : [ ]
0609:physics0609179/SCEC_raw_4_45_analysis.eps : [ ]
0706:0706.2039/nonpulsing_analysis.eps : [ ]
0303:cond-mat0303589/KK_analysis.eps : [ ]
0808:0808.2408/mean_time_wavelength_analysis.eps : [ ]
0410:astro-ph0410742/compton_edge_analysis.eps : [ ]
0509:math0509698/DataAnalysisChi90.eps : [ ]
0509:math0509698/DataAnalysisPercC.eps : [ ]
0509:math0509698/DataAnalysisPercCMLS.eps : [ ]
0509:math0509698/DataAnalysisMeanRuns.eps : [ ]
0609:q-bio0609029/1p5m_analysis2.eps : [ ] Duplicate result
0609:q-bio0609029/1uud_analysis2.eps : [ ] Duplicate result
0408:cs0408042/figs/ErrAnalysis.ps : [ ] Duplicate result
0810:0810.3626/DISCUS_analysis2.eps : [ ] Duplicate result
0806:0806.4074/gaas-afm-analysis.jpg : [ ] Duplicate result
0804:0804.3706/figures/EventView/ModularAnalysis.pdf : [ ] Duplicate result
0807:0807.0705/pdr_analysis_p24_3.eps : [ ] Duplicate result
0804:0804.3706/figures/EventView/TopViewAnalysis.pdf : [ ] Duplicate result
0807:0807.0143/na2_analysis.new.eps : [ ] Duplicate result
0611:math0611730/D_1_analysis.jpeg : [ ] Duplicate result
0608:gr-qc0608114/DataAnalysisBW.eps : [ ] Duplicate result
0808:0808.0581/spectral-analysis.eps : [ ] Duplicate result
0806:0806.0302/figures/thermalFEanalysis.eps : [ ] Duplicate result
0808:0808.1031/TRTSCTCombinedAnalysis_grey.eps : [ ] Duplicate result
0710:0710.0192/figures/dd_conv_analysis.fig : [ ] Duplicate result
0712:0712.4101/images/stabilityAnalysis-crop.pdf : [ ] Duplicate result
0710:0710.0192/figures/dd_conv_analysis_rate_0_5.fig : [ ] Duplicate result
0710:0710.0192/figures/dd_conv_analysis_48regular.fig : [ ] Duplicate result
0710:0710.0405/phase_slice_wooferfit_analysis_plate1.eps : [ ] Duplicate result
0803:0803.2812/FORVIEW_ExperimentalhorseIMG_0013SVESVE_analysis.eps : [ ] Duplicate result
0402:cond-mat0402179/YbCuAlanalysis.eps : [ ]
0402:cond-mat0402179/CeCu2Si2Sianalysis.eps : [ ]
0402:cond-mat0402179/CeCu2Si2Cuanalysis.eps : [ ]
0703:physics0703039/plots/xxx.svn/prop-base/TMVAnalysisFlow.pdf.svn-base : [ ]
0502:astro-ph0502238/datanalysis.tex : [ ]
0310:gr-qc0310034/g-dataanalysis.tex : [ ]
0512:hep-th0512267/constraintanalysis.bbl.fix : [ ]
0204:quant-ph0204034/bellstateanalysis5.tex : [ ]
0010:astro-ph0010587/formanalysis.tex : [ ]
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas1.eps : [ ]
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas61.eps : [ ]
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas137.eps : [ ]
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas342.eps : [ ]
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas1114.eps : [ ]
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas12770.eps : [ ]
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas12641.eps : [ ]
0705:0705.1601/images/0,2stackonstackanalysis.eps : [ ]
0411:cond-mat0411722/blockanalysis.eps : [ ]
0612:quant-ph0612004/overview/images/repeatedmixinganalysis.eps : [ ]
0705:0705.3251/topew/figures/st_tev_cdfanalysis_proc2.eps : [ ]
0709:0709.0558/FEMAnalysis.pdf : [ ] Duplicate result
0705:0705.3251/topew/figures/st_tev_cdfanalysis_proc1b.eps : [ ]
0705:0705.3251/topew/figures/st_tev_cdfanalysis_proc1a.eps : [ ]
0703:physics0703039/plots/TMVAnalysisFlow.pdf : [ ] Duplicate result
0806:0806.0621/artgalanalysis_final_small.eps : [ ] Duplicate result
0703:physics0703039/plots/xxx.svn/text-base/TMVAnalysisFlow.pdf.svn-base : [ ] Duplicate result
0705:0705.1601/images/0,2stackonstackanalysis.pdf : [ ] Duplicate result
0101:hep-ex0101041/analysis : [ ]

1:

\section{Data analysis and selection criteria}

7:

The strategy of the analysis was to identify $\nudecay$ candidates

56:

blind analysis was performed.\ Events in a signal box

57:

defined by $\C < 2\times10^{-5}$ were excluded from the analysis of the data

0408:cs0408042/analysis.tex : [ ]

1:

\section{Analysis for Special Cases}~\label{analysis}

17:

\includegraphics[scale=0.35]{figs/ErrAnalysis.ps}

19:

\label{fig:errAnalysis}

32:

occurs (identical to the fixed velocity analysis above) and the second

67:

Figure \ref{fig:errAnalysis} shows the graph of error against $n$ . As

69:

graph in Figure \ref{fig:errAnalysis}. We can see that for $n>0$, the

82:

error vector. Graph in Figure \ref{fig:errAnalysis} shows the absolute

93:

Figure \ref{fig:errAnalysis} shows the comparison of MADRD protocol

0607:cs0607050/analysis.tex : [ ]

1:

\section{Analysis}

2:

\label{s:analysis}

13:

properties. We restrict our analysis to homogeneous groups with an

22:

analysis gives him or her more control over the final result, at the

38:

analysis in real-time. We first describe how elements are extracted given a chosen

44:

\subsection{Element analysis}

47:

The purpose of element analysis is to cluster a set of strokes drawn by

54:

analysis. Then, valid pairs of elements that can be perceived as a

56:

points and lines is illustrated in \fig{f:element_analysis}.

114:

\subsection{Group analysis}

136:

justified from a perceptual point of view: basing our analysis

0609:q-bio0609032/CCAnalysis.tex : [ ]

1:

\section{Analysis}

7:

For local stability analysis it is useful to note that the model has

20:

is also useful for local stability analysis that the determinant of \eqref{GeneralJacobian}

476:

The stability analysis above delimits the situations in which evolutionary cycles occur.

0604:nucl-ex0604011/analysis.tex : [ ]

2:

\section{Data \& data analysis}\label{analysis}

0607:hep-ex0607105/analysis.tex : [ ]

1:

%% $Id: analysis.tex,v 1.10 2006/07/24 20:33:19 chcheng Exp $

2:

\section{TIME-DEPENDENT ANALYSIS}

3:

\label{sec:analysis}

0607:hep-ex0607084/analysis.tex : [ ]

16:

...(57 bytes skipped)... mean value of $497.2\mevcc$ and a resolution of $2.5\mevcc$ for both decay modes. For the further analysis we define the \KS signal region as a $\pm10\mevcc$ mass window centered around the signal mean valu...(17 bytes skipped)...

0609:cs0609038/analysis.tex : [ ]

2:

%%%%%%%%%%% ANALYSIS %%%%%%%%%%%%%

5:

\bsection{Analysis}

6:

\label{s.Analysis}

15:

%Our analysis is focused first on the one cluster-head scenario, and

61:

A detailed mathematical analysis of the performance of the cluster-head

66:

the results of this analysis.

149:

not} depend on $d(\cdot)$ which makes the analysis of $\urho(x), \orho(x)$

0602:hep-ex0602026/analysis.tex : [ ]

54:

the available luminosity for the analysis, while minimising the uncertainty in the measured polarisation, on a run-by-run basis.

0408:hep-ex0408068/analysis.tex : [ ]

2:

\section{Common Analysis Aspects}

7:

base for the analyses presented here. However, each analysis may differ in some details.

10:

analysis are provided in the following sections.

58:

To improve the resolution on these four-momenta this analysis

143:

example of such a $\chi^2$ fit for the \mx\ analysis is shown in Fig.~\ref{mxfit}.

144:

For the exclusive analysis the background normalization is

209:

by repeating the analysis with only the \Bz\Bzb or the \Bp\Bm Monte Carlo.

0502:hep-ex0502026/analysis.tex : [ ]

1:

\section{\label{sec:ana}Analysis}

0603:hep-ex0603034/analysis.tex : [ ]

1:

\section{Analysis}

0702:cs0702084/analysis.tex : [ ]

76:

\subsubsection {Performance Analysis}

0508:physics0508171/analysis.tex : [ ]

135:

analysis. Results are shown in the figure \ref{fig:geco2}, \ref{fig:geardme1}

0512:hep-ph0512307/analysis.tex : [ ]

2:

\chapter{Analysis}

11:

...(370 bytes skipped)...zations and CompHEP \cite{comphep} where the beam polarizations are not taken into account. In this analysis mainly the O'Mega generator is used since it includes the Standard Model anomalous triple gauge bos...(606 bytes skipped)...

62:

...(775 bytes skipped)... that can be included as well as background events to be overlayed to each processed event. In this analysis...(412 bytes skipped)...ma\gamma$-detector. The best estimates for the energy flow objects are stored such that the physics analysis package VECSUB \cite{vecsub} can be used directly.

129:

...(1613 bytes skipped)...logarithms while for the light quark masses the $y_{cut}$ parameter regulates divergencies. In this analysis massless quarks are assumed, except the $b$ quarks which are assumed to be massive.

207:

...(401 bytes skipped)...l particles in the region above the line shown in (\textit{b}) and (\textit{d}) are rejected in the analysis.}

239:

After the pileup rejection, the remaining tracks of the event are collected and the analysis is done on the 'event level' applying several successive cuts. A cluster analysis i.e. determination of the number of jets present in the event and reconstruction of the correspondi...(108 bytes skipped)...

571:

This model shows that the fit method applied in the present analysis is correct. If ``data'' and Monte Carlo samples are identical, the central value is correctly estim...(193 bytes skipped)...

0806:0806.0797/analysis.tex : [ ]

1:

\chapter{Analysis techniques}

2:

\label{ch:analysis}

216:

The following analysis assumes that the eclipse is solely of a white

0507:hep-ex0507017/analysis.tex : [ ]

5:

basis for the \mx-\Q\ analysis presented here.

0304:hep-ex0304030/analysis.tex : [ ]

1:

\section{Analysis method}

2:

\label{sec:Analysis}

112:

test the analysis strategy and the agreement between the

192:

consider in this analysis are determined from detailed Monte

557:

The analysis uses the following $\tau$ decay channels:

0507:hep-ex0507085/analysis.tex : [ ]

1:

\section{Overview of Analysis Method}

4:

The analysis strategy follows closely that of Ref. \cite{ichep04}.

0805:0805.3086/analysis.tex : [ ]

1:

\chapter{Analysis method of identified charged particle spectra}

3:

In this section the analysis technique of identified charged particle spectra measurements of $\pi^{\pm}$, $K^{\pm}$, $\overline...(83 bytes skipped)...

5:

\section{General procedure of data analysis}

7:

...(7 bytes skipped)...the detailed discussion, a general overview is given to provide a conceptual framework for the data analysis...(43 bytes skipped)...icle spectra and their properties for identified pions, kaons and protons/antiprotons. Steps of the analysis leading to the fully corrected identified particle spectra are listed below:

10:

\item{Once a good event is identified, good tracks are selected based on the analysis specific quality cuts.

49:

\resizebox{.9\textwidth}{!}{\includegraphics{Plots/analysis/pp_multiplicity3.eps}}

61:

\resizebox{.9\textwidth}{!}{\includegraphics{Plots/analysis/dAuMult.eps}}

70:

\resizebox{.9\textwidth}{!}{\includegraphics{Plots/analysis/dAu_TPC_FTPC_mult.eps}}

79:

\resizebox{.9\textwidth}{!}{\includegraphics{Plots/analysis/dAuMult2.eps}}

98:

\resizebox{.9\textwidth}{!}{\includegraphics{Plots/analysis/AuAuMult.eps}}

110:

...(195 bytes skipped)...\% as shown in Table~\ref{tab:auau_coll_prop}. The last centrality bin 80-100\% is not used in data analysis due to significant trigger bias.

114:

Tracks selected for spectra analysis...(576 bytes skipped)...nted as shown in Table~\ref{Tab:qa_cuts}. Set 1 represents the default quality cuts for the spectra analysis implemented in this work.

164:

The correction in our analysis relies on good knowledge of the detector and its simulation. The STAR geometry has been implemented...(462 bytes skipped)...

175:

\resizebox{.9\textwidth}{!}{\includegraphics{Plots/analysis/all_XY_hits.eps}}

198:

\resizebox{.45\textwidth}{!}{\includegraphics{Plots/analysis/Piminus_longRes_dipAng_p2.eps}}

199:

\resizebox{.45\textwidth}{!}{\includegraphics{Plots/analysis/Piminus_longResMean_dipAng_p2.eps}}

209:

\resizebox{.45\textwidth}{!}{\includegraphics{Plots/analysis/Piminus_longRes_z_p2.eps}}

210:

\resizebox{.45\textwidth}{!}{\includegraphics{Plots/analysis/Piminus_longResMean_z_p2.eps}}

220:

\resizebox{.45\textwidth}{!}{\includegraphics{Plots/analysis/Piminus_transRes_crosAng_p2.eps}}

221:

\resizebox{.45\textwidth}{!}{\includegraphics{Plots/analysis/Piminus_transRes_z_p2.eps}}

232:

Since the same analysis cuts are applied on the embedding and on real data, to extract the efficiencies one has to compare ...(136 bytes skipped)...

239:

\includegraphics{Plots/analysis/pp_pim_dca_in_pT_200_300_range.eps}}

241:

\includegraphics{Plots/analysis/pp_pim_dca_in_pT_600_700_range.eps}}

252:

\includegraphics{Plots/analysis/pp_pim_nfit_in_pT_200_300_range.eps}}

254:

\includegraphics{Plots/analysis/pp_pim_nfit_in_pT_600_700_range.eps}}

265:

\includegraphics{Plots/analysis/pp_km_dca_in_pT_300_400_range.eps}}

267:

\includegraphics{Plots/analysis/pp_km_dca_in_pT_600_700_range.eps}}

278:

\includegraphics{Plots/analysis/pp_km_nfit_in_pT_300_400_range.eps}}

280:

\includegraphics{Plots/analysis/pp_km_nfit_in_pT_600_700_range.eps}}

292:

\includegraphics{Plots/analysis/pp_pbar_dca_in_pT_400_500_range.eps}}

294:

\includegraphics{Plots/analysis/pp_pbar_dca_in_pT_800_900_range.eps}}

305:

\includegraphics{Plots/analysis/pp_pbar_nfit_in_pT_300_400_range.eps}}

307:

\includegraphics{Plots/analysis/pp_pbar_nfit_in_pT_700_800_range.eps}}

323:

\includegraphics{Plots/analysis/auau62_pim_dca_in_pT_300_400_cent_0_range.eps}}

325:

\includegraphics{Plots/analysis/auau62_pim_dca_in_pT_300_400_cent_8_range.eps}}

336:

\includegraphics{Plots/analysis/auau62_pim_dca_in_pT_500_600_cent_0_range.eps}}

338:

\includegraphics{Plots/analysis/auau62_pim_dca_in_pT_500_600_cent_8_range.eps}}

349:

\includegraphics{Plots/analysis/auau62_pim_nfit_in_pT_300_400_cent_0_range.eps}}

351:

\includegraphics{Plots/analysis/auau62_pim_nfit_in_pT_300_400_cent_8_range.eps}}

362:

\includegraphics{Plots/analysis/auau62_pim_nfit_in_pT_500_600_cent_0_range.eps}}

364:

\includegraphics{Plots/analysis/auau62_pim_nfit_in_pT_500_600_cent_8_range.eps}}

412:

\includegraphics[width=0.9\textwidth]{Plots/analysis/eloss_pp.eps}

413:

\includegraphics[width=0.9\textwidth]{Plots/analysis/eloss_dau.eps}

414:

\includegraphics[width=0.9\textwidth]{Plots/analysis/eloss_auau62cent.eps}

415:

\includegraphics[width=0.9\textwidth]{Plots/analysis/eloss_auau62per.eps}

444:

...(36 bytes skipped)...d off-line to the raw data upon selecting tracks from the dE/dx distribution to be used for spectra analysis.

461:

\includegraphics[width=0.45\textwidth]{Plots/analysis/vtx_efficiencies_pp.eps}

462:

\includegraphics[width=0.45\textwidth]{Plots/analysis/vtx_efficiencies_dau.eps}

475:

In data analysis...(357 bytes skipped)...ts with $z$ vertex position are selected from $\pm$ 30.0 cm in pp and $\pm$ 50.0 cm in dAu for data analysis. The overall vertex (in)efficiency can be determined as the ratio of the number of reconstructed go...(116 bytes skipped)...

484:

\includegraphics[width=0.45\textwidth]{Plots/analysis/multimap_pp.eps}

485:

\includegraphics[width=0.45\textwidth]{Plots/analysis/multimap_dau.eps}

506:

\includegraphics[width=0.85\textwidth]{Plots/analysis/pp_dau_vtx_eff.eps}

514:

\includegraphics[width=0.85\textwidth]{Plots/analysis/fake_spectra_pp.eps}

533:

\includegraphics[width=0.85\textwidth]{Plots/analysis/pp_dAu_fake_mb.eps}

559:

\includegraphics[width=0.45\textwidth]{Plots/analysis/pp_tracking_eff_neg.eps}

560:

\includegraphics[width=0.45\textwidth]{Plots/analysis/pp_tracking_eff_pos.eps}

566:

\includegraphics[width=0.45\textwidth]{Plots/analysis/dau_tracking_eff_neg.eps}

567:

\includegraphics[width=0.45\textwidth]{Plots/analysis/dau_tracking_eff_pos.eps}

573:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff05_neg.eps}

574:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff05_pos.eps}

576:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff510_neg.eps}

577:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff510_pos.eps}

579:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff1020_neg.eps}

580:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff1020_pos.eps}

582:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff2030_neg.eps}

583:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff2030_pos.eps}

585:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff3040_neg.eps}

586:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff3040_pos.eps}

620:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff4050_neg.eps}

621:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff4050_pos.eps}

622:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff5060_neg.eps}

623:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff5060_pos.eps}

624:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff6070_neg.eps}

625:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff6070_pos.eps}

626:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff7080_neg.eps}

627:

\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff7080_pos.eps}

712:

\includegraphics[width=0.45\textwidth]{Plots/analysis/PiBG_pp_mb.eps}

713:

\includegraphics[width=0.45\textwidth]{Plots/analysis/PipBG_pp_mb.eps}

720:

\includegraphics[width=0.45\textwidth]{Plots/analysis/PiBG_dAu_mb.eps}

721:

\includegraphics[width=0.45\textwidth]{Plots/analysis/PipBG_dAu_mb.eps}

730:

\includegraphics[width=0.45\textwidth]{Plots/analysis/PiBG_AuAu62.eps}

731:

\includegraphics[width=0.45\textwidth]{Plots/analysis/PipBG_AuAu62.eps}

799:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_0_5_pT_400_450.eps}

800:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_0_5_pT_600_650.eps}

801:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_0_5_pT_900_950.eps}

802:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_70_80_pT_400_450.eps}

803:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_70_80_pT_600_650.eps}

804:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_70_80_pT_900_950.eps}

815:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_1_100_pT_40_45.eps}

816:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_1_100_pT_60_65.eps}

817:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_1_100_pT_90_95.eps}

831:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_1_2_pT_40_45.eps}

832:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_1_2_pT_60_65.eps}

833:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_1_2_pT_90_95.eps}

852:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_9_100_pT_40_45.eps}

853:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_9_100_pT_60_65.eps}

854:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_9_100_pT_90_95.eps}

865:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_0_200_pT_40_45.eps}

866:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_0_200_pT_60_65.eps}

867:

\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_0_200_pT_90_95.eps}

877:

\includegraphics[width=0.45\textwidth]{Plots/analysis/pp_proton_bg_fractions.eps}

878:

\includegraphics[width=0.45\textwidth]{Plots/analysis/dAuAuAu_proton_bg_fractions.eps}

0511:hep-ex0511048/4/analysis.tex : [ ]

1:

\chapter{Data Analysis}\label{sec:ch4}

3:

This chapter describes the analysis procedure used to extract and

6:

event selection used in the analysis. Electron identification

16:

"Converter subtraction" analysis was performed which is described in

31:

The other complication for the electron analysis is that we need

47:

then that of the West arm and for this analysis we decided to use

74:

Charm electron measurements. That is why analysis is using only

82:

arrows is the acceptance region used in the analysis. The various

113:

The same analysis can be performed for the Pad Chamber (PC1) dead

142:

final dead/noise map used in the analysis included all the towers

147:

towers in EMC that were removed from the analysis.\\

216:

use tight vertex cuts for this analysis and only look at the

224:

used in the analysis.}

292:

analysis and required a precise tuning of the eID parameters.

355:

cut for the analysis.

375:

analysis.

476:

loose ($\pm 3\sigma$) $E/p$ cut for the analysis

580:

analysis.

585:

The ERT trigger for Run02 was calculated for the $J/\psi$ analysis in

587:

analysis uses only the EMC bit of the ERT trigger. However, the RICH

617:

analysis because we remove additional "bad" EMC towers (see

618:

Fig.~\ref{fig:ch4.dead_emc}) as compared to the $J\Psi$ analysis, but

657:

The major source of background for this analysis is a random

839:

neglected in PHENIX electron analysis.

867:

analysis we "throw" single electrons, generated by the

907:

for real data analysis.

1151:

approach as for $\pi^0$. This analysis was performed

1163:

solve this problem ~\cite{ana148}, the charged hadron analysis group

1314:

band (dashed) is used in the analysis.}

1389:

The width of the bins in the current analysis are significant. Thus,

1636:

of systematic error in the current analysis. The treatment of

1639:

done for the $Au+Au$ single electron analysis~\cite{ppg035,ana305} by

1723:

an input for the analysis. Fig.~\ref{fig:ch4.direct_NLO} shows

1881:

The common alternative to a cocktail-subtraction analysis is the

1882:

convertor-subtraction analysis. A converter subtraction analysis

1901:

Cocktail prediction. The steps required for convertor analysis

1930:

analysis and unfortunately for Run02 the total Converter run

1933:

we can use this analysis for a consistency crosscheck of the Cocktail

1988:

runs was obtained the same way as for Non-converter run analysis

2025:

first principles. From previous $Au+Au$ analysis

2128:

Cocktail subtraction analysis.

2141:

subtraction analysis (circles) comparison to Cocktail subtracted

2154:

results of two independent analysis are in good agreement with

2170:

\section{Systematic error analysis}\label{sec:ch4.Systematics}

2172:

Systematic error analysis have always been the most critical issue

2176:

ingredient for current analysis as it uses the results of two

2208:

analysis was done using the modified cuts and the ratio of the new

2245:

Full analysis was repeated for each of the new cuts. The ratio of

2435:

$\epsilon_{reco}(p_T)$ used in the analysis.}

2446:

$\epsilon_{reco}(p_T)$ used in the analysis.}

2504:

analysis~\cite{ana276} we obtain an estimate for the tracking

2506:

an effect of tighter Z cut for the charged analysis ($|Z| < 50cm$)

2547:

analysis~\cite{ana139} we have an estimate for $n0>1$ cut

2723:

respect to the magnetic field. In our case this analysis seems

2725:

in $\pp$ collisions. The conclusion from $\Au$ analysis is that

0411:hep-ph0411095/analysis.tex : [ ]

1:

\section{Analysis}\label{sec:analysis}

216:

which is a conventional condition, as used in the analysis of Higgs events

0805:0805.0186/analysis1.tex : [ ]

1:

\section{Analysis}

2:

\label{sec:analysis1}

5:

The goal of this analysis...(173 bytes skipped)...ross section of CCQE. The CC1$\pi^+$ cross section is normalized to the CCQE cross section in this analysis to reduce the impact of neutrino flux uncertainties. The dominant contribution to CC1$\pi^{+}$ is ...(168 bytes skipped)...

15:

\input{analysis1_selection}

16:

\input{analysis1_corrections}

0509:hep-ex0509003/analysis.tex : [ ]

2:

\section{Analysis Procedure}

0503:nucl-ex0503018/analysis.tex : [ ]

1:

%\chapter{Analysis Methods for pions, kaons, proton and anti-proton}

2:

\chapter{Analysis Methods}

3:

\label{chp:analysis}

25:

analysis from TOFr triggered d+Au and non-singly diffractive (NSD)

159:

The TPC and TOFr are two independent systems. In the analysis,

0309:nucl-ex0309003/analysis.tex : [ ]

1:

\chapter{Analysis Methods}

15:

gas~\cite{Adler:2001nb}. We've adapted the $v_2$ analysis method

24:

measurements---including an analysis of systematic errors---are

25:

given. Finally, the analysis methods for measuring $v_{2}$ of

28:

$v_2$ analysis.

0602:q-bio0602002/Analysis03.tex : [ ]

1:

%%%%%%%%%%%%%%%%%%%%%%% file Analysis03.tex %%%%%%%%%%%%%%%%%%%%%%%%%

49:

in the topological analysis of metabolic networks,

97:

However, while there has been a formidable progress in the structural (or topological) analysis

140:

Moreover, the analysis is quantitative, i.e. it allows to deduce

194:

We begin with an analysis of the matrix $\bm{\Lambda}$.

291:

The starting point of our analysis is then a particular

297:

Furthermore, an analysis of the stoichiometric matrix $\mathbf{N}$

448:

We have to highlight one fundamental aspect of our analysis:

469:

\subsection*{Statistical Analysis of the Parameter Space}

588:

However, even when restricting an analysis to the core pathway shown in Fig.~\ref{fig:CalvinCycle},

660:

To proceed with a systematic analysis, the next step is to drop the assumption of

749:

We emphasize that our approach is not restricted to an analysis of the

754:

the hierarchy of characteristic timescales~(Modal Analysis)~\cite{HS96},

756:

defined in the realm of Metabolic Control Analysis~\cite{HS96}.

805:

realm of Metabolic Control Analysis~\cite{HS96}.

806:

However, for our reasoning to hold, the analysis is restricted to unidirectional reactions, i.e.

929:

% constraint-based analysis of a genome-scale reconstructed metabolic network.

935:

% organization and analysis of complex metabolic systems.

950:

%\newblock {\em Population Dynamics: General Results from Local Analysis}.

955:

%\newblock Generalized models as an universal approach to the analysis of

0404:quant-ph0404104/analysis.bbl : [ ]

101:

(\bibinfo{year}{1999}), \bibinfo{note}{unpublished analysis of the accuracy

0810:0810.4119/ANanalysis.tex : [ ]

18:

\title{Master-equation analysis of accelerating networks}

78:

...(21 bytes skipped)...ch tracks the evolution of the degree of an individual node throughout the network's evolution. The analysis consists of two distinct stages. The first stage is to derive the expected degree of an individual ...(1588 bytes skipped)...

109:

...(425 bytes skipped)...veloped to investigate the emergence of correlations within evolving networks~\cite{LinkSpaceNetworkAnalysis}. Justifications for using such an approach are discussed in Refs.~\cite{history} and ~\cite{Boll}....(1 bytes skipped)...

162:

...(229 bytes skipped)...olution which is investigated from the master equations (for example see Ref.~\cite{LinkSpaceNetworkAnalysis}). However, for accelerating networks, the degree distribution evolves and a

178:

...(72 bytes skipped)...an be appreciated by comparison with a conventional, non-accelerating scenario. The master-equation analysis, when applied to a non-accelerating random attachment network with $m(t) \equiv m$ ($m$ integer), ...(74 bytes skipped)...

188:

analysis, a clear description of the microscopic process is necessary. We assume that the desired resulting ...(155 bytes skipped)...

195:

Analysis of this process starts by writing the master equation. For the purposes of analysis, it is assumed that the total number of links in the network is well approximated by its expected v...(107 bytes skipped)...

241:

To highlight the effects of network acceleration, the master-equation analysis, when applied to a non-accelerating preferential attachment network with $m(t) \equiv m$ ($m$ integ...(101 bytes skipped)...

416:

\bibitem{LinkSpaceNetworkAnalysis} D.M.D. Smith, C.F. Lee, J.P. Onnela and N.F. Johnson, Phys. Rev. E. {\bf 77} 036112 (2008).

0509:q-bio0509042/CompAnalysis.bbl : [ ]

122:

\newblock Dynamic analysis of the cybernetic model for diauxic growth.

0505:quant-ph0505158/analysis.tex : [ ]

33:

and agree with our analysis.

104:

In this paper, we do a rigorous analysis of the dynamics of an entangled

313:

A careful look reveals that the analysis we presented in the last section

426:

From the preceding analysis, it is clear that if $\hbar^2/\sigma^2$ were

513:

The theoretical analysis carried out by us should apply to Strekalov et al's

542:

otherwise, because our theoretical analysis shows that the results are

592:

\bibitem{collet} ``Analysis of a proposed crucial test of quantum mechanics",

0609:physics0609198/data_analysis.tex : [ ]

41:

because they use sliding interval methods of analysis,

53:

Our analysis is conducted on one-minute intra-day prices of

60:

that is initiated at $t$. The analysis presented below is predicated on

68:

The rest of our analysis is conducted on fluctuations

85:

is validated by conducting a corresponding analysis

94:

shown by colored lines in Fig.~1(a). We focus our analysis on the

208:

(shown in Fig.~3(b)) has fat-tails. However, a careful analysis

212:

noted for L\'evy processes~\cite{fogAboh} and for the R/S analysis of Tsallis

292:

The analysis given here applies to stochastic dynamics of a single

296:

We have not yet determined how to extend our analysis

306:

We have also shown that sliding interval analysis of variable diffusion processes can give an

394:

and Inter-day Analysis,

423:

Our statistical analysis assumes that $x (\tau; t)$ follows the same stochastic

433:

Our analysis focuses on the interval {\bf I} shown by the horizontal solid line.

0409:cs0409029/primanalysis.tex : [ ]

1:

\section{Analysis of the algorithm for composite numbers}\label{sec:compos}

2:

In this section we propose an analysis of the behavior of the

6:

This analysis is also used section

0504:hep-ex0504049/analysis.tex : [ ]

2:

%\section{Data Sample and Analysis}

29:

%analysis chain description

64:

to the pulses used for physics analysis.

91:

For the 2003 data, the regression analysis limits the possible

0704:0704.1842/analysis.tex : [ ]

11:

%As most of the analytical studies in the literature, our analysis

52:

flows constitute the second TC. In the analysis, we will treat the

58:

generality, since the analysis can be extended for larger number

62:

Our analysis considers the fact that the difference in AIFS

96:

interval following a transmission period. The Markov analysis uses

267:

%The numerical analysis is carried out for fixed values of

279:

%analysis of the inaccuracy that the rounding operation brings can

0509:q-bio0509042/CompAnalysis.tex : [ ]

32:

\title{Comparative analysis of some models of mixed-substrate microbial

814:

\bibliography{compAnalysis}

0404:quant-ph0404104/analysis.tex : [ ]

2:

% Analysis of postselected state preparation methods.

23:

rm -R /tmp/analysis; mkdir /tmp/analysis

24:

cp `texfls analysis.log | perl -e '$a=<>; $a =~ s:/\S*(revtex4|natbib)\S*(\s|$)::g; print "$a\n"'` /tmp/analysis

25:

find /tmp/analysis -type f -name '*.pdf' -exec pdftops -eps {} \; -exec rm {} \;

26:

find /tmp/analysis -type f -name '*.jpg' -exec perl -e '$f=shift; $g=f$; $g=~s/.jpg/.eps/; exec("convert $f $g");' {} ...(17 bytes skipped)...

27:

%perl -i -n -e 's/^(.*)/%$1/; print;' /tmp/analysis/analysis.tex

28:

perl -i -n -e 's/^%(.*)% _dvitex_/$1/; print;' /tmp/analysis/analysis.tex

30:

cp /usr/share/texmf/tex/latex/tools/calc.sty /tmp/analysis/phcalc.sty

31:

perl -i -n -e 's/ProvidesPackage\{calc\}/ProvidesPackage\{phcalc\}/; print;' /tmp/analysis/phcalc.sty

32:

perl -i -n -e 's/usepackage\{calc\}/usepackage\{phcalc\}/; print;' /tmp/analysis/ekqc_b.sty

34:

(cd /tmp/analysis; tar czvf analysis.tar.gz *)

41:

rm -R /tmp/analysis; mkdir /tmp/analysis

42:

cp `texfls analysis.log | perl -e '$a=<>; $a =~ s:/\S*(revtex4|natbib)\S*(\s|$)::g; print "$a\n"'` /tmp/analysis

43:

find /tmp/analysis -type f -name '*.pdf' -exec pdftops -eps {} \; -exec rm {} \;

44:

find /tmp/analysis -type f -name '*.jpg' -exec perl -e '$f=shift; $g=f$; $g=~s/.jpg/.eps/; exec("convert $f $g");' {} ...(17 bytes skipped)...

45:

%perl -i -n -e 's/^(.*)/%$1/; print;' /tmp/analysis/analysis.tex

46:

perl -i -n -e 's/^%(.*)% _dvitex_/$1/; print;' /tmp/analysis/analysis.tex

47:

%perl -i -n -e 's/^(.*)/%$1/; print;' /tmp/analysis/analysis.tex

48:

perl -i -n -e 's/graphics\///; print;' /tmp/state/analysis.tex

50:

cp /usr/share/texmf/tex/latex/tools/calc.sty /tmp/analysis/phcalc.sty

51:

perl -i -n -e 's/ProvidesPackage\{calc\}/ProvidesPackage\{phcalc\}/; print;' /tmp/analysis/phcalc.sty

52:

perl -i -n -e 's/usepackage\{calc\}/usepackage\{phcalc\}/; print;' /tmp/analysis/ekqc_b.sty

54:

cp /usr/share/texmf/tex/latex/base/ifthen.sty /tmp/analysis/phifthen.sty

55:

perl -i -n -e 's/ProvidesPackage\{ifthen\}/ProvidesPackage\{phifthen\}/; print;' /tmp/analysis/phifthen.sty

56:

perl -i -n -e 's/usepackage\{ifthen\}/usepackage\{phifthen\}/; print;' /tmp/analysis/ekqc_b.sty

58:

cp retestate_fns.math /tmp/analysis

60:

(cd /tmp/analysis; tar czvf analysis.tar.gz *)

66:

\title{Fault-Tolerant Postselected Quantum Computation: Threshold Analysis}

79:

are analyzed to determine their error-tolerance. The analysis is based

114:

fault-tolerant computation. In particular, the analysis indicates

120:

The analysis given below assumes familiarity with the previous two

212:

The heuristic used for the analysis involves a method that uses an

242:

\emph{quasi-independent}~\cite{knill:qc1997a}. The heuristic analysis

255:

associated. The analysis is implemented so that any such

278:

Since the analysis assumes probabilistic errors, it does not directly

322:

\section{Analysis Outline}

323:

\label{sect:analysis outline}

360:

good independence properties. For the purpose of analysis, this is

389:

prepared state}. To complete the analysis, it is necessary to

404:

the analysis considers the computation sequentially from state

572:

purpose of the computer-assisted analysis used here, the scheme is

633:

The first step of the analysis requires determining the syndrome

780:

encoded Bell pair. As a result, the analysis can be done in the same

816:

error-detecting codes of the scheme, the cnot analysis is

845:

blocks, which makes sense. However, for analysis, it is simpler to

934:

error-detecting schemes under analysis. A physical-error model is

951:

To illustrate the computer-assisted heuristic analysis, the logical

1382:

scheme as used in the analysis above are chosen for the purpose of

1383:

simplifying the analysis. For example, the two purification steps in

1416:

\bibliography{journalDefs,qc,analysis}

1421:

\section{Implementation of the computer assisted heuristic analysis}

1433:

\section{Instructions for generating the data needed for analysis}

1468:

(* <<analysis1_f:b1.mx *)

1470:

(* <<analysis2_f:b1.mx *)

1472:

(* <<analysis3_f:b1.mx *)

1474:

(* <<analysis4_f:b1.mx *)

1476:

(* Full data set in analysis5_f:b1.mx *)

1480:

(* <<analysis1_f:b2.mx *)

1482:

(* <<analysis2_f:b2.mx *)

1484:

(* <<analysis3_f:b2.mx *)

1486:

(* <<analysis4_f:b2.mx *)

1488:

(* Full data set in analysis5_f:b2.mx *)

1492:

(* <<analysis1_f:b3.mx *)

1494:

(* <<analysis2_f:b3.mx *)

1496:

(* <<analysis3_f:b3.mx *)

1498:

(* <<analysis4_f:b3.mx *)

1499:

runlevel[lregion, sched, probuBnd, "b3", 5, 5, 7];(* Full data set in analysis5_f:b3.mx *)

1503:

(* <<analysis1_f:b4.mx *)

1505:

(* <<analysis2_f:b4.mx *)

1507:

(* <<analysis3_f:b4.mx *)

1509:

(* <<analysis4_f:b4.mx *)

1511:

(* Full data set in analysis5_f:b4.mx *)

1518:

(* <<analysis1_f:b5.mx *)

1520:

(* <<analysis2_f:b5.mx *)

1522:

(* <<analysis3_f:b5.mx *)

1524:

(* <<analysis4_f:b5.mx *)

1526:

(* Full data set in analysis5_f:b5.mx *)

1541:

(* Full data set in analysis5_f:sp1.mx *)

1548:

(* Full data set in analysis5_f:sp2.mx *)

1601:

Get[StringJoin["analysis", ToString[maxlvl], "_f:b1.mx"]];

1602:

Get[StringJoin["analysis", ToString[maxlvl], "_f:b2.mx"]];

1603:

Get[StringJoin["analysis", ToString[maxlvl], "_f:b3.mx"]];

1604:

Get[StringJoin["analysis", ToString[maxlvl], "_f:b4.mx"]];

1605:

Get[StringJoin["analysis", ToString[maxlvl], "_f:b5.mx"]];

1742:

(* analysis5_f:sp1.mx data.

2000:

(* analysis5_f:sp2.mx data.

0501:gr-qc0501068/Analysis.tex : [ ]

1:

\section{Analysis}\label{sec:Analysis}

3:

The goal of the analysis is either to identify significant events

11:

The analysis takes advantage of the information provided by the

13:

the analysis. As discussed below, the time window to be analyzed

28:

The schematic of the full analysis pipeline is shown in

29:

Figure~\ref{fig:PIPE}. The underlying analysis algorithm is

34:

\caption{The schematic of the analysis pipeline } \label{fig:PIPE}

0604:hep-ex0604020/nn_analysis.tex : [ ]

1:

\subsection{Neural Network Analysis}

2:

\label{nn-analysis}

0706:0706.1583/analysis.tex : [ ]

1:

\section{Analysis}

19:

\citep{Layden96} derived from statistical parallax analysis for a

382:

locus \citep{Sandage1981,Cacciari2005}. For the subsequent analysis,

0809:0809.2809/analysis.tex : [ ]

1:

%% $Id: analysis.tex,v 1.64 2009/06/03 22:37:53 acsearle Exp $

6:

\section{Analysis}

7:

\label{SECII}\label{sec:analysis}

16:

analysis: detecting a signal from a known sky position in a single

18:

example will show many of the basic features of the Bayesian analysis,

220:

We now generalize the analysis of the previous section to the case of

868:

%way for a Bayesian analysis to produce the same parameter estimates as

872:

%we find it incredible, we should expect a Bayesian analysis with a uniform prior

932:

%a better performance from an analysis accounting for our prior

965:

%signals, and this has real consequences in the analysis.

1169:

better reflecting our state of knowledge. The Bayesian analysis allows us to begin with our physical understanding

1201:

%Once may also consider what the Bayesian analysis says about how

1205:

%analysis is the same for all sky positions. The Bayesian analysis shows

1208:

%In a non-Bayesian all-sky analysis we are perfectly

1210:

%The Bayesian analysis shows

0710:0710.4297/analysis.tex : [ ]

1:

\part{Applications and their analysis}

2:

\label{part:analysis}

39:

Another remark is the following. During our analysis we use the norms

166:

while the other components are problematic. For the analysis of this

1255:

discussing suitable error analysis and error monitoring for this

1271:

\subsection{Error analysis and monitoring}

0210:hep-ex0210041/analysis.tex : [ ]

1:

\section*{Analysis Procedures

2:

\label{section:analysis}}

0801:0801.0288/analysis.tex : [ ]

40:

\section{DATA ANALYSIS}

42:

\label{sec:analysis}

51:

in the \emph{XMM-Newton} Science Analysis Software (SAS), version 6.5.0.

205:

% on the `Background Analysis' pages at the XMM Science Centre web site.\cite{XMMbackground}

268:

\subsection{Background determination and flux upper limit analysis}

610:

Thus, the overcorrection of vignetting affects our analysis,

638:

Table~\ref{tab:resultsCalculated} shows the relevant numbers in this analysis.

0312:q-bio0312017/caps-analysis.tex : [ ]

128:

design and analysis of experiments}

175:

with a probabilistic analysis,

178:

Our analysis indicates that CAPS-MAP is well-suited for

243:

This paper provides the theory for the design and analysis of pooling-based

321:

with a probabilistic analysis.

387:

other designs. Even though our analysis was performed for

1114:

This localized perspective was partly adopted to ease the theoretical analysis.

1342:

experiments. In particular, our analysis indicates that transversal

1351:

and a larger number of pools. Our analysis allows for the

1400:

\newblock Genomic mapping by anchoring random clones: A mathematical analysis.

1425:

\newblock Pooled genomic indexing ({PGI}): mathematical analysis and experiment

1461:

\newblock Initial sequencing and analysis of the human genome.

1468:

analysis.

1477:

\newblock High throughput fingerprint analysis of large-insert clones.

0107:hep-ex0107057/Analysis.tex : [ ]

38:

this analysis were selected

74:

We include for this analysis the decay combinations \Dstarp\Dstarm decaying

146:

%<<<<<<< Analysis.tex

0806:0806.1093/analysis.tex : [ ]

1:

\section{EDCA Parameter Analysis}\label{sec:analysis}

94:

We carried out a simulation-based analysis to further analyze the

160:

insights from the presented simulation-based analysis.

238:

This analysis motivates the joint use of CW and TXOP

241:

decreasing contention overhead. On the other hand, as our analysis

269:

%access delay and per saturation analysis, showing the effects of

0806:0806.1089/analysis.tex : [ ]

1:

\section{TCP Fairness Analysis} \label{sec:analysis}

7:

%In the first part of the analysis, we assume that there are no

41:

analysis previously proposed for 802.11 MAC performance modeling

43:

time analysis assesses the asymptotic performance of the DCF

48:

necessary extensions to employ the cycle time analysis in the

49:

proposed analysis. Due to space limititations, the reader is

108:

%analysis, we assume each connection has equal $LD$. We will also

142:

For the first part of the analysis, each TCP data packet is

200:

in Section \ref{subsec:analysis_evaluation}, the approximation in

256:

in Section \ref{subsec:analysis_evaluation}, this assumption still

0311:hep-ex0311019/analysis.tex : [ ]

3:

\label{sec:analysis}

16:

Different analysis techniques were chosen for the various searches:

67:

In the stau analysis (see section \ref{sec:stauana}) charged particle

162:

%%% analysis.

266:

In the $\tilde{\tau}$ analysis (see section \ref{sec:stauana}),

287:

In the stau analysis

324:

In the stau analysis, where neutrinos from tau decays made the

333:

\subsubsection{Analysis techniques}

371:

response of the neural network. The program used in the squark analysis was

388:

\input{analysis_slepton}

389:

\input{analysis_squark}

390:

\input{analysis_chargino}

391:

\input{analysis_neutralino}

20:

are briefly discussed in section \ref{subsubsec:analysistech}.

334:

\label{subsubsec:analysistech}

0607:hep-ex0607066/analysis.tex : [ ]

4:

The analysis proceeds in three steps: first, one of the two $B$ mesons is

182:

The number of events after all analysis cuts are obtained with the fit to the

0804:0804.4222/analysis.tex : [ ]

1:

\section{Analysis of test applications}

278:

control approach for the \oplo-code. Because the analysis depends

350:

in \Sectionref{sec:analysis1+1}. Afterwards

358:

\subsubsection{Analysis of computations with the

360:

\label{sec:analysis1+1}

0307:hep-ex0307046/analysis.tex : [ ]

1:

\section{Analysis Method}

2:

\label{sec:Analysis}

4:

...(62 bytes skipped)...onic \B\ decays exploits the very large sample of \B\ mesons recorded by the \babar\ detector. The analysis relies on \BB\ events in which one \B\ meson decays hadronically and is fully reconstructed ($B_{re...(146 bytes skipped)...

35:

5.27$\gev. For this analysis we only use decay modes for which the purity

101:

In the analysis, the \breco\ background subtraction is carried out for several regions in $M_X$ to account for chan...(61 bytes skipped)...

0303:hep-ex0303022/Analysis.tex : [ ]

2:

\section{Analysis Method}

3:

\label{sec:Analysis}

9:

This analysis divides the Dalitz plot into regions, each of which is expected

116:

The dominant background in this analysis is from light quark and charm

0806:0806.1313/analysis.tex : [ ]

44:

analysis of the properties of the jets, cores, lobes and hotspots of

168:

survival-analysis package {\sc asurv} (LaValley, Isobe \& Feigelson

307:

illustrated in Fig. \ref{fig:l_LLS}. In the following analysis

445:

consequences for beaming model analysis. Thus, following H98, we also

1883:

In our analysis we consider the ratio of $f_{\rm h}$ in each lobe rather than the

0604:hep-ex0604020/cuts_analysis.tex : [ ]

1:

\subsection{Cut-Based Analysis}

2:

\label{cut_based_analysis}

4:

This analysis takes the discriminating variables, chooses the best subsets, and

12:

operating point of the analysis.

19:

The most critical part of this analysis is to find the combination of variables

38:

each analysis channel.}

74:

\caption[yields-rgs]{Event yields after the cut-based analysis selection.}

0412:hep-ex0412057/analysis_prl.tex : [ ]

108:

results of this analysis is statistically limited.

0810:0810.1571/analysis.tex : [ ]

2:

\label{sec:analysis}

68:

The following analysis assumes that all node caches are full (that is, the network is already running for a while). Moreov...(137 bytes skipped)...

0702:physics0702092/data_analysis.tex : [ ]

2:

\section{Data analysis\label{sec:data_analysis}}

0801:0801.0973/analysis.tex : [ ]

1:

\section{ANALYSIS \label{sec:analysis}}

17:

analysis. The plot shows the ground state in the lattice $T_{1_u}^-$

37:

We performed the same analysis for the $\bar{c}c$ and $D_s$ systems. Our

0605:hep-ph0605019/reanalysis4.tex : [ ]

158:

the lowest ground states and found that the $\chi^2$ analysis led to a

175:

These are the main difference from \cite{Matsuki97} in the way of data analysis

197:

and $B_{s2}^*(5839)$. We find that in this new analysis all of the masses of

618:

different way of analysis.

624:

masses $m_{u,d}$\footnote{In the numerical analysis, we set $m_{u}=m_{d}$ in

628:

similarly six $D_s$ meson masses, using the Minuit $\chi^2$ analysis.

1131:

values are not input but the outcome of this analysis, though in the previous

1132:

analysis \cite{Matsuki97}, $m_{u,d}=10$ MeV is taken as an input.

0805:0805.3954/analysis.tex : [ ]

1:

\chapter{Data Analysis}

4:

The analysis going into this thesis was conducted in two rounds: first with 1 fb$^{-1}$ of data, and then with 2...(318 bytes skipped)...

8:

Sec.~\ref{sec:intro-motivation} motivates the goal of this analysis, viz.\ the model-independent search for new physics. The method is to obtain a satisfactory descri...(213 bytes skipped)...

10:

...(66 bytes skipped)...ve to particular models, but examine data in as many channels as possible. That introduces to this analysis over two million events (in 1 fb$^{-1}$), ranging from abundant QCD to rare electroweak ones. Stud...(419 bytes skipped)...

12:

...(409 bytes skipped)... from the control to the signal region is valid. However, what is considered control region in one analysis is often signal region in some other, so, to be as generic as possible, one needs to treat all data...(338 bytes skipped)...

21:

Structurally, the analysis contains four parts:

26:

\item{The Bump Hunter search (present only for the second round of the analysis), which scans all mass variables for local excesses of data, potentially indicating a new resonance...(2 bytes skipped)...

30:

...(279 bytes skipped)...ed on a case-by-case basis. In the event of a significant discrepancy, the breadth of view of this analysis can be exploited to evaluate the plausibility of it being a detector effect or a problem in the Sta...(27 bytes skipped)...

32:

...(173 bytes skipped)...tation are emphasized as the crucial activities for the investigator throughout the process of data analysis...(130 bytes skipped)...of discrepancies highlighted by the algorithms is {\em{the}} defining characteristic of this global analysis...(152 bytes skipped)...epancies, since this process is carried out by individuals. The statistical interpretation of this analysis is made bearing this process in mind.}.

92:

Offline event selection for this analysis uses a variety of further filters.

162:

...(291 bytes skipped)...osity of 1~pb$^{-1}$. When multiplied by the integrated luminosity of the data sample used in this analysis, the weight gives the predicted number of such events in this analysis.

252:

...(338 bytes skipped)...or the signal disappears, since it can be explained in terms of known physics. This is true in any analysis. The stronger the constraints on the correction model, the more difficult it is to artificially su...(191 bytes skipped)...

285:

...(397 bytes skipped)...d fractional uncertainties. The determined uncertainties are not used explicitly in the subsequent analysis, but rather provide information used implicitly to assist in appropriate adjustment to the correcti...(427 bytes skipped)...

291:

...(243 bytes skipped)...two for some processes with multiple jets. All values obtained are physically reasonable. Further analysis is provided in Appendix~\ref{sec:VistaCorrectionModel:CorrectionFactorValues}.

528:

\includegraphics[width=7cm,angle=0]{figures/analysis/VistaPartitioningGraphic}

529:

...(262 bytes skipped)...ly as new types of events appear. In this way, every event, no matter how exotic, stays within the analysis, in the appropriate final state.}

533:

...(445 bytes skipped)...egions to which these measures are applied are specified {\em{a priori}}, as is done here. In this analysis a discrepancy at the level of $3\sigma$ or greater after accounting for the trials factor (typicall...(143 bytes skipped)...

579:

In summary, this global analysis of the bulk features of the high-$p_T$ data has not yielded a discrepancy motivating a new physics ...(340 bytes skipped)...

581:

This global analysis...(276 bytes skipped)...ent probes are required. \Sleuth, and the Bump Hunter, which was added in the second round of this analysis, serve this purpose.

670:

\includegraphics[height=3.0in,angle=-90]{figures/analysis/tildeScriptPsPlotsPseudo_1} & \hspace{0in}

671:

\includegraphics[height=3.0in,angle=-90]{figures/analysis/tildeScriptPsPlotsPseudo_2}

677:

An alternative statistic to \tildeScriptP\ was first implemented in this analysis. The new measure of significance, \tildePval, is the probability that, in a pseudo-experiment, at ...(365 bytes skipped)...

683:

...(1231 bytes skipped)...as invented first and has been part of \Sleuth\ since its conception, its use was continued in this analysis.

758:

...(358 bytes skipped)...resents \Sleuth's sensitivity, and the open (white) box represents the sensitivity of the dedicated analysis...(101 bytes skipped)...ws typical variation under fluctuation of data statistics. In Models 3 and 4, there is no targeted analysis available for comparison. %\Sleuth\ is seen to perform comparably to the targeted analyses on mode...(57 bytes skipped)...

810:

For each dedicated analysis...(204 bytes skipped)... a discrepancy corresponding to $5\sigma$. Using the signal efficiency determined in the dedicated analysis, $\sigma_\text{min}$ is calculated. The effect of systematic uncertainties is not included in \Sle...(55 bytes skipped)...

811:

...(6 bytes skipped)...nclusion of systematic uncertainties will reduce the sensitivity of both \Sleuth\ and the dedicated analysis to the extent that the systematic parameters are allowed to vary. \Vista\ and \Sleuth\ have the ad...(52 bytes skipped)...

813:

...(618 bytes skipped)...B) scenario, \Sleuth\ gains an advantage by exploiting a final state not considered in the targeted analysis~\cite{Acosta:2004sb}. In Model 2, a search for a $Z'$ decaying to lepton pairs, the targeted analysis...(111 bytes skipped)...nd 4, which are searches for a hadronically decaying $Z'$ of different masses, there is no targeted analysis...(144 bytes skipped)... in a particular final state, resulting in comparable sensitivity between \Sleuth\ and the targeted analysis~\cite{JacoZprimettbar2}.

858:

...(51 bytes skipped)...ree reconstructed jets, one or two of which are $b$-tagged, heads the list. These events enter the analysis by satisfying the \Vista\ offline selection requiring one or more jets or $b$-jets with $p_T>200$~G...(788 bytes skipped)...

860:

...(365 bytes skipped)...Since the hadronic energy is not required to be deposited in time with the beam crossing, \Sleuth's analysis of this final state is sensitive to particles with a lifetime between 1~ns and 1~$\mu$s that lodge ...(89 bytes skipped)...

888:

\includegraphics[width=4in,angle=0]{figures/analysis/tildeScriptPvsLuminosity}

897:

In the first round of this analysis, with 927~pb$^{-1}$, a complete Standard Model background estimate has been obtained and compared ...(697 bytes skipped)...

916:

...(62 bytes skipped)...ay pass several online triggers. It is necessary to decide which online triggers are useful to this analysis.

920:

...(174 bytes skipped)...n the silicon detector, and may couple to new electrically charged particles. Including them to the analysis through trigger {\tt photon\_25\_iso} that keeps events with an isolated photon\index{trigger!photo...(32 bytes skipped)...

922:

...(414 bytes skipped)...re four online triggers selecting events with leptons\index{trigger!lepton} that contribute to this analysis\footnote{{\tt electron\_central\_18}, {\tt muon\_central\_18}, {\tt SUSY\_dilepton} and {\tt ditau}...(3 bytes skipped)...

994:

Specifically, events enter the analysis if they have any of the following:

1080:

\includegraphics[width=7cm,angle=0]{figures/analysis/VistaPartitioningGraphic}

1120:

\input{figures/analysis/sleuthFinalStateContentIndex}

1135:

...(122 bytes skipped)... be necessary. However, developing the correction model and applying it is an integral part of this analysis. The accuracy of the Standard Model implementation depends on the correction model used, namely the...(125 bytes skipped)...

1143:

\input{figures/analysis/fudgeFactorDescription}

1270:

...(85 bytes skipped)...ted weight, as described in Sec.~\ref{sec:eventWeights}. Each MC event, however, needs to enter the analysis with its corrected weight, representing the effect of the correction factors on it. The corrected w...(686 bytes skipped)...

1275:

\includegraphics[width=7cm,angle=0]{figures/analysis/mirrors} &

1276:

\includegraphics[width=7cm,angle=0]{figures/analysis/boxes}

0110:hep-ex0110022/analysis.tex : [ ]

1:

\chapter{Event Analysis}

2:

\label{analysis}

33:

analysis.

94:

In order to speed up analysis, events were first subjected to some

129:

back into the TPC. Since this analysis is only intended to be

275:

Although this analysis attempts to reject high-\dzero\ tracks from known

293:

simple assumption can be made, and only analysis of its hits can yield

634:

speeds up the analysis, it also solves the problem of pre-\dzero\

0810:0810.4145/TEB_lensing2_EBanalysis_matthiasBIS_V_arxiv_replacement.tex : [ ]

240:

%All-Sky-Analysis

252:

%end All-Sky-Analysis

1109:

As a second analysis, we compare the one-point probability density

1165:

non-Gaussian statistics of the lensed maps. We reserve this analysis

0804:0804.1552/analysis.tex : [ ]

27:

\subsection{Classification of Morphological States}\label{analysis-morphology}

54:

simple 3-parameter $\beta$-model commonly employed in analysis of

70:

$30$\kpc\ from this analysis and have verified

176:

\subsection{Three Dominant Morphologies}\label{analysis-dominant}

182:

...(719 bytes skipped)...een the regions of this plane occupied by our simulations and by the observations. In Section \ref{analysis-states} we will examine the evolution of our systems through this plane and in Section \ref{analysis-structure}, examine the processes principally responsible for setting a system's morphology.

195:

\subsection{Temporal Evolution of Morphology}\label{analysis-states}

211:

\subsubsection{core size}\label{analysis-states-core_size}

240:

In Section \ref{analysis-structure} we will discuss the physical processes which shape the

243:

\subsubsection{central temperature gradients}\label{analysis-states-temperature}

310:

We explore the physical processes which shape the diversity of remnant core states in Section \ref{analysis-structure}.

312:

\subsection{The recovery of compact cool cores}\label{analysis-structure}

366:

\subsubsection{entropy and the formation of extended cores}\label{analysis-entropy}

406:

\ref{analysis-states}: the primary core retains its initial CCC

448:

\subsubsection{cooling timescales and cool core recovery}\label{analysis-timescales}

484:

\subsection{Morphological segregation in scaling relations}\label{analysis-segregation}

520:

\subsubsection{the $L_x-T_x$ plane}\label{analysis-LT_segregation}

603:

\subsubsection{the $\beta-r_c$ plane}\label{analysis-beta_rc_segregation}

659:

\section{Metallicity gradients}\label{analysis-mixing}

0607:physics0607176/BayesianAnalysis.tex : [ ]

17:

\title{Bayesian Analysis of the Conditional Correlation Between Stock Index Returns with Multivariate SV Models %

44:

There are a lot of theoretical and empirical reasons to study multivariate volatility models. Analysis of financial market

491:

Volatility Processes in Bayesian Analysis of Financial Time Series),

495:

\bibitem{Pajor:2005a}{Pajor A., (2005a), Bayesian Analysis of Stochastic Volatility

506:

Correlation and Volatility, Financial Analysis Journal vol.52, no.5,

509:

\bibitem{Tsay}{Tsay R.S., (2002), Analysis of Financial Time Series. Financial

0804:0804.2089/cpanalysis.tex : [ ]

69:

is determined as for $\Dstarp \to \Dz\pip$ events (Sec.~\ref{sec:dalitzmodels-analysis}).

79:

...(16 bytes skipped)...es for fake \Dztilde mesons from continuum are extracted as described in Sec.~\ref{sec:dalitzmodels-analysis},

160:

performed to test the consistency of the results and to verify the analysis chain and fitting procedure, as described below.

373:

the \CP fit and no experimental data analysis is available on the $\Bm \to \Dztilde \KS \pim$ decay,

0404:physics0404100/env_analysis.tex : [ ]

1:

In addition to production jobs, user analysis jobs also run on the offline

8:

analysis of the 2001--2002 \PKS\PKL\ data set, which consists of \SN{4.5}{8}

0408:hep-ex0408035/AnalysisMethod.tex : [ ]

1:

\section{ANALYSIS METHOD}

2:

\label{sec:Analysis}

0811:0811.0369/analysis.tex : [ ]

1:

\section{Event Reconstruction and Analysis}

2:

\label{sec:analysis}

415:

analysis. A possible candidate for the excess is charged current resonant

506:

for this analysis. Fig.~\ref{fig:theta2nd.eps} shows the angular

0001:math0001103/analysis.tex : [ ]

1:

\section{Analysis of the Equation}

5:

section. The strategy is the following analysis on the equation. We

300:

Continue with the analysis, after integration and applying Holder inequality, we have

0803:0803.3200/gap_analysis.eps : [ ]

5:

%%Title: (G:\rustem\Paper\Infinite_Layer\gap_analysis.eps)

0712:0712.4247/analysis.tex : [ ]

1:

\chapter{Analysis and Results}

2:

\label{ch:analysis}

4:

...(172 bytes skipped)... terms of mutual information. As a demonstration of the idea behind the modification, we present an analysis of the difficulty of approximating an entangled state of two qubits with two product-state qubits. ...(309 bytes skipped)...

50:

...(73 bytes skipped)...prohibit Eve from fully accessing the transmitted qubits. In the following sections we restrict our analysis to the case $N=2$.

58:

To demonstrate the underlying idea in using an entangling $N$-qubit gate in BB84, we perform an analysis...(1 bytes skipped)...on how closely an entangled two-qubit state can be approximated with two product-state qubits. This analysis shows that even if perfect cloning of quantum states was possible, the protocol poses an inherent l...(18 bytes skipped)...

182:

\section{Analysis of an intercept-resend attack}

422:

...(416 bytes skipped)...th respect to the two transmitted qubits, the case where Eve measures only the first qubit needs no analysis---it is equivalent to measuring only the second one. Furthermore, using any of the six configuratio...(104 bytes skipped)...

436:

...(680 bytes skipped)...gate setting $c_1,c_2,c_3$, and we therefore ignore this measurement configuration in the following analysis.

0702:hep-ex0702024/analysis_tracks.tex : [ ]

5:

%analysis and presents the associated inefficiencies that must be accounted for in

59:

The full set of criteria for selecting beam protons for this analysis is as follows:

120:

for this analysis, $-$210~mrad $\leq \theta_{x} \leq$ 0~mrad and

124:

These cuts are identical to those used in the analysis of the p-Al data except for the

176:

bent out of the spectrometer missing the downstream chambers. The present analysis is performed using

182:

%%(called VERTEX2 tracks in the analysis).

204:

...(3 bytes skipped)...om the data using the large angle TPC in combination with the forward chambers. A result from this analysis will

2:

\section{Track selection and reconstruction efficiency corrections}\label{sec:analysistracks}

0408:hep-ex0408099/AnalysisMethod.tex : [ ]

1:

\section{ANALYSIS METHOD}

2:

\label{sec:Analysis}

14:

of the Dalitz plot from the analysis. This requirement does not affect

0408:hep-ex0408091/AnalysisMethod.tex : [ ]

2:

\section{ANALYSIS METHOD}

3:

\label{sec:Analysis}

8:

The strategy adopted for this analysis is to reconstruct exclusively

0709:0709.2816/analysis.tex : [ ]

1:

\section{\label{analysis} Theoretical analysis}

268:

show results of phenomenological model analysis obtained with assumption

327:

the analysis. Usually the program was able to find unambiguously the

0405:hep-ex0405002/qe_analysis.tex : [ ]

17:

simulating our expected analysis of quasi-elastics, focusing on the

26:

current analysis are:

39:

The analysis uses the NEUGEN generation and the hit level \minerva\

82:

range in the detector, no attempt is made in the analysis to improve

87:

requirement can be optimized to improve the analysis in the future.

120:

In this analysis, we test

0109:hep-ex0109009/Analysis.tex : [ ]

33:

this analysis were selected

69:

We include for this analysis the decay combinations \DstDst decaying

80:

\Dstarz is used for the \Bpmtodstdstz analysis described in Section~\ref{sec:Observation}.}

0805:0805.3954/analysis2.tex : [ ]

4:

This analysis was conducted in two rounds: first with 1 fb$^{-1}$ of data, and then with 2 fb$^{-1}$. The first ...(94 bytes skipped)...

25:

Conceptually, \Vista\ in the second round of analysis is the same as in the first.

29:

The particle identification criteria used in this analysis are the same as in the first round, except for the following changes:

98:

Here are summarized changes made to our Monte Carlo event generation since the first round of analysis.

184:

...(648 bytes skipped)... provided at bottom. The total weight is equal to the roughly four million events included in this analysis.}

189:

%this tex file is produced with Vista_cdf/doc/analysisSite/public/makeFudgeFactorsTable.pl

250:

\item It was recognized that in the previous version of the analysis we had been using a suboptimal filter for conversion electrons. This filter has been updated and no...(103 bytes skipped)...

475:

...(160 bytes skipped)...ts. It is obviously a very large $\chi^2$, even more unlikely than it was in the first round of the analysis, indicating that deviations from the fit are clearly non-statistical, but due to systematic imperfe...(100 bytes skipped)...

481:

...(126 bytes skipped)...s. Qualitatively, shape discrepancies give us the same information we had in the first round of the analysis.

585:

\caption{New \Vista\ final states which appeared in the analysis of 2~fb$^{-1}$.}

590:

...(6 bytes skipped)...\ref{tbl:VistaNewFinalStates} displays the \Vista\ final states which newly appeared in the present analysis.

594:

There are also 11 final states which were populated in the 1.0~fb$^{-1}$ analysis, but are not now:

791:

...(92 bytes skipped)...me sign dilepton final states. These final states have become more discrepant in this round of the analysis as discussed in Sec.~\ref{sec:Sleuth:Results2}.

793:

The 5\th\ most discrepant \Sleuth\ final state from the first round of the analysis was the $\pmiss\tau^+$. Then, we a major background contribution was missing, $W(\rightarrow \tau\n...(212 bytes skipped)...

801:

For the 2~fb$^{-1}$ analysis, we have performed an additional test of the sensitivity of \Sleuth\ to Standard Model single top p...(10 bytes skipped)...

899:

The bump hunter is a new feature added in the second round of this analysis, to enhance the sensitivity of the search to new physics involving narrow mass resonances.

1001:

...(227 bytes skipped)...4)}. This is attributed to the ``3-jet'' effect, the main cause of all shape discrepancies in this analysis. Fig.~\ref{fig:4j_sumPt0-400:3jEffect} shows another instance of the same effect in that final sta...(121 bytes skipped)...

1148:

This analysis does not prove that there is no new hint of physics buried in these data; merely that this search d...(17 bytes skipped)...

0804:0804.2827/B1608acsAnalysis.tex : [ ]

8:

\input{B1608acsAnalysis_macro}

62:

comprehensive Bayesian analysis of the system that takes into

88:

...(9 bytes skipped)...{gravitational lensing: general --- gravitational lensing: individual (B1608+656) --- methods: data analysis --- galaxies: elliptical and lenticular, cD --- galaxies: structure}

211:

analysis of the B1608+656 system that incorporates the effects of the

227:

lensing analysis. In Paper II, we use the resulting potential

257:

but differs in the numerical details and our use of Bayesian analysis,

259:

is also based on Bayesian analysis and has adaptive gridding on the

1254:

images that are used for the analysis. In Sections \ref{sec:psf}--\ref{sec:lensGalLight},

1414:

the Bayesian analysis described in Section

1717:

analysis step.

2367:

analysis, which provides a quantitative approach for comparing

2380:

From our analysis, we draw the following conclusions.

2461:

\bibliography{B1608acsAnalysis}

0710:0710.2309/analysis2.tex : [ ]

1:

\chapter{Analysis II: Including $\sigma \rightarrow \sigma_\mathrm{eff} $ } \label{chap:analysis2}

0710:0710.2309/analysis1.tex : [ ]

1:

\chapter{Analysis I} \label{chap:analysis1}

13:

...(548 bytes skipped)...ection to cancel. We will look at the behavior of $\gamma$ as a function of (1/$N^2$) later in the analysis and compare its extrapolation to N=$\infty$ with $\gamma$ fit to the extrapolated spectrum.

0503:hep-lat0503040/analysis.tex : [ ]

2:

\chapter{Data analysis}\label{analysis}

4:

This chapter addresses the analysis...(195 bytes skipped)...${\rm {D_s^{(\ast)}}}$-meson and the renormalization group invariant charm quark mass. The combined analysis of the simulation results for a number of heavy quark masses around the charm quark mass, together ...(368 bytes skipped)...

5:

\section{Data analysis - general remarks}\label{dataanalysis}

207:

The data obtained for $\kappa_6$ and $\kappa_7$ at $\beta_5=6.7859$ were discarded for the whole analysis, since roundoff effects were observed for the heavy quark masses simulated for, which could be rule...(61 bytes skipped)...

251:

has to be fulfilled by all the data that enter the analysis.

474:

Although all sources of systematic error have been taken into account during the data analysis, it could be shown, that lattice results can meet the accuracy of precision experiments.

480:

This section presents the combined analysis of predictions from HQET together with the relativistic data for heavy quarks with masses around th...(20 bytes skipped)...

489:

...(239 bytes skipped)...\chi^2/{\rm d.o.f.}=2.5)\lesssim 10\%$, the continuum value has been included into the further data analysis, since the extrapolations to $a=0$ at all other pseudo scalar masses behaved much better.

632:

...(309 bytes skipped)...rder contributions are to be expected. Both interpolations were therefore discarded for the further analysis.

0712:0712.3889/binding_analysis7.eps : [ ]

5:

%%Title: (C:\Users\LaptopJILAmolecule\Desktop\Josh's Stuff\Submit_Association _2\binding_analysis7.eps)

0510:cond-mat0510696/EigenChannelAnalysis.tex : [ ]

10:

\title{Orbital eigenchannel analysis for ab-initio quantum transport calculations}

74:

results. Knowledge and analysis of the eigenchannel wavefunctions would, in turn,

97:

%%from the analysis of the usually small number of non-negligible

412:

...(3 bytes skipped)...ssing the Fermi level at half band width, does not contribute to the conduction as our eigenchannel analysis shows.

0805:0805.0186/analysis1_selection.tex : [ ]

2:

\label{subsec:analysis1_selection}

52:

For this analysis, we consider only 1- and 2-track events. 2-track events are classified as QE- or nonQE-like based ...(537 bytes skipped)...

0805:0805.0186/analysis1_corrections.tex : [ ]

2:

\label{subsec:analysis1_corrections}

13:

...(17 bytes skipped)...{fig:pmu} (Color online) Muon momentum distributions for each of the four data samples used in this analysis.}

23:

...(14 bytes skipped)...bel{fig:qmu} (Color online) Muon angle distributions for each of the four data samples used in this analysis.}

66:

In this analysis, we fully take into account correlations among fit parameters. Figure \ref{fig:Contour} shows the ...(430 bytes skipped)...

0703:nucl-ex0703046/analysis.tex : [ ]

1:

\section{Data analysis}

2:

In the data analysis 258k events taken by a minimum bias trigger during Run2

0512:nucl-th0512011/qeanalysis.tex : [ ]

433:

The barrier energy obtained from the analysis of

626:

not only for the analysis of the barrier distribution

632:

a relatively model independent analysis of ion-ion potential.

0703:hep-ex0703008/AnalysisMethod.tex : [ ]

1:

\section{ANALYSIS METHOD}

2:

\label{sec:Analysis}

0710:0710.5471/Cryptanalysis_Ling07.tex : [ ]

67:

where $h_0, h_1$ are so-called ``analysis filters'' and $K_0$, $K_1$

110:

correct recovery of the plaintext signal, the analysis and synthesis

115:

This paper focuses on the security analysis of the above

19:

\title{Cryptanalysis of a computer cryptography scheme based on a filter bank}

40:

cryptanalysis \PACS 05.45.Ac, 47.20.Ky.

0305:hep-ph0305239/analysis.tex : [ ]

2:

\section{Data analysis}

3:

\label{chap:analysis}

27:

Details of analysis procedures to obtain $N_{J/\psi}$,

0809:0809.3405/analysis_090924.bbl : [ ]

31:

\newblock {\em {Harmonic Analysis and the Theory of Probability}}.

77:

\newblock {\em A First Course in Harmonic Analysis\/} (2nd ed.).

192:

\newblock {\em Lehrbuch der Analysis I\/} (10th ed.).

231:

\newblock {\em {An Introduction to Harmonic Analysis}\/} (Third ed.).

309:

\newblock {\em Real and Complex Analysis\/} (3rd ed.).

336:

\newblock {\em Introduction to Fourier Analysis on Euclidean Spaces}.

346:

\newblock {\em Essential Results of Functional Analysis}.

0609:hep-ph0609100/topanalysis.toc : [ ]

8:

\contentsline {section}{\numberline {4}Generator Level Analysis}{9}

0805:0805.0186/tables/analysis2_results_tables.tex : [ ]

4:

\label{tab:inclusive_analysis2}

0612:hep-ex0612063/analysis_tools.tex : [ ]

1:

\section{\label{sec:theta_tools}$\Theta^+$ analysis tools}

123:

\subsection{\label{sec:stat_analysis} The statistical analysis}

0707:0707.0823/Statistical_Robustness_Analysis.tex : [ ]

43:

\title[A Statistical Theory for the Analysis of Uncertain Systems] {A Statistical Theory for the Analysis of Uncertain Systems}

60:

\keywords{Robustness analysis, risk analysis, randomized algorithms, uncertain system, computational complexity}

68:

computational complexity of probabilistic robustness analysis. We

87:

{\em Robustness analysis} is used to predict if a system will

90:

high-performance control systems. In practice, the analysis has to

92:

possible and, usually, it takes many cycles of analysis-design to

94:

robustness analysis should allow the designer not only to evaluate

98:

analysis.

626:

complexity issue, a theoretical analysis of the computational complexity of data merging is as follows.

981:

Traditionally, it is widely believed that the classical deterministic robustness analysis are usually more

984:

robustness analysis via hierarchy sample reuse algorithms can be generally far more efficient.

990:

analysis which requires an extremely low complexity that is

1000:

algorithms for robustness analysis,'' {\it Mathematics of Control,

1005:

rigorous justification for its use in robustness analysis,'' {\it

1022:

\bibitem{C2} X. CHEN, K. ZHOU, AND J. ARAVENA, ``Fast universal algorithms for robustness analysis,''

1025:

\bib{Chen_SIAM} X. CHEN, K. ZHOU, AND J. ARAVENA, ``Probabilistic robustness analysis --- Risks, complexity and

0809:0809.3405/analysis_090924.tex : [ ]

106:

\title[Analysis of valuation formulas]

107:

{Analysis of fourier transform valuation formulas and applications}

151:

The aim of this article is to provide a systematic analysis of the conditions

167:

articles dealing with extensions and analysis of these

170:

on the analysis of the discretization error of the fast Fourier transform.

175:

purposes. Lee \citeyear{Lee04} provides an analysis of the discretization error in the

190:

The aim of our article is to provide a systematic analysis of the conditions

194:

analysis seems to be missing in the literature.

214:

The results of our analysis can be briefly summarized as follows: for general

0808:0808.3574/CryptanalysisArxive.tex : [ ]

290:

...(466 bytes skipped)...quantum channels and discover the path of an attack in the presence of an adversary. The epistemic analysis that leads to this and similar types of attacks is purely based on our classical notion of knowle...(4 bytes skipped)...

305:

...(629 bytes skipped)...set of rules. Our notions of knowledge and time are classical and have been used in the formal analysis of classical protocols, for example in the Halpern style models of~\cite{Prakash,Danos07} and in t...(58 bytes skipped)...

310:

...(636 bytes skipped)...moreover, we discover the path of an intercept-exchange attack that caused this insecurity. A full analysis...(119 bytes skipped)...stitutes on going work. Also, we have only been working on a one-round basis and indeed, for a full analysis of protocols one needs to run the protocol in many runs and then use probabilities, for instance on...(111 bytes skipped)...

767:

In this article we proposed a new framework for formal analysis...(286 bytes skipped)... the latter inherently encodes the rules of quantum mechanics. Our framework was put to test in the analysis of a recent quantum secret sharing protocol based on graph states, where we proved some epistemic p...(131 bytes skipped)...

768:

For a full analysis one needs to generate many more epistemic traces and the need for automation and software implement...(256 bytes skipped)...

302:

...(316 bytes skipped)...ocols~\cite{Gay05}, no applicable formal framework has yet been suggested for their automatic cryptanalysis. This is contrary to the fact that, similar to the situation in classical security, attacks have...(57 bytes skipped)...

0608:nucl-ex0608013/data_analysis.tex : [ ]

8:

counts. The analysis code is described in detail in appendix

9:

\ref{app_engine}. After the run has been analyzed, separate analysis code

176:

analysis, a signal of 3.3 photoelectrons is required, giving an efficiency of

199:

However, in the final analysis the data is binned in the Nachtmann variable

391:

cut used in the data analysis (E/p=0.75). However, this underestimates the

498:

the spectrometer after the magnets. In the analysis, a cut is applied to

517:

to reduce the background. In the analysis, the combination of the calorimeter

813:

Because the PID cuts in the analysis are tighter than the cuts in the trigger,

929:

analysis. For scattering with a cross section $\sigma$, the number of events

1085:

momenta needed for the analysis of the e89-008 data. However, comparison

1110:

the data analysis were thrown out. The position at the wire chamber planes

1115:

fit the reconstruction matrix elements for the SOS data analysis, we use the

1182:

to the value of the cross section at the center of the bin. The goal of the analysis was to extract the

1225:

the dominant systematic uncertainty in the analysis.

1562:

the value for the standard model used in the analysis.}

1818:

as the overall uncertainty. In the current analysis, we use the maximum

1836:

compare results (the analysis of the NE3 data and the inclusive analysis of

0409:physics0409035/6_Analysis_2D.tex : [ ]

4:

...(267 bytes skipped)...ed due to the nonlinear advection term in the Navier-Stokes equation. Therefore we extend the above analysis...(173 bytes skipped)...r-Planck equation (\ref{FoplaCond}) in these two variables. We proceed similar to the one dimension analysis. The main difference is that one need much more data and one has to estimate much more coefficients...(87 bytes skipped)...

0501:hep-ex0501010/prop2004-analysis.tex : [ ]

1:

\section{Off-line analysis} \label{sec:analysis}

3:

The main goal of the off-line analysis...(65 bytes skipped)...large amount of raw data recorded by the DAQ system. This task includes both the raw detector pulse analysis...(153 bytes skipped)...ers fully describing each bolometric pulse) and energy spectra, and the following multi-dimensional analysis...(78 bytes skipped).... The identification of the single background sources is also an important goal of the second-level analysis.

5:

\subsection{First-level analysis}

9:

The fact that for each trigger an entire waveform is sampled and recorded implies that off-line analysis...(158 bytes skipped)...d from the signal waveform. The following are important goals for the (first-level or \emph{pulse}) analysis (FLA):

13:

\item{rejection of the spurious triggered pulses by means of pulse shape analysis;}

14:

\item{identification and rejection of radioactive background pulses by means of coincidence analysis.}

28:

\item{the \emph{pile-up fraction}. Pile-up is usually efficiently rejected by pulse-shape analysis...(80 bytes skipped)...improve the pile-up rejection and quantitatively evaluate its rate (e.g. for short-time coincidence analysis), the Wiener-filter algorithm is implemented~\cite{press91}.}

40:

Therefore, in this step of the off-line analysis, the OF amplitude of each pulse is corrected according to the given value of $ \Delta$ V/E(T[t]) f...(66 bytes skipped)...

46:

Pulse shape analysis is very useful in rejecting spurious signals produced by microphonics and electronic noise. A confi...(103 bytes skipped)...

54:

...(659 bytes skipped)...l. This will also be true for high and intermediate energy neutrons. In the final stage of off-line analysis these coincidence events can be identified from the data which will contain the detector number, si...(47 bytes skipped)...

56:

\subsection{Second-level analysis}

57:

...(7 bytes skipped)...he main goal of CUORE is the search for \BBz of \tect, the same will also hold for the second-level analysis (SLA). In CUORICINO, most of the tools of this analysis...(131 bytes skipped)...institutions participating in CUORE have a similar experience, we are planning to merge the various analysis...(27 bytes skipped)...t groups to apply them to double beta decay processes in order to obtain a single powerful standard analysis procedure. Nevertheless, it will be essential to be able to guarantee a safe cross-check of the res...(78 bytes skipped)...

61:

Physics analysis for Dark Matter and axion searches in CUORE will be completely designed and realized in the framewo...(542 bytes skipped)...

0409:physics0409035/5_Analysis_1D.tex : [ ]

1:

\subsection{Multi-Point Statistics: FP-Analysis}

3:

In this section we present the analysis of the multi-point statistics separately for the longitudinal and transverse increments as it was d...(448 bytes skipped)...

10:

The foundation of the following analysis is the validity of the Markov properties. They can be tested directly on data by their definition (...(735 bytes skipped)...

24:

...(2143 bytes skipped)...ength \cite{Pope00}. Note, that up to now wee see that $l_{m}\approx \lambda$ \cite{renner01a}. The analysis of the data R$\lambda$=550 give in principle analogous results.

0804:0804.2708/StatisticalAnalysis.tex : [ ]

2:

% Statistical Analysis of the collected data through measurements

4:

This section presents the statistical analysis of the data collected

12:

\subsection{Analysis of Received Power}\label{S:Analysis_RSS}

67:

\subsection{Analysis of Link Correlations}

68:

\label{S:Analysis_corr}

73:

$(i,j)$ as described in Section \ref{S:Analysis_RSS}.

0412:hep-ph0412266/analysis_2.tex : [ ]

566:

A similar analysis shows, for the two other formfactors, that the values of

931:

%``NJL model analysis of quark matter at large density,''

0609:hep-ph0609100/topanalysis.tex : [ ]

25:

...(760 bytes skipped)...ui,Ellis:1992qq} so that neither of these problems persist. Such an algorithm has been used in this analysis, and will be defined in Section~\ref{jetalg}.

41:

...(264 bytes skipped)...n-hadron collisions~\cite{Catani:1993hr,Ellis:1993tq}. Although the specific algorithm used in this analysis will be defined in Section~\ref{jetalg}, here we shall outline the general idea for hadron collider...(824 bytes skipped)...

43:

In an effort to motivate the comparison in this analysis, and in particular motivate clustering algorithms in general we point out the following possible th...(1199 bytes skipped)...

155:

...(395 bytes skipped)...iplicity. Precisely where to cut, and how to optimise such a cut, will be discussed in Section~\ref{analysis}.

157:

...(204 bytes skipped)...e the typical boosts of certain particles, and so decide on an optimum cone radius. In Section~\ref{analysis}, we shall find the optimal cone radius for reconstructing tops in this study.

174:

\section{Generator Level Analysis}

175:

\label{analysis}

177:

Here we present the main analysis, which closely follows that presented in~\cite{french}. Firstly, we applied the following pre-selec...(152 bytes skipped)...

229:

In the cone analysis, the dependence of these purities and efficiencies on the cone radius was studied. Figure~\ref{radi...(159 bytes skipped)...

264:

Since this is a generator level analysis...(82 bytes skipped)...0\% of $b$-jets are so tagged, and 0\% of light jets are tagged. Therefore, if we were to apply the analysis algorithm described above to a sample of $W+jets$ events, one would expect almost\footnote{It is po...(780 bytes skipped)...

268:

Naively one might expect that by clustering every event to four jets, the KtJet analysis will have more background events than the cone algorithm analysis...(320 bytes skipped)...o events from the lower multiplicity samples ($n\leq 2$) pass the final selection cuts in the KtJet analysis\footnote{Each of these samples contained $\sim 10^{6}$ events.}.

303:

...(334 bytes skipped)...rom ISR and UE. In order to illustrate this, we have run different parton level outputs through our analysis code.

314:

In this analysis, we have compared the abilities of two jet algorithms to reconstruct the top mass in the lepton plu...(211 bytes skipped)...

322:

...(403 bytes skipped)... even with this more realistic algorithm, the level of background passing the selection cuts of our analysis was negligible.

326:

We found that in the cone algorithm analysis...(100 bytes skipped)...r reconstructed top mass, and the other two processes had little effect on the result. In the KtJet analysis, we found that the contribution to the systematic error from FSR was smaller, but the contributions...(122 bytes skipped)...

0401:q-bio0401033/parametric_inference_biological_sequence_analysis_ps.tex : [ ]

46:

\title{Parametric Inference for Biological Sequence Analysis}

72:

\section{Inference with Graphical Models for Biological Sequence Analysis}

78:

\textbf {(a) Graphical models are a unifying statistical framework for biological sequence analysis.}

127:

Hidden Markov models play a central role in sequence analysis,

142:

definition has since been refined (e.g. \cite{Takai:02}), however even analysis of the complete sequence of the human genome \cite{Lander:01} has failed to

251:

We explain the biological meaning of our parametric analysis

814:

...(64 bytes skipped)...sting) graphical models is certainly feasible for a few free parameters, and we expect that further analysis of the computational geometry should yield efficient algorithms in higher dimensions. For example, ...(164 bytes skipped)...

816:

...(82 bytes skipped)...be possible to optimize the geometric algorithms for specific models of interest, and combinatorial analysis of the Newton polytopes arising in graphical models should yield better complexity estimates (see, ...(46 bytes skipped)...

835:

\bibitem{Durbin:98} R. Durbin, S. Eddy, A. Krogh and G. Mitchison: Biological Sequence Analysis (Probabilistic Models of Proteins and Nucleic Acids),

854:

\bibitem{Lander:01} E.S. Lander et al.: Initial sequencing and analysis of the human genome, Nature 409 (2001) 860--921.

864:

\bibitem{Takai:02} D. Takai and P. A. Jones: Comprehensive analysis of CpG islands in human chromosomes 21 and 22, Proc. Natl. Acad. Sci. USA 99 (2002) 3740--3745.

0711:0711.2369/sec.analysis.tex : [ ]

2:

\label{sec:analysis}

37:

suitable for analysis was selected using the standard run

40:

out of 26 are selected for the analysis. After calibration of the

45:

second analysis referred hereafter as ``Model Analysis'', is based

64:

energy threshold. In the Model Analysis, the angular resolution at

67:

\subsection{Data analysis}

81:

in the analysis. In case of a Navarro-Frenk-White (NFW) density

91:

used for this analysis. The excess sky map is obtained by the

110:

different analysis methods as the so-called Hillas and

0012:hep-ex0012042/analysis.tex : [ ]

1:

\section{Common Analysis Issues}

0703:physics0703281/Paul0307_AdvancesDataAnalysis.tex : [ ]

27:

\journalname{Advances in Data Analysis and Classification}

462:

...(65 bytes skipped)...f moment estimators as starting values in maximizing likelihoods. Computational Statistics and Data Analysis, Volume 17, Issue 5, pp. 493-507

474:

...(26 bytes skipped)...2005) Genetic-based EM algorithm for learning gaussian mixture models, IEEE Transactions On Pattern Analysis and Machine Intelligence, Vol. 27, No. 8

0201:hep-ex0201014/analysis.tex : [ ]

1:

\section{Analysis updates}\label{sec:finaltouches}

3:

The updates made to the analysis of Ref.~\cite{aleph00}, mentioned in

8:

four-jet candidates, after all the analysis updates are taken into

14:

The successive effect of the analysis changes on the maximum

15:

significance of the observed excess, for the two alternative analysis

162:

% Make some statement as to why this is mostly a problem in the four-jet analysis

273:

deposit. The deposit is therefore ignored in the analysis of this

0703:hep-th0703103/RG_Analysis_Gursey_Model_proof_arxiv.tex : [ ]

20:

L\"{u}tf\"{u}o\={g}lu}{Renormalization Group Analysis of a G\"

23:

\title{Renormalization Group Analysis of a G\" ursey Model Inspired Field Theory}%

148:

constraint analysis as performed in reference \cite{ho_lu_06}.

230:

Upon performing constraint analysis similar to the one performed

289:

\cite{ha_ki_ku_na_94} via a $\frac {1}{N_c}$ analysis, are down by

290:

an order of $\epsilon $ in our analysis, we do not need a

0501:hep-ex0501064/oscillation_analysis.tex : [ ]

1:

\section{Oscillation analysis}

11:

with respect to the $\nu_\mu \leftrightarrow \nu_\tau$ analysis

25:

considerations. The final Super-Kamiokande statistical analysis of

27:

oscillation analysis, will appear in other publications.

31:

The analysis is based on a comparison between data and Monte Carlo, suitably

43:

for comparison with the detected data. Unlike our analysis using the ratio

54:

10 zenith angle bins. In total 180 bins were used in the analysis: 150 for

91:

separate analysis, to be published later, which will study $\nu_\tau$

343:

in our analysis.

456:

Finally, we point out that a separate $L/E$ analysis of the same

461:

the region and a linear scale in $\Delta m^2$. The $L/E$ analysis

463:

the oscillatory dip; the present analysis constrains $\sin^2 2\theta$

470:

regions obtained by an $L/E$ analysis~\cite{Ashie:2004mr} and by the

471:

present analysis are compared.}

0012:hep-ex0012033/analysis.tex : [ ]

1:

\section{Analysis}

2:

\label{sec:analysis}

5:

\label{sec:analysis-mc}

161:

In this analysis, we included the $b \rightarrow \tau \rightarrow \mu$ mode

502:

we performed the same analysis by changing the correction factor of the

0503:quant-ph0503202/analysis_model.tex : [ ]

3:

%% analysis_model.tex %%

8:

\subsection{Analysis model for the decoherence}

9:

\label{sec:analysis_method}

94:

%noted later in Section~\ref{sec:analysis_second}.

0506:physics0506176/workloadAnalysis.tex : [ ]

72:

Workload analysis of a cluster \\

89:

resource sharing and best usage arise. In this paper, the analysis

98:

Analysis of a cluster workload is essential to understand better user behavior

145:

presented (section~\ref{Workload analysis and modelling}) and the logs

193:

Data Analysis requires a lot of I/O whereas Monte-Carlo Simulation

373:

\section{Workload data analysis}

374:

\label{Workload analysis and modelling}

378:

Workload analysis allows to obtain a model of the user

391:

properties~\cite{feitelson02workload}. Workload analysis allows to obtain a model of

423:

log files are well structured for data analysis. An AWK script is

666:

\subsection{Frequency analysis}

1099:

notion of user activity. For example during the preparation of jobs or analysis

1336:

%%%% \textbf{Xmipp MLrefine} & Macromolecular 3D structure analysis \\

1350:

\bibliography{workloadAnalysis.bib}

0503:quant-ph0503202/analysis_first.tex : [ ]

3:

%% analysis_first.tex %%

9:

\label{sec:analysis_first}

0309:cond-mat0309676/FirstPeakAnalysis.eps : [ ]

3:

%%Title: FirstPeakAnalysis.eps

0207:hep-ex0207084/analysis.tex : [ ]

1:

The basic analysis technique is based on \BB\ events in which one of the $B$ mesons decays hadronically and is fully r...(88 bytes skipped)...

0305:cond-mat0305172/cryptanalysis_vf.tex : [ ]

88:

Analysis of common attacks in LDPCC-based public-key cryptosystems}

192:

section~\ref{sec:analysis} we derive the observable quantity that

199:

users), respectively. The implication of the analysis are discussed in

240:

regular dense matrix to simplify the analysis. The parameters

581:

\section{The Free Energy and Decryption Observables}\label{sec:analysis}

1285:

the plaintext size. Analysis of finite size effects in the belief

1367:

to the analysis of section \ref{sec:analysis}. For details of this

1412:

vector'. The analysis follows standard statistical mechanical

0707:0707.1083/DelayCorAnalysis.tex : [ ]

60:

Network-Wide Traffic Analysis, Random Correlations, Time-Lagged Correlations,

66:

The cross-correlation matrix is one of the tools of time series analysis,

92:

inter-domain correlations at different times. In fact, the analysis

94:

econometric time series systems. For example, the analysis of stock

109:

to eigen-analysis just like its equal-time counterpart. In contrast

147:

spectrum analysis and experimental results suggest the asymmetric

150:

Network traffic analysis had undergone the evolution from considering

162:

is devoted to numerical analysis of time-lagged eigensystem. Then,

175:

matrix analysis. Below we recap the details relevant to the construction

354:

\subsection{Frequency domain analysis}

571:

first rigorous statistical analysis of self-similar characteristics

627:

The above described time-lagged correlational analysis has a broad

645:

\bibitem{Rojkova}V. Rojkova and M. Kantardzic, Analysis of inter-domain traffic correlations:

649:

\bibitem{GlupyeIndusy}K.B.K. Mayya and R.E. Amritkar, Analysis of delay correlation matrices,

655:

Applying free random variables to random matrix analysis of financial

658:

matrices: derivation of eigenvalue spectra and analysis of financial

665:

\bibitem{Erramilli}A. Erramilli, O. Narayan, and W. Willinger, Experimental queuing analysis

263:

\section{Eigenanalysis for time-lagged correlation matrix}

0811:0811.4184/riccati-analysis.tex : [ ]

1:

% Analysis of the Riccati system

2:

\section{Analysis of the Riccati system}

3:

\label{section:riccati-analysis}

62:

The missing ingredient before we can begin an analysis in both systems \eqref{Transformed.Tangential.System} and \eqref{Transformed.Second.Tangential.Syst...(323 bytes skipped)...

177:

We now proceed with the analysis of systems \eqref{Transformed.Tangential.System} and \eqref{Transformed.Second.Tangential.System}. ...(381 bytes skipped)...

265:

By Theorem \ref{thm:ODEcomp} and the analysis of the appendix, we find that the solutions satisfy estimates

341:

...(230 bytes skipped)...^{(1-a)r})$. We again compare this system to a model system. By Theorem \ref{thm:ODEcomp} and the analysis of the appendix, we find that the solutions satisfy estimates

0309:cond-mat0309676/SecondPeakAnalysis.eps : [ ]

3:

%%Title: SecondPeakAnalysis.eps

0707:0707.0315/smoothed-analysis-hyper.tex : [ ]

84:

smoothed analysis} of algorithms proposed by Spielman and Teng

1035:

On smoothed analysis in dense graphs and formulas,

0503:quant-ph0503202/analysis_second.tex : [ ]

3:

%% analysis_second.tex %%

9:

\label{sec:analysis_second}

18:

%Similar to the analysis of the first register,

25:

In Section~\ref{sec:analysis_first},

156:

%In the analysis of probability distributions,

171:

%on our analysis later.

0709:0709.0652/LinearStabiliyanalysis.tex : [ ]

2:

\chapter{Linear Stability Analysis of the Four-Body equilibrium solutions}

6:

linear stability analysis of these solutions.

235:

motion and carrying out a linear stability analysis (see any

396:

analysis of the eigenvalues alone. To investigate the nature of

442:

imaginary. We will apply this analysis to special cases of four

444:

\section{Linear Stability analysis of the equilibrium points}

763:

stability analysis of this configuration as we have used for

0504:hep-ex0504018/bbh_analysis_prl_p14.tex : [ ]

40:

\tanb. The results of our analysis agree with expectations from the

127:

The current analysis is sensitive to \tanb\ in the range 50 -- 100,

130:

%. For the range of \tanb\ this analysis is currently sensitive to (50

145:

%As a result this analysis is unable to distinguish

226:

To be accepted for further analysis, jets with

352:

in Fig.~\ref{fig:Final_QCD_fit}. The \btag-tagging in this analysis

432:

The selections in this analysis can be grouped into trigger level,

435:

the acceptances for each set of criteria made in the analysis, for

441:

repeating the analysis with each value changed by $\pm$ one standard

455:

%.calculated by repeating the analysis with each value varied by $\pm

463:

%jet energy scale and jet energy resolution. These are calculated by repeating the analysis,

472:

%were calculated by repeating the analysis, changing their values

586:

The present D\O\ analysis, based on 260~\ipb\ of data, excludes a

657:

analysis used PDFs that have been superseded, resulting in more

659:

PDFs used in this analysis.

0601:hep-ex0601009/chAnalysis.tex : [ ]

1:

\chapter{Data and analysis}

19:

results of this analysis have been published in \textit{Physical

24:

Prior to this spin-asymmetry analysis, a polarization-averaged cross

26:

and published in \cite{Adler:2003pb}. The analysis completed for

28:

section analysis, and then additional quality cuts relevant to a

29:

spin-dependent analysis were made.

49:

cross section analysis due to problems with electronics noise during

50:

data taking. A number of runs had been eliminated from that analysis

58:

in the final cross section analysis.

60:

For the present analysis, six of the twenty fills used in the cross

61:

section analysis were removed. Two were removed because no

85:

this analysis. These four crossings had unusually low luminosities

99:

this analysis because it had zero polarization. The other

124:

analysis based on this information.

188:

this analysis.

251:

was used for the $\pi ^{0}$ $A_{LL}$ analysis, the results of which

431:

the BBC. A typical value in this analysis was $\mathcal{R} =

467:

analysis are given in Table~\ref{table:polarizationValues}.

539:

values of $|\cos \varphi |$ used in the analysis were calculated

596:

analysis was used for the longitudinal double-spin asymmetry

842:

one for the purposes of this analysis. It should also be noted that

844:

analysis, while Eq.~\ref{eq:lumiFormula} has an equivalent for

845:

longitudinal double-spin analysis (see

1276:

The procedure utilized in this analysis was to assign half of the

1289:

For this analysis, Eq.~\ref{eq:sqrtFormula} was used to calculate

1294:

distributions from the data set used for this analysis; the expected

1439:

present analysis (see Section~\ref{section:results}), a shuffled

1442:

$p_T$ bin in the present analysis. For ten times this statistical

1558:

the checks available to a single-spin analysis are not available.

1616:

A similar analysis of the transverse single-spin asymmetry, $A_N$,

1621:

the charged hadron analysis, refer to the publication. Charged

0611:nlin0611042/OE-Analysis.tex : [ ]

22:

Fictitious Parameter Analysis for Multi-physics Simulations}

46:

and eigenvalue-statistical analysis developed in the study

104:

and the other is to introduce the new analysis

106:

The target of our analysis is one-electron orbital

259:

Before entering the analysis using $\lambda$,

271:

we concentrate the analysis of the band just below the

307:

Thus, we can perform the eigenvalue-statistical analysis

335:

we enter the detailed analysis of energies and wavefunctions

375:

Actually, the core orbitals, which we have removed from the Brody analysis,

431:

Since our analysis is based on the parameter variation\cite{TTslope},

432:

more sophisticated analysis such as the level-curvature analysis

439:

By the use of these analysis,

450:

Although we could not give a clear answer within our Brody analysis,

451:

such analysis on the regularity will be performed

452:

through the detailed analysis of nodal patterns, Husimi representation,

475:

This is our first report on the eigenvalue-statistical analysis

0705:0705.0704/analysis1595.tex : [ ]

1:

\section{Analysis}

2:

\label{sec:analysis}

4:

The initial selection of semileptonic decay candidates follows the single-tag analysis described

26:

full analysis method have been established.

448:

As discussed in the appendix, for the range of parameters relevant for this analysis,

471:

The sensitivity of this double-tag analysis is comparable to that

472:

expected for a single-tag analysis, see Table \ref{PreviousLimitsTable}.

0804:0804.3742/Analysis-of-time.tex : [ ]

3:

\emph{An analysis of the concept of time was my solution.} \smallskip \\

10:

Philosophers of science thrive in the analysis of scientific concepts. If we want to draw a lesson on how to make a good analysis...(115 bytes skipped)...rom V b.C.\ to XXI a.D.---\emph{or should we?} What do philosophers of science do when they make an analysis?

12:

A conceptual analysis can be interpreted variously. It may refer to the meticulous \emph{logical dissection} of a concept...(294 bytes skipped)...

14:

...(793 bytes skipped)...explanation of the universe entirely to the scientist; it constructs the theory of knowledge by the analysis of the results of science'' (p.~303). Identifying scientific

19:

...(500 bytes skipped)...eichenbach put it, ``scientific research does not leave a man time enough to do the work of logical analysis, and\ldots conversely logical analysis demands a concentration which does not leave time for scientific work'' (p.~123)---this is another ...(18 bytes skipped)...

21:

...(66 bytes skipped)...uce useful results without limit? Or is there instead a fuzzy boundary carried beyond which logical analysis stops clarifying anything at all? Reichenbach goes on to admit that philosophy of science, ``aiming...(221 bytes skipped)...

23:

...(105 bytes skipped)...the link with the natural world as the motivator of scientific concepts and \emph{informer of their analysis} was severed in professional philosophy of science, for, as Reichenbach put it, the professional ph...(898 bytes skipped)...

42:

...(69 bytes skipped)...sopher, as he is sometimes called, would he have discovered special relativity through his physical analysis of time, or would he have instead remained scientifically frozen in an endless logical analysis of Newtonian absolute time and space?

46:

...(1256 bytes skipped)...f his life as a starting point for the theoretical concepts of physics is well known.} What does an analysis mean to him? To him, an analysis...(103 bytes skipped)... of a concept's \emph{physical} meaning, of its \emph{physical} root and nature. The content of his analysis is not to be found primarily in his head, but in the world around him. This is not to say that an analysis of this type does not rely on the scientist's conceptual tools of thought. It necessarily does, but...(94 bytes skipped)...

50:

This being said, we proceed to a geometric analysis of the concept of time. What can be expected from such an analysis? First and foremost, an understanding of relativity theory on the basis of the raw material of simp...(492 bytes skipped)...

63:

In conclusion, for an insightful physical analysis, mathematics in

384:

...(90 bytes skipped)...elf naturally available to us---we have reached a roadblock. \emph{This is a critical stage of this analysis}. It is time to recapitulate.

387:

The present analysis...(289 bytes skipped)...iant quadratic form $g_{\alpha\beta}(x)\D x^\alpha \D x^\beta$. Is there anything missing from this analysis of time? Should we consider something else besides physics and mathematics? We must; if we are to m...(211 bytes skipped)...

782:

...(171 bytes skipped)...Lagrange-I}) and proceed to find its first integral. In order to avoid confusion with the preceding analysis, we now rename $f$ as $\phi$ in this equation.

982:

...(25 bytes skipped)...tive has been developed, we can recreate with it generalizations of well-known concepts from vector analysis to be useful in the following pages:

1722:

...(95 bytes skipped)... related to the geometry of the universe and to time'' (p.~47). We finish this chapter with a brief analysis of the insight contained in this deceptively simple statement.

1787:

The geometric analysis of clock time, leading us to the classical and relativistic worldviews, is now complete.

0608:nucl-ex0608013/analysis_overview.tex : [ ]

3:

The analysis of the raw data files was done using the standard Hall C event

15:

final physics analysis. Histograms and Ntuples are generated using the CERN

20:

by the analysis package, The physics analysis is done using separate

25:

information. A detailed description of the analysis code is given in

0503:quant-ph0503202/analysis_summary.tex : [ ]

3:

%% analysis_first.tex %%

9:

\label{sec:analysis_robust}

0702:cond-mat0702061/The_Analysis_on_the_single_particle_model_of_CDW.tex : [ ]

42:

\title{\textbf{\Large The analysis on the single particle model of CDW}}

162:

following analysis.

180:

called a "center", which is not the subject of the current analysis. $%

206:

cylindrical system in mathematics. Thus it is enough for analysis

241:

For which, let $\Gamma $ increase from zero to a positive, by the analysis

257:

A_{1} $. By the analysis of rotated vector field, it can also be proved

261:

Through analysis, it shows that $\beta _{0}$ is unique for a given $\Gamma

481:

pendulum model\cite{MacD}. By a rigorous mathematical analysis are

0708:0708.3986/AnalysisMethods/Rebinning.tex : [ ]

22:

\includegraphics[width=0.3\textwidth]{AnalysisMethods/figs/pix_ang_space_1.eps} \vfill &

23:

\includegraphics[width=0.3\textwidth]{AnalysisMethods/figs/pix_ang_space_2.eps} \vfill &

24:

\includegraphics[width=0.3\textwidth]{AnalysisMethods/figs/pix_ang_space_3.eps} \vfill

0809:0809.4027/AnalysisMethod.tex : [ ]

4:

The strategy adopted for this analysis is to reconstruct exclusively

21:

somewhat lower purity than the exclusive reconstruction method of $\btodszlnu$. In this analysis, we employ a technique, known as the ``seeding'' method, to recapture one photon from the $X$ state...(107 bytes skipped)...

188:

...(267 bytes skipped)...in the final LHR. We also removed any variables that should not, for physical reasons, improve the analysis. For instance, variables related to the tag $B$ would not reject $B\bar{B}$ background because the...(231 bytes skipped)...

255:

...(250 bytes skipped)... Other values indicate various failure modes for the fit. The only failure mode that occurs in this analysis is that the fit does not converge

349:

...(315 bytes skipped)...he detector. We decided remove all events below a certain value of $m_{\ell \ell}$ after all other analysis cuts had been applied. This value was chosen using only signal and background MC simulations with ...(288 bytes skipped)...

0608:hep-ex0608002/AnalysisMethod.tex : [ ]

1:

\section{ANALYSIS METHOD}

2:

\label{sec:Analysis}

0804:0804.3706/SingleTopAnalysis.tex : [ ]

4:

...(129 bytes skipped)...s section of $\sim$ 250 pb, the production will be in millions per year even at low luminosity. The analysis...(295 bytes skipped)...asic object selection follows that defined in section \ref{Sec::fullfast::selection} throughout the analysis unless otherwise stated.

37:

...(78 bytes skipped)...n with \pt$>$25 GeV\footnote{The electron threshold is raised due to the trigger threshold. In this analysis the trigger is not applied explicitly but care was taken to minimise trigger effects.} and $|\eta|<...(61 bytes skipped)...

166:

The top quarks reconstructed with the two methods above were combined for further analysis. Figure \ref{Fig::nusol::topmass} shows the reconstructed top mass with different contributions ind...(869 bytes skipped)...

236:

...(741 bytes skipped)...nd with a harder jet \pt\ spectra has a closer resemblance to the signal. In addition, the previous analysis was fully based on an old version of \Atlfast\ whose performance was more optimistic. The current s...(183 bytes skipped)...

260:

The uncertainties due to systematic effects were evaluated for the analysis developed above. Unlike a cross section measurement, a polarisation measurement is not sensitive to...(421 bytes skipped)...

262:

...(73 bytes skipped)...1997-2} identified the most significant systematic effects, most of which are also relevant to this analysis...(461 bytes skipped)...y in such a way that both event selection and estimator distribution are affected. Furthermore, the analysis depends on the theoretical model used to construct templates which still involve some uncertainties...(63 bytes skipped)...

271:

...(106 bytes skipped)...ous ways. It affects the event selection as a tight jet multiplicity requirement is imposed in this analysis. In particular, a large number of W+jets events consist of jets in the vicinity of the \pt\ selecti...(1033 bytes skipped)...

301:

...(102 bytes skipped)...tagging efficiency requires careful study of control samples. The effect of the uncertainty on this analysis was measured by varying the performance of the b jet tagging efficiency by 5\% changing the cut on ...(627 bytes skipped)...

348:

In the current analysis...(468 bytes skipped)...tchan::BackgroundVar}. The large uncertainty on W+jets channels is particularly significant to this analysis. The quoted 15\% is a rough estimate and it can vary greatly depending on the scheme of the calcula...(319 bytes skipped)...

445:

Several estimators and reduced background scenarios were considered in this analysis. Using the optimised basis with at 1 fb$^{-1}$ of data, the estimated precision of the measured pol...(12 bytes skipped)...

0510:nucl-th0510012/betaanalysis.tex : [ ]

45:

\title{General classification and analysis of neutron beta-decay experiments}

84:

A general analysis of the sensitivities of neutron

91:

expression, we present an analysis of the sensitivities to new physics for selected neutron

203:

delicate analysis, as the lowest order description of the correlation

212:

this analysis provides a useful framework for the exploration of the

242:

...(77 bytes skipped)...l of considered accuracy would be a clear manifestation of new physics and thus does not require an analysis of the form contained here.) Ignoring electron and proton polarizations, the given

329:

...(494 bytes skipped)...ee \cite{eftcor}). We vary the magnitude of this parameter in a wide range for the given numerical analysis and show that variations of the parameters in the allowed range do not significantly change our res...(225 bytes skipped)...

486:

complicated, we have to use numerical analysis for

491:

\section{The analysis of the experimental sensitivity to new physics}

557:

neutrino contributions in corresponding lepton currents. The analysis of the three

560:

...(329 bytes skipped)...range from $0.07$ to $10^{-6}$ (see table \ref{nptab} and, paper \cite{herc} for the comprehensive analysis). The numerical results for the coefficients $K$ in the table can be linearly re-scaled for the par...(141 bytes skipped)...

677:

We presented here results of analysis...(48 bytes skipped)...to illustrate a different level of sensitivities of experiments to the parameters. For the complete analysis of future experiments all $\bar{a}_{ij}$, $\bar{\alpha}_{ij}$ and $\bar{A}_{ij}$ parameters should ...(71 bytes skipped)...

681:

The analysis...(1068 bytes skipped)... description. This is expected in the next generation of neutron decay experiments. Therefore, such analysis is needed for these experiments. One has to use the full expression for neutron beta-decay in terms...(235 bytes skipped)...

0805:0805.1563/perf_analysis.tex : [ ]

35:

...(198 bytes skipped)...tilde u$ and initial distribution $\nu$ \cite{derman-LP}. The proof of the theorem follows from the analysis presented in \cite{deFarias-ADP}, see \cite{leny06_RBSC_CDC} for more details.

0608:hep-ex0608019/AnalysisMethod.tex : [ ]

2:

\section{ANALYSIS METHOD}

3:

\label{sec:Analysis}

8:

The strategy adopted for this analysis is to reconstruct exclusively

0409:physics0409035/4_Analysis_Standard.tex : [ ]

95:

...(381 bytes skipped)...he transverse increments are more intermittent as the longitudinal. In the following we apply a new analysis to study the dependence between different length scale and the interaction between both increments ...(29 bytes skipped)...

0805:0805.1038/thinfilmanalysis.tex : [ ]

54:

regularity results. In our analysis, we find a nonzero lower bound

86:

Analysis of the Cahn--Hilliard (CH) equation was given by Elliott and

109:

NSCH equations form the starting point for our asymptotic analysis.

125:

principles, present analysis of the resulting equations, and highlight

149:

The analysis of thin-film equations was given great impetus by Bernis

243:

We present the asymptotic analysis that converts the NSCH equations

246:

$\Sobo^{4,2}$ norm. The principal tool in this analysis is the

2463:

the analysis of the model equations, it does not capture the physics of

2481:

identified a decaying energy functional that facilitated analysis of the

2487:

in~\cite{Friedman1990}. Central to the analysis is the decaying free energy,

3048:

\newblock {\em Applied Analysis of the Navier--Stokes Equations}.

0103:astro-ph0103110/analysis.tex : [ ]

16:

\title{Quantitative Analysis of the Void Size Distribution in the LCRS

57:

simulations~\cite{MAET00}. Here this analysis is evaluated and compared with

60:

In our analysis~\cite{MAET00} we have used automatic void finders in 2D. Voids

149:

$\Lambda$CDM model as seen in Table~\ref{voids}. According to our analysis, the

0708:0708.3986/AnalysisMethods/SinglePeaks.tex : [ ]

1:

\subsection{Single peak analysis}

12:

The analysis is based on the full 3D intensity distribution in

33:

\includegraphics[width=4.5cm]{AnalysisMethods/figs/fit_ex_qx.eps}

34:

\includegraphics[width=4.5cm]{AnalysisMethods/figs/fit_ex_qy.eps}

35:

\includegraphics[width=4.5cm]{AnalysisMethods/figs/fit_ex_qz.eps}\\

0506:nlin0506046/stability_analysis.EPS : [ ]

5:

%%Title: (D:\Documents and Settings\Administrator\My Documents\paper\stability_analysis.EPS)

0401:astro-ph0401212/analysis.tex : [ ]

17:

detected during the rising phase and were excluded from analysis \citep{y2003}.

62:

Spectral analysis was carried out with the XSPEC software (v.11.0.1). We used

87:

\subsection{Temporal Analysis}

0503:quant-ph0503202/analysis_counting.tex : [ ]

3:

%% analysis_counting.tex %%

9:

\label{sec:analysis_counting}

13:

We begin by explaining our analysis model

25:

\input{analysis_model}

26:

\input{analysis_first}

27:

\input{analysis_second}

28:

\input{analysis_summary}

0708:0708.3986/AnalysisMethods/Projections.tex : [ ]

79:

\input{AnalysisMethods/figs/split_pseudo_voigt_all.pstex_t}

0608:quant-ph0608001/SecurityAnalysis13.tex : [ ]

36:

by L\"{u}tkenhaus, and unconditional security analysis by

73:

which will affect the security. To do security analysis, we should

79:

We will compare L\"{u}tkenhaus' analysis \cite{IndividualAttack_00}

102:

kind of security analysis is incomplete. In fact, due to

139:

%and a security analysis. So Alice and Bob need to select a security

140:

%analysis scheme for the data post-processing. In this sense, SARG04

189:

\item Alice and Bob choose a security analysis and perform a data post-processing scheme.

323:

analysis, which we will discuss soon). Finally they use random

474:

security analysis of decoy state QKD \cite{Decoy_05}.

576:

%considering on general the security analysis---GLLP. Our result

578:

there is little to gain by restricting the security analysis to

632:

parameters for security analysis, listed in

643:

\caption{\normalfont{Key parameters for the security analysis of

717:

In this paper, we compare the security analysis of L\"{u}tkenhaus,

719:

general security analysis. Our simulation results show that these

722:

restricting to individual attacks. In the security analysis, we

0501:cs0501069/analysis-lkpcost.tex : [ ]

21:

For this analysis, we consider timeouts and hops to add equally

22:

to the cost. We can easily generalize this analysis to investigate the case

83:

and the expression for the $f_k$'s \cite{ansary:analysis}.

0711:0711.3908/Joint_Analysis_A1689.tex : [ ]

32:

Analysis}

49:

We carry out a comprehensive joint analysis of high quality HST/ACS

140:

X-ray analysis, by factors of $\sim 2-4$ (Miralda-Escude \& Babul

159:

simultaneous analysis of X-ray and lensing data are clear, given that

181:

were obtained from the analysis of observed arcs and arclets produced

186:

the X-ray surface brightness and temperature profiles from an analysis

194:

data analysis in Section~3. In Section~4 we describe the methodology

210:

software: Chandra data analysis software package CIAO 3.3, with the

212:

\footnote{We followed the threads for data preparation "Analysis Guide:

215:

sources "Analysis Guide: Extended Sources",

295:

correction is implemented in the analysis software (starting with

333:

Analysis of strong lensing measurements of A1689 was carried out using

352:

2005b). In practice this work is difficult, requiring careful analysis

370:

\section{Spectral and Spatial Data Analysis}

478:

precise (due to the larger effective area). Our analysis indicates

485:

fitting. We compare our Chandra analysis (circles), which gives a mean

486:

value of $0.42$ (horizontal solid line), to the XMM analysis of AM04

491:

\subsection{Surface brightness and temperature analysis}

671:

were not used in the analysis), we projected the 3D temperature,

700:

analysis, however, we do not use the temperature data for the fit but

704:

Our analysis focuses on the free-parameter method that does not assume

705:

a particular shape for the profile. In addition, we used our analysis

733:

Voit, Kay, \& Bryan 2005; for a theoretical analysis of joint X-ray

781:

analysis of the lensing and X-ray data. The numbers of data points

782:

used in the analysis were $N_{\kappa}=26$ and $N_{s}=58$ for lensing

949:

model-free analysis (points with error bars) to the results of

955:

analysis (figure~\ref{free_param_Vs_NFW_and_core} and

1005:

best-fit NFW model from weak gravitational shear analysis (Clowe \&

1006:

Schneider 2001; King et al.\ 2002). The latter analysis, although it

1007:

is a weak lensing analysis, is the closest to the profile derived from

1011:

background galaxies. Thus, the X-ray analysis of AM04 (based on the

1497:

cluster mass estimated from these different kinds of analysis can now be

1524:

The second basic assumption adopted in our analysis is spherical symmetry.

1580:

for an analysis with fewer prior assumptions. Another way to reduce

0609:quant-ph0609080/bell-state-analysis-2006.tex : [ ]

72:

doesn't exist and only a partial Bell state analysis with a

79:

any Bell analysis exploits further degrees of freedom to assist the

83:

a complete and deterministic Bell state analysis can be performed

87:

{13}. An experimental demonstration of a complete analysis of the four

94:

full deterministic analysis of all the photon pairs requires the adoption of

98:

analysis can be performed by using the further degree of freedom of momentum (\textbf{k}) as the ancilla.

99:

More precisely, the analysis of the Bell states (\ref{Bell}) is carried out

249:

|\ell\rangle _{B}-|r\rangle _{B}$ and polarization analysis on each $BS$

252:

deterministic Bell state analysis requires to detect the eight possible

272:

analysis by linear optics. It is well known that this discrimination is not

274:

Our approach improves the ``standard'' Bell state analysis where two bits of

285:

Hence, Bell state analysis is performed by the following procedure:

304:

\item[3)] The four PBSs perform polarization analysis distinguishing between $|\Psi

311:

state analysis of the polarization states $|\Phi ^{+}\rangle $, $|\Phi

331:

indicates the high efficiency of the analysis performed by our scheme. The

332:

achieved fidelities of each Bell-state analysis are $F_{\left| \Phi

339:

polarization input state and partially due to imperfections of the analysis

367:

state analysis, with $F_{\left| \Psi ^{+}\right\rangle }\geq 0.75$, may be

0708:0708.3986/AnalysisMethods/Introduction.tex : [ ]

3:

challenge with respect to data analysis is how to gather relevant

29:

single individual peaks. The analysis method used on these peaks is

34:

individual peaks, a statistical analysis method has been devised, this

0408:cond-mat0408167/sg-tex/sec_analysis.tex : [ ]

4:

\section{Analysis of the Series}\label{sec:analysis}

6:

\sts Our analysis uses the \dlog\ method~\cite{gamm73} and the methods

16:

The series analysis is done for a fixed dimension at a time. We

18:

dimension and for 5 and 4 below it. We also attempted an analysis in

32:

analysis in $d=6$.

34:

It is generally observed in series analysis, that for a given order of

42:

\subsection{\dlog\ Analysis}

45:

analysis of power series. One calculates Pad\'e approximants to the

54:

physical critical point. They are observed in the \dlog\ analysis of the

69:

analysis. So our strategy is in general to use the \dlog\ method only

71:

for a detailed analysis with M1 and M2, and to assess the general

78:

The analysis algorithms M1 and M2 allow the accurate simultaneous

107:

analysis, to get rough estimates of $x_\mathrm{c}$ and $\gamma$ which

108:

one uses as starting points for the detailed analysis with M1 and M2.

110:

these series analysis methods has been demonstrated in several

151:

Our analysis relies in a large part on the use of Euler

158:

close to the negative singularity, as indicated by the \dlog\ analysis

164:

good accuracy, when compared to the error bounds given by the analysis

0411:cond-mat0411518/graphics/parallel_channel_analysis_real_and_im.EPS : [ ]

5:

%%Title: (E:\ffischer\parallel_channel_analysis_real_and_im.EPS)

0705:0705.0816/SAID_analysis.tex : [ ]

2:

% $Id: SAID_analysis.tex,v 1.60 2007/05/01 16:30:28 pasyuk Exp $

17:

and an earlier SAID analysis (SM02)~\cite{sm02}. For the purposes of

32:

poorer than by any other fit included in this analysis.

79:

analysis in Fig.~\ref{fig:g1}. Above this energy limit (1650~MeV), we

118:

The present fits have been generated using the most recent GW analysis

0701:astro-ph0701586/analysis.tex : [ ]

1:

\section{Luminosity and Temperature}\label{analysis-LT}

15:

\subsection{Luminosity}\label{analysis-luminosity}

39:

\subsection{Temperature}\label{analysis-temperature}

57:

...(42 bytes skipped)... in much better agreement to temperatures obtained from simulated \Chandra~ observations. In their analysis, they typically find $T_{sl}$ to be lower than $T_{ew}$ by $20-30$\%. This relation is calibrated ...(129 bytes skipped)...

71:

...(600 bytes skipped)...y the photon flux of each spectral bin. The instrumental response of \Chandra~ is included in this analysis as well as Galactic absorption at a level of $N_H=2\times 10^{20}cm^{-2}$.

73:

In the analysis of RS01, the emission-weighted temperature of the system remains relatively constant, interrupted o...(315 bytes skipped)...

79:

...(643 bytes skipped)...olution of a cluster merger. We shall use our spectrally fit temperatures for the remainder of our analysis however, unless otherwise stated.

85:

\subsection{$L_x-T_x$ relation}\label{analysis-L_T}

89:

...(552 bytes skipped)...$ plane which correlates with the morphology of the cores when the central regions are retained for analysis. To explore the consequences (and possible contributions of) mergers to this structure, we use the...(151 bytes skipped)...

102:

In Section \ref{analysis-luminosity} we discussed the common temporal evolution of the global X-ray and SZ observables we st...(716 bytes skipped)...

108:

...(113 bytes skipped)... $L_x-T_x$ plane, where systems with compact cool cores are typically found (M04). In Section \ref{analysis...(43 bytes skipped)... evolve to states which preserve the observed mass-temperature scaling relation but in Section \ref{analysis-luminosity} found that they create remnants which are under luminous with respect to the observed m...(228 bytes skipped)...

112:

...(563 bytes skipped)...erated with the emission-weighted measure be viewed with some scepticism (as argued in Section \ref{analysis-temperature}), the scatter should be as well.

114:

\section{Mass}\label{analysis-mass}

141:

...(563 bytes skipped)...aietal06}. %They find hydrostatic equilibrium masses to be biased \emph{low} by $\sim5$\% but this analysis is performed at $R_{200}$ where bulk motions will be more significant, even for a relaxed cluster, ...(95 bytes skipped)...

171:

\subsection{$M_t-T_x$ relation}\label{analysis-M_T}

190:

...(1129 bytes skipped)...els by $30$\% to reflect the downward bias in isothermal $\beta$-model masses found in Section \ref{analysis-mass}. When we do so, we find a good agreement between our fiducial models and the observed catalo...(189 bytes skipped)...

194:

...(35 bytes skipped)...olution of our mergers in this plane follows the generic pattern we have discussed in Sections \ref{analysis-luminosity} and \ref{analysis-L_T}: two transient increases in both quantities at \tclosest~ (first pericenter; illustrated by th...(582 bytes skipped)...

204:

\subsection{$M_t-L_x$ relation}\label{analysis-M_L}

210:

\section{Sunyaev-Zel'dovich effect}\label{analysis-SZ}

214:

...(489 bytes skipped)...gues has a similar, but likely less severe potential to introduce systematic uncertainties into the analysis of these datasets \citep{MajumdarandMohr03}. Furthermore, because the SZ effect is dependent on a ...(263 bytes skipped)...

220:

...(397 bytes skipped)...the $\beta$-model results from the mass scalings derived from our fiducial models (see Section \ref{analysis-luminosity}). Vertical dotted lines indicate (from left to right) $t_o$ (the time of virial crossi...(267 bytes skipped)...

229:

...(335 bytes skipped)...the final values expected from the mass scalings derived from our fiducial models (see Section \ref{analysis-luminosity}). Vertical dotted lines indicate (from left to right) $t_o$ (the time of virial crossi...(267 bytes skipped)...

296:

...(52 bytes skipped)... be significantly biased by uncertainties in the assumed spatial model of the ICM. They present an analysis of integrated Compton fluxes which they find to be more robust to uncertainties in the assumed form...(93 bytes skipped)...

334:

\subsection{SZ$-T_x$ scaling relations}\label{analysis-SZ_T_scaling}

338:

For observational comparison in our SZ analysis, we use the heterogeneous catalogues of massive systems presented by \citet[][black triangles]{Rees...(463 bytes skipped)...

348:

\subsection{SZ$-L_x$ scaling relations}\label{analysis-SZ_L_scaling}

350:

...(117 bytes skipped)...-L_x$ planes, following the same format as the SZ$-T_x$ scaling relations presented in Section \ref{analysis-SZ_T_scaling}.

358:

\section{The X-ray Sunyaev-Zel'dovich proxy}\label{analysis-XSZ}

373:

...(265 bytes skipped)...the final values expected from the mass scalings derived from our fiducial models (see Section \ref{analysis-luminosity}). Vertical dotted lines indicate (from left to right) $t_o$ (the time of virial crossi...(267 bytes skipped)...

388:

\subsection{$M_t-Y_x$ relation}\label{analysis-Mt_Yx}

0101:math0101206/analysis1.tex : [ ]

2:

\label{sec:Analysis}

564:

linearization, by elementary complex analysis) on the region mapping

0011:hep-ex0011006/analysis.tex : [ ]

15:

The other two important ingredients for this analysis are the vertex

0805:0805.2493/NonExtAnalysis_Case1111.pdf : [ ]

50:

...(92 bytes skipped)...dc/elements/1.1/' dc:format='application/pdf'><dc:title><rdf:Alt><rdf:li xml:lang='x-default'>NonExtAnalysis_Case1111.fig</rdf:li></rdf:Alt></dc:title><dc:creator><rdf:Seq><rdf:li>root@dhcppc0 \(root\)</rdf:l...(43 bytes skipped)...

62:

/Title(NonExtAnalysis_Case1111.fig)

0503:hep-ph0503295/Chapters/chapter_sm_analysis.tex : [ ]

2:

\chapter{ Standard Model Higgs-boson production \label{ch_sm_analysis}}

8:

Following steps of the analysis are described:

23:

To simplify the description, the analysis is presented in detail for

26:

%and the whole analysis procedure is presented in details.

40:

Expected precisions of the measurement obtained in this analysis are compared with results of our earlier works

62:

...(0 bytes skipped)...polar angle less than $\thetamindet$ can still be formed; they are also ignored in further steps of analysis.

64:

A few values of $\thetamindet$ were considered in the analysis

79:

For the signal process considered in this analysis

107:

%In these analysis \( y_{cut} = 0.02 \) is used.

111:

used in this analysis is based on the approach adopted in the NLO QCD \cite{JikiaAndSoldner} program

154:

it allows us to determine the sensitivity of the analysis to the higher order corrections.

191:

due to the real gluon emissions which are approximated in this analysis by the parton shower algorithm,

203:

%% Only jets with $\ptjetET>0.1$ are considered in the analysis

209:

%% in the subsequent steps of the analysis

219:

%in case of analysis which

516:

%% for analysis with (left) and without \gagahad{} overlaying events (right).

544:

%% %This analysis choice based on simulation and the earlier analyses estimate are indicated.

625:

is significantly wider than for the nominal analysis,

659:

as will be discussed in Chapter \ref{ch_mssm_analysis}.

917:

In the current analysis additional background contributions

922:

%Our earlier analysis assumed a fixed \bbtagging{} efficiency equal to ... .

975:

This correction was introduced in our earlier analysis \cite{NZKhbbm120appb}.

1008:

Thus, the corrected reconstructed invariant mass used for the final analysis was defined as \cite{NZKhbbm120appb}:

1177:

In our analysis the total efficiency for signal events is only about 30\%.

1307:

The background contribution due to $\gagaWW$ production is included in the analysis for \Mheq 150 and 160~GeV.

1370:

better precision is obtained % in this analysis

1384:

Final results of this analysis are compared with our earlier results,

0708:0708.3986/AnalysisMethods/StatisticalAnalysis.tex : [ ]

1:

\subsection{Statistical analysis of intensity distribution}

18:

\ref{fig:StatisticalAnalysis}):

36:

\includegraphics[width=\textwidth]{AnalysisMethods/figs/statistical_part1.eps} \end{minipage}

39:

\includegraphics[angle=90,height=2.57cm]{AnalysisMethods/figs/statistical_part2.eps}

41:

\caption{Ilustration of the statistical analysis method. The left part

45:

\label{fig:StatisticalAnalysis}

0311:hep-ex0311019/analysis_squark.tex : [ ]

10:

%the neural network analysis has already been presented in~\cite{squa2}.

11:

%In addition, a new analysis has been developed to search for stop almost degenerate in

12:

%mass with the LSP. This analysis based on a sequential approach, focused in the region where

16:

%analysis down to $\Delta M = 5~\GeVcc$ and of the degenerate analysis up to

29:

the neural network analysis has already been presented in~\cite{squa}.

30:

This analysis has been extended down to \DM\ = 5~\GeVcc.

31:

In addition, a new analysis based on a sequential cut approach has been developed

33:

2 and 10 \GeVcc. Moreover, this analysis has been extended to \DM\ values up to 20 \GeVcc\

34:

in order to cross-check the non-degenerate analysis.

140:

%networks of the non-degenerate squark analysis.}

153:

analysis windows of the stop and the sbottom searches. The number of

191:

%CTOMThese two cases are still under study, as well as the analysis of the

194:

The current analysis focusses on a stop decaying promptly into a charm

202:

%Indeed this analysis requires

104:

(see section \ref{subsubsec:analysistech}).

0610:nucl-ex0610006/analysis_overview2_e01001.tex : [ ]

7:

\epsfig{file=analysis_e01001.eps,width=4in}

9:

\caption[E01-001 experiment analysis flow chart.]

10:

{E01-001 experiment analysis flow chart.}

0503:hep-ph0503295/Chapters/chapter_mssm_analysis.tex : [ ]

2:

\chapter{ Production of heavy neutral Higgs bosons in the MSSM \label{ch_mssm_analysis}}

6:

The analysis of the MSSM Higgs-bosons production

7:

closely follows the SM study described in Chapter \ref{ch_sm_analysis}.

9:

Therefore only these parts of the analysis which differ from the SM case

14:

The analysis was developed for set \textit{I} of the MSSM parameters,

24:

%For comparison, the analysis was also done for Higgs bosons produced off the luminosity peak.

63:

and the value \thetamindeteq 0.85, used in the SM analysis,

267:

%For comparison, at this stage of analysis we show

392:

Final results of this analysis are compared with our earlier results,

502:

for different parameter sets considered in this analysis

536:

%% The results of this analysis indicate that in ... years of the Photon Collider running

0708:0708.4324/06_sensitivity_analysis.tex : [ ]

2:

\section{Sensitivity Analysis}

6:

Orthoglide. First, a linkage kinematic analysis is used to have a

17:

Analysis} \label{section:linkage-kinematic-analysis}

30:

\label{section:linkage-kinematic-analysis-theory}

148:

\subsubsection{Results of the Linkage Kinematic Analysis}

149:

\label{section:linkage-kinematic-analysis-results}

744:

\ref{section:linkage-kinematic-analysis-results}, the variations in

778:

\label{section:differential-vector-analysis-results}

0610:nucl-ex0610006/analysis_overview1_e01001.tex : [ ]

2:

\section{Analysis Introduction} \label{qeff_intro}

0707:0707.2531/RG_Analysis_Gursey_Model_II_arxiv_v2.tex : [ ]

18:

{Renormalization Group Analysis of a G\" ursey Model Inspired

23:

\title{Renormalization Group Analysis of a G\" ursey Model Inspired

107:

The essential point in our analysis is the factor of $\epsilon$ in

165:

constraint analysis $\grave{a}$ \textit{la} Dirac \cite{di_64}.

292:

finite from dimensional analysis. If the scalar particles are used

334:

order RGE's for these coupling constants, similar to the analysis

432:

In this subsection we will analysis the RGE's in the leading order

528:

Before entering the analysis of the fixed point, we briefly

662:

subsections we will analysis the coupling constant solutions only

671:

$\eta(t)$ is needed before continuing the analysis in $C>A$ case.

0404:physics0404015/Waechter_surface_analysis_2.bbl : [ ]

20:

\newblock Fractal analysis of surface roughness by using spatial data.

64:

\newblock Stochastic analysis of surface roughness.

71:

\newblock Stochastic analysis and regeneration of rough surfaces.

222:

\newblock A note on increment definitions for scale dependent analysis of

0508:cs0508009/Trace_analysis_TR2.tex : [ ]

17:

...(39 bytes skipped)...n of {\it M}obile-user {\it P}atterns {\it A}cross University {\it C}ampuses using WLAN {\it T}race Analysis}

52:

...(190 bytes skipped)... networks, the importance of understanding user behavior in such environments is increasing. First, analysis...(104 bytes skipped)... and aids in developing better management techniques and capacity planning decisions. Second, usage analysis is also a necessary first step towards developing realistic models of usage patterns and mobility m...(295 bytes skipped)...

57:

...(1070 bytes skipped)..., existing university WLANs provide a very good opportunity to collect WLAN usage traces and enable analysis of user behavior.

59:

...(989 bytes skipped)...spects and we expect it to greatly impact future research on realistic and trace-based modeling and analysis of wireless networks.

61:

...(40 bytes skipped)...of metrics to analyze the behavior of individual user and groups of users. From the individual user analysis...(74 bytes skipped)...nderlying environment and campus, but also because of various methods used for trace collection and analysis. In general, one can identify categories of heavy users and light users, and each user tends to ove...(575 bytes skipped)...

137:

\section{Analysis of individual user behavior} \label{user-metric}

615:

...(394 bytes skipped)... hop intelligently. In the future, we intend to work on a message-forwarding mechanism based on our analysis of encounter patterns.

617:

Our robustness and delay analysis of information diffusion over encounter graphs show two interesting points: (1) For message deliver...(432 bytes skipped)...

0312:hep-ph0312323/text/4analysis.tex : [ ]

7:

\section{Global Analysis}

12:

We now describe the global QCD analysis, which includes all relevant

15:

analysis. Several new elements (compared to the latest CTEQ6M \cite{cteq6m}

16:

analysis) are present. On the experimental side, we have added the CDHSW

32:

performed the analysis at the cross section level, applying uniform

41:

$F_2$ and $F_3$ structure function data. In our analysis, the fit to

45:

analysis of \cite{BPZ}), they have no discernible influence on the

49:

in a global QCD analysis is not a straightforward task. The experimental

53:

distribution analysis are the underlying (semi-) inclusive \textquotedblleft

56:

cuts as well as fragmentation and decay models. In our analysis, we use a

128:

of the full NLO CTEQ6 analysis with the addition of constraints due to

142:

of our analysis.\footnote{%

145:

to (\ref{eq:nlo}) in a full NLO global analysis.\ This is under active

152:

Our analysis is carried out in several stages. First we must find

170:

\item[(i)] Most of the data sets used in the previous analysis are not

246:

CCFR-NuTeV dimuon data remains unaltered from the previous CTEQ6M analysis,

264:

global analysis context, the $\chi^2$ value is nevertheless used as the only

345:

error analysis cannot be applied. This reflects the fact that $s^-(x)$ is

360:

with our global analysis in a quantitative way by applying the Lagrange

394:

the global analysis are totally insensitive to $[S^-]$, cf.\,Table 1, hence

398:

analysis (mainly due to the unquantified systematic errors that show up as a

409:

unrealistic in global analysis when combining data sets with diverse

428:

The extensive studies on quantifying uncertainties in the global analysis

432:

analysis, which corresponds to the middle horizontal line in the graph (or

458:

state of global analysis, with precision data from many experiments,

487:

The CCFR-NuTeV dimuon analysis treated the charm mass as one of the fit

498:

parabola in Fig.~\ref{fig:D}. Unlike the specific analysis of CCFR-NuTeV,

499:

the overall $\chi^2$ for the global analysis does favor a lower value of $%

548:

analysis; the results remain to be seen. The limitations on the experimental

0607:physics0607043/AnalysisQDotdecay_2.tex : [ ]

12:

\title{Statistical analysis of time-resolved emission from ensembles of semiconductor quantum dots: interpretation of exponenti...(16 bytes skipped)...

52:

We present a statistical analysis of time-resolved spontaneous

71:

the radiative rates. We apply our analysis to recent examples of

185:

analysis of the models available in the literature. Therefore, we

186:

present in this paper a statistical analysis of time-resolved

210:

reported analysis in terms of lifetimes. We apply our analysis to

315:

Henceforth $\alpha$ will be omitted in our analysis. A comparison

747:

We have presented a statistical analysis of time-resolved

767:

distributions opposes to the usual and widely reported analysis in

768:

terms of distributed lifetimes. We apply our analysis to recent

0404:physics0404015/Waechter_surface_analysis_2.tex : [ ]

10:

\title{Stochastic analysis of different rough surfaces}

39:

With this analysis we achieve a characterization of the scale dependent

47:

the Fokker-Planck equation by pure, parameter-free data analysis. The

51:

The results are compared with those from the analysis of multi-affine and

107:

points which concern stochastic aspects of roughness analysis: First, the

114:

surface roughness analysis which has recently been introduced by us

135:

profile scanner. Preliminary results of the analysis of one of these surfaces

162:

processes which form the basis of our analysis procedure. Details concerning

320:

the scheme from which we will present our analysis of diverse rough surfaces.

352:

images 99 could be used for the analysis presented here, resulting in about

367:

For the analysis in the framework of the theory of Markov processes, we will

384:

\section{Scaling analysis}

388:

investigation. Because most popular methods of surface analysis are based on

391:

analysis based on the theory of Markov processes.

393:

In the analysis presented here we use the well-known \emph{height increment}

444:

It should be noted that the results of any scaling analysis may be influenced

447:

the algorithms used for the analysis \cite{Wendt2002a, Alber1998a}.

583:

Generalized scaling analysis of the surfaces shown in

709:

respective data set but also on the analysis procedure. Using other measures

757:

\subsection{Conclusions on scaling analysis}

760:

To conclude the scaling analysis of our examples, we have chosen surfaces with

763:

Road~5 and Crack. The generalized scaling analysis, analogous to ESS

774:

equation. Consequently, the first step in the analysis procedure has to be the

1035:

As mentioned in section~\ref{sec:Markov_theory} our analysis is based on the

1392:

rather than multi-affinity and is confirmed by the scaling analysis in

1437:

multiscaling analysis becomes clear, which analyses higher moments $\langle

1672:

For the analysis and characterization of surface roughness we have presented a

1686:

features of the scaling analysis are included, and beyond that a deeper

0801:0801.3806/symmetry_analysis.tex : [ ]

105:

single symmetry analysis of the equations of motion.

116:

considerably extend a previous analysis~\cite{flach} that

251:

classical case we frame this analysis in phase space and adopt

380:

analysis. The average over $\alpha$ is sufficient to obviate any

382:

ergodicity assumption in the purely classical analysis of

431:

Other temporal symmetries of the field exist but play no role in this analysis since they do not lead to invariance transformations that change the sign of the position and/or mo...(17 bytes skipped)...

622:

through a single space-time symmetry analysis of the equations of motion.

631:

\bibliography{symmetry_analysis}

0805:0805.2493/NonExtAnalysis_Case1111.pdf_t : [ ]

2:

\includegraphics{NonExtAnalysis_Case1111.pdf}%

0706:0706.3068/iso_analysis.tex : [ ]

259:

\subtitle{Data Reduction and Analysis\thanks{Table 4 is only available in

299:

a companion analysis to \citet{rocca07} where the $12\,\um$ faint galaxy

344:

calculating the true flux density of these objects. A detailed analysis of

349:

The results of this analysis,

353:

reasonable consistency with a further analysis of

369:

full analysis of the history of each pixel and much simulation.

405:

astrometry (\sct 2.2). This analysis is followed by the flux density

487:

the \ISOCAM Interactive Users Analysis System, called CIA \citep{Ott97}.

684:

The following analysis uses a series of colour-colour diagrams and

807:

To extend the analysis to objects too faint to be detected by

889:

in this area of sky that its effect on the current analysis is small,

1288:

limit of $0.24$mJy. A complete analysis of the \ISOCAMc-ESS

1360:

Massachusetts and the Infrared Processing and Analysis

1502:

Astronomical Data Analysis Software and Systems VI, ed. G.~{Hunt} \&

0310:quant-ph0310006/PA_He_analysis.tex : [ ]

16:

\title{Analysis of Photoassociation Spectra for Giant Helium Dimers.}

40:

We perform a theoretical analysis to interpret the spectra of purely

0402:cond-mat0402654/RiskAnalysis.tex : [ ]

17:

\title{Value-at-Risk and Tsallis statistics: risk analysis of the aerospace sector}

138:

As usual, we considered in our analysis the time evolution of

234:

\section{Risk Analysis}

402:

\bibitem{RamosNA} F.M. Ramos, R.R. Rosa, C. Rodrigues Neto, J.A. Bolzan, L.D.A. S\'a, NonLinear Analysis 47,3521 (2001).

406:

\bibitem{Holton} G.A. Holton, Contigency Analysis, Working Papers http://econwpa.wustl.edu/eps/mhet/papers/0207/0207001.pdf (2002).

0708:0708.4324/06_sensitivity_analysis_part1.tex : [ ]

2:

\section{Sensitivity Analysis}

6:

Orthoglide. First, a linkage kinematic analysis is used to have a

16:

\subsection{Linkage Kinematic Analysis} \label{section:linkage-kinematic-analysis}

29:

\label{section:linkage-kinematic-analysis-theory}

156:

\subsubsection{Results of the Linkage Kinematic Analysis}

157:

\label{section:linkage-kinematic-analysis-results}

0801:0801.2500/chap3_quantanalysis.tex : [ ]

1:

\section{Quantitative analysis of density distributions}

2:

\label{c:analysis}

7:

cold atom systems comes from the analysis of such images. They

228:

\includegraphics[width=4in]{figs_quantanalysis/phasediagram.eps}

815:

\includegraphics[width=3in]{figs_quantanalysis/gamma.eps}

916:

\includegraphics[width=3in]{figs_quantanalysis/aspect.eps}

924:

\includegraphics[width=3in]{figs_quantanalysis/velplot.eps}

1242:

\includegraphics[width=5.3in]{figs_quantanalysis/dilemma.eps}

0708:0708.3986/AnalysisMethods/figs/split_pseudo_voigt_all.pstex : [ ]

99:

% Begin Imported EPS File: /home/boj/phd/thesis/AnalysisMethods/figs/split_pseudo.eps

100:

%%BeginDocument: /home/boj/phd/thesis/AnalysisMethods/figs/split_pseudo.eps

367:

% End Imported PIC File: /home/boj/phd/thesis/AnalysisMethods/figs/split_pseudo.eps

0708:0708.3986/AnalysisMethods/figs/split_pseudo_voigt_all.pstex_t : [ ]

2:

\includegraphics{AnalysisMethods/figs/split_pseudo_voigt_all.pstex}%

0708:0708.4324/06_sensitivity_analysis_part2.tex : [ ]

6:

In this section, we perfect a sensitivity analysis method of the

360:

\ref{section:linkage-kinematic-analysis-results}, variations in

394:

\label{section:differential-vector-analysis-results}

0311:hep-ex0311019/analysis_slepton.tex : [ ]

31:

%%were retained for further analysis.

39:

were retained for further analysis.

107:

are in kinematic regions rejected in the next step of the analysis).

129:

\input{analysis_hmstaus}

0503:quant-ph0503202/analysis_phase_estimation.tex : [ ]

3:

%% analysis_phase_estimation.tex %%

76:

As mentioned in Subsection~\ref{sec:analysis_second},

91:

\label{sec:analysis_semi-classical}

0708:0708.4324/06_sensitivity_analysis_part2_2.tex : [ ]

6:

In this section, we perfect a sensitivity analysis method of the

360:

\ref{section:linkage-kinematic-analysis-results}, variations in

466:

\label{section:differential-vector-analysis-results}

0702:nucl-th0702004/Hades_C+C_2GeV_analysis_thomere.tex : [ ]

81:

\title{Analysis of Dilepton Invariant Mass Spectrum in C+C at 2 and 1 AGeV}

190:

quark phase is beyond reach as the analysis of many other observables has

442:

and $\pi N$ data in a coupled channel analysis \cite{lutz,mos}.

950:

production at this energy, but the analysis of the subthreshold kaon

0508:hep-ex0508053/data-analysis-1st/doc.tex : [ ]

42:

\includegraphics[scale=0.35]{data-analysis-1st/fla.eps}

0806:0806.3881/functional-analysis.tex : [ ]

4:

\chapter{Some functional analysis}

5:

\label{sec:functional-analysis}

7:

...(9 bytes skipped)...s presentation addresses disparate audiences, we found it helpful to organize tools from functional analysis and the theory of unbounded operators in appendix sections. The reader may find the references \cit...(49 bytes skipped)...

0508:hep-ex0508053/data-analysis-2nd/doc.tex : [ ]

28:

\includegraphics[scale=0.4]{./data-analysis-2nd/gringo.eps}

64:

\includegraphics[scale=0.4]{./data-analysis-2nd/patlik.eps}

82:

\includegraphics[scale=0.4]{./data-analysis-2nd/cluscut.eps}

0709:0709.4492/arXivNewProofAnalysis4.bbl : [ ]

19:

G.~B. Folland, \emph{Real analysis: modern techniques and their applications},

31:

E.~Hewitt and K.~Stromberg, \emph{Real and abstract analysis}, Springer-Verlag,

35:

E.~Hille, \emph{Analysis, {V}olume {II}}, Blaisdell Publishing Company, 1966.

44:

\bibitem{LangAnalysisII}

45:

S.~Lang, \emph{Analysis {II}}, Addison-Wesley Publishing Company, Inc., 1969.

52:

H.~L. Royden, \emph{Real analysis}, third ed., Macmillan Publishing Company,

67:

analysis}, Prentice-Hall, Inc., 2001.

0311:hep-ex0311019/analysis_hmstaus.tex : [ ]

55:

Beyond this point, the analysis differed depending on

139:

At this stage of the analysis,

180:

stage of the analysis about 99 \% of the events

257:

analysis described in the previous section looses its efficiency for stau

270:

%analysis described in the previous section loses its efficiency for stau

278:

%\cite{slep}, and the large mass analysis can exclude

285:

referred to as the ``very small mass analysis'',

290:

the ``small mass analysis''

291:

(the large mass analysis shows good sensitivity for

0302:cond-mat0302033/entropyanalysisp.tex : [ ]

13:

\title{Entropy Analysis of Stochastic Processes at Finite Resolution}

56:

we propose a method for entropy analysis of arbitrary complex time

62:

information-theoretical arguments, applied to the analysis of

153:

our analysis the transform \(f\rightarrow f-\left\langle

319:

time-scale analysis. Considering such phenomena as fluid or scalar

335:

FIG.~\ref{fig:coefstable}. What we learn from the fBm analysis

341:

published soon) in three situations: In the analysis of the sound

342:

of lungs, in the analysis of heart beat series, and in the

343:

analysis of global positioning system errors caused by equatorial

400:

\emph{Multiscale Entropy Analysis of Complex Physiologic Time

0709:0709.4492/arXivNewProofAnalysis4.tex : [ ]

61:

\title[New proofs and improvements]{New proofs and improvements of classical theorems in analysis}

83:

New proofs and improvements of three classical theorems in analysis are presented. Although these theorems are well-known, and have been extensively investigated over...(865 bytes skipped)...

88:

In this note we present new proofs and improvements of three classical theorems in analysis. Although these theorems are well-known, and have been extensively investigated over the years, it ...(42 bytes skipped)...

97:

\cite[pp. 273-274]{Hille}, \cite[pp. 19-20]{Jones}, \cite[p. 193]{Kitchen}, \cite[pp. 33-34]{LangAnalysisII}, \cite[p. 168-169]{Nitecki}, \cite[pp. 48-49, 157]{Royden}, \cite[p. 91]{Rudin}, \cite[p. 114]{...(594 bytes skipped)...

0806:0806.0472/Empiricalanalysisoftheworldwidecontainernetwork.tex : [ ]

55:

\title{Empirical analysis of the worldwide maritime transportation network}

618:

weighted analysis provides us a different picture. We can see that

686:

analysis \cite{Wasserman}: degree and betweenness. The most

815:

Based on the analysis of weighted cluster coefficient and weighted

914:

analysis, Cambridge University Press, Cambridege, 1994.

0805:0805.3646/Analysis_mSR_FLL_110209.tex : [ ]

60:

A detailed analysis of muon-spin rotation ($\mu$SR) spectra in the vortex state of type-II superconductors using differ...(387 bytes skipped)...

61:

The analysis of the simulated $\mu$SR spectra showed that at high magnetic fields there is a strong correlation...(377 bytes skipped)...

125:

In the first part we briefly describe the models often used for the analysis of $\mu$SR spectra:

145:

In the second part of the paper we present a systematic analysis of

150:

fit. This implies that an analysis of $\mu$SR data using this approach, without taking into account these

175:

\section{Models for data analysis}

217:

...(266 bytes skipped)...th different cut off factors) provide the simplest and fastest way to calculate $P_{id}(B)$ for the analysis of $\mu$SR data for $\kappa \gg 1$ \cite{Sonier00RMP}. Better approximations of $P_{id}(B)$ for sma...(813 bytes skipped)...

314:

In this section we concentrate on the analysis of the shape of $P(B)$ given in Eq.~(\ref{EqConvolution}) as a function of penetration depth $\lamb...(217 bytes skipped)...

507:

...(223 bytes skipped)...ing temperature (1/$\xi^2 \propto B_{c2}$; $1/\xi^2 \propto 1/\lambda^2$ at constant $\kappa$), the analysis of the $\mu$SR spectra for $B = 5$~T makes sense only up to 21~K where $B_{c2}(21K) \approx \langle...(308 bytes skipped)...

523:

For the analysis of the simulated $\mu$SR spectra, $P(t)$ in Eq.~(\ref{eq:multi-gauss}) was approximated by a sum of...(1305 bytes skipped)...

525:

The result of the analysis of the simulated $\mu$SR time spectra for an ideal FLL is shown in Fig.~\ref{fig:SMzeroSigma1}. Fo...(1127 bytes skipped)...

556:

...(997 bytes skipped)... = 0.5$~T, $T = 1$~K of Fig.~\ref{fig:multiGssTdep}) and the reconstructed $P(B)$ obtained from the analysis of the simulated $\mu$SR spectrum (2$\times10^{7}$ statistics) using a Gaussian fit with $N = 3$. I...(1307 bytes skipped)...

636:

...(1606 bytes skipped)... to extract both of them simultaneously if $\xi$ is fixed. This agrees well with the results of the analysis performed in Sec.~\ref{sec:TestOfLGm}.

642:

...(1134 bytes skipped)...sier to extract $\xi$ from the fits. As before the statistics was $20\cdot 10^6$. The result of the analysis...(619 bytes skipped)...CorrLambdXi}). It should be noted that for such a high reduced field $b = 0.5$ as used here for the analysis, the qualitative dependence of the characteristic fields $\delta B_{\alpha}$ on $\lambda$, $\xi$, a...(298 bytes skipped)...

656:

...(263 bytes skipped)...ecreasing field, the vortex core volume substantially reduces which is disadvantageous for the data analysis...(246 bytes skipped)...~mT, 20 million statistics, and $b_0 = 0.004$, 0.02, and 0.1. This corresponds approximately to the analysis...(42 bytes skipped).... There is a substantial correlation between $\lambda$ and $\xi$ at all fields. For $b_0 = 0.1$ the analysis yields $\xi = 4(1)$~nm (correlated with $\lambda$), for $b_0 = 0.02$ only an upper limit of $\xi \s...(1204 bytes skipped)...

664:

...(462 bytes skipped)...this is independent of the value of $\kappa$ and the model used. It is important to add that in our analysis of the $\mu$SR data by the advanced models, we used the same model for the simulations and the analysis, what reduces systematic errors to a minimum.

665:

...(140 bytes skipped)...erconductors, such as the cuprate superconductors. In this case additional difficulties in the data analysis are expected.

666:

In the analysis of the $\mu$SR spectra in section~5 we did not consider background signals

677:

We performed an analysis of the line shape of $\mu$SR spectra of type-II superconductors in the mixed state simulated by fou...(902 bytes skipped)...

679:

...(707 bytes skipped)... addition, it was demonstrated that the second moment method (SM), frequently used for $\mu$SR data analysis...(405 bytes skipped)...periments by generating noisy $\mu$SR spectra with known parameters. The results of a comprehensive analysis of these $\mu$SR spectra are in full agreement with the conclusions made above.

712:

\bibitem{Brandt03} Brandt E H 2003 {\it Phys. Rev.} B \textbf{68} 054506 %% Ginzburg Landau analysis

0810:0810.1179/DataAnalysis/dataanalysis.tex : [ ]

4:

\chapter{Data Analysis}

7:

\graphicspath{{DataAnalysis/DataAnalysisFigs/PNG/}{DataAnalysis/DataAnalysisFigs/PDF/}{DataAnalysis/DataAnalysisFigs/}}

9:

\graphicspath{{DataAnalysis/DataAnalysisFigs/EPS/}{DataAnalysis/DataAnalysisFigs/}}

14:

Data analysis in the "Pi of the Sky" experiment consists of on-line and off-line parts.

15:

The on-line data analysis is required to control performance of the detector, but

19:

The off-line data analysis acts on the reduced data. The reduction

23:

Off-line analysis algorithms act on the database, there are several algorithms

27:

The database provides easy data access for broad spectrum of data analysis.

33:

On-line data analysis is required for detector control. The most important

45:

required by on-line analysis algorithm )

190:

rubbish so they are rejected and no further analysis of this image is performed.

193:

cut allows to choose only one pixel of star like object for further analysis.

335:

Optionally they can be saved to database to provide easy access for further analysis.

496:

% /home/8/msok/doc/PHD/DataAnalysis/DataAnalysisFigs/RDOT

1062:

% /home/8/msok/doc/PHD/DataAnalysis/DataAnalysisFigs/bkg

1203:

\section{Off-line data analysis}

1204:

Off-line data analysis acts on data reduced and cataloged to the database.

1222:

Off-line data analysis described in this thesis was performed on data obtained by

1257:

analysis.

1263:

In the "Pi of the Sky" data analysis two photometry procedures are

1622:

data analysis. These fields are recalculated by

2115:

specified night. It performs the analysis of all new objects added to the catalog during analysed

2145:

$P_{avg} < T_{avg}$ it is rejected and skipped from further analysis.

2228:

The synchronization is executed once and all later analysis and inspections of events are

2267:

The nova identification algorithm analysis stars from a given night and

2269:

cataloging program, the algorithm itself analysis $N_{new} \approx 10^4-10^5$ objects, which takes 1-3 hours.

2662:

Depending on the quality of the night, algorithm analysis $N_{star}<10^5$ stars which

2686:

for flare identification used for analysis of the real data.

2798:

The cataloging and data analysis are performed on the remote server. In the

5:

\label{sec_dataanalysis}

0311:hep-ex0311019/analysis_chargino.tex : [ ]

40:

the $\mathcal{L}_{R}$ functions in the present analysis

95:

%This analysis was applied to the data collected by DELPHI in 1999 and 2000.

150:

are similar to the ones used in the analysis of previous data,

38:

($\mathcal{L}_{R}$, see section~\ref{subsubsec:analysistech}) was defined.

62:

The pdf's were then generated as mentioned in section~\ref{subsubsec:analysistech}.}

72:

as described in section~\ref{subsubsec:analysistech},

0804:0804.0889/asymptotic_analysis.tex : [ ]

1:

\chapter{Asymptotic analysis}

3:

\label{asymptotic_analysis}

0706:0706.0823/transportPRvarNanalysis2.ps : [ ]

5:

%%Title: (C:\Dokumente und Einstellungen\Birger Horstmann\Desktop\daten\transportPRvarNanalysis2.EPS)

0110:hep-ph0110168/sec4_analysis.tex : [ ]

1:

\section{THE PHYSICS ANALYSIS TOOLS}

4:

%\label{sec:analysis-data}

8:

\label{sec:analysis-mc}

13:

%\label{sec:analysis-tools}

16:

\label{sec:analysis-vertexing}

21:

\label{sec:analysis-bctag}

26:

\label{sec:analysis-hadronid}

31:

\label{sec:analysis-leptonid}

0608:astro-ph0608560/analysis.tex : [ ]

1:

\section{Qualitative evolution}\label{sec-analysis}

3:

...(432 bytes skipped)...r the discussion of the observability of substructure and relaxation which follows in Sections \ref{analysis-disturbed} and \ref{analysis...(333 bytes skipped)... a specific discussion of each class of transient structure can be found afterwards in Section \ref{analysis-transients}. All quoted times are measured from $t_o$, the moment at which the secondary system tr...(33 bytes skipped)...

5:

\subsection{Evolutionary stages}\label{analysis-generic}

7:

...(223 bytes skipped)...relaxation. Several important times during this progression which we shall refer to throughout our analysis are listed in Table \ref{table-times}.

9:

...(1095 bytes skipped)...entral positive temperature gradient is strongly reduced and its core radius increased. A detailed analysis of these phenomena is presented in the second and third papers of this series \citep[][in preparati...(162 bytes skipped)...

17:

...(585 bytes skipped)...0}$ after $t_{virial}$ and hydrostatic equilibrium at $R_{500}$ after $t_{hydro}$ (see Section \ref{analysis-relaxation}).

24:

\subsection{Evolution of head-on mergers}\label{analysis-head_on}

46:

\subsection{Evolution of off-axis mergers}\label{analysis-off-axis}

52:

...(272 bytes skipped)...f structure resembling cold fronts can be created. Additional details can be found in Section \ref{analysis-transients} where each of these classes will be studied in detail and new mechanisms involved in th...(60 bytes skipped)...

58:

...(251 bytes skipped)...g portions of the primary and secondary cores has formed in the 1:1 and 3:1 cases (see Section \ref{analysis...(68 bytes skipped)... of cool ($T\sim3$\keV) low-entropy ($S\sim60$\keVcmsq) material have also formed (see Section \ref{analysis-plumes}). These features are not obvious in the system's gas density or surface brightness maps, b...(238 bytes skipped)...

70:

...(319 bytes skipped)...he remnant core as collimated high velocity ($\sim 1000$\kms) streams of material (see Section \ref{analysis...(642 bytes skipped)...ontinuities, or ``edges'' in the system's central surface brightness distribution (see Section \ref{analysis-edges}).

74:

...(403 bytes skipped)...ngated tails are created but the ejection mechanism is not ram pressure stripping (see Section \ref{analysis-plumes}).

86:

\subsection{Core oscillations}\label{analysis-oscillations}

88:

...(412 bytes skipped)...account for ``edges'' observed in the central surface brightness of some clusters (see Section \ref{analysis-edges} for more details and references).

92:

...(593 bytes skipped)... dark matter could act as a source of heating for compact cool cores \citep{Markevitchetal01}. Our analysis suggests that although oscillations may occur on $150$\kpc\ scales, the actively cooling gas on $50...(367 bytes skipped)...

103:

\section{Evolution of disturbed morphology}\label{analysis-disturbed}

110:

...(69 bytes skipped)...se of the merger, the statistic spans the entire range of values found by \citet{OHaraetal05} in an analysis of 45 clusters$^\dagger$.}

118:

\subsection{Simulated observations}\label{analysis-observations}

126:

\subsection{Centroid shifts}\label{analysis-centroids}

160:

...(583 bytes skipped)...for any case. These sustained shifts are due to central dark matter oscillations (see Section \ref{analysis-oscillations}).

205:

...(17 bytes skipped)...or $P_3/P_0$ for instance) when realistic noise is added to simulated X-ray images. Based on their analysis of an observed

275:

Finally, we also applied the power ratio analysis to total projected mass and SZ maps to examine the efficacy of this approach to measuring substruct...(54 bytes skipped)...

283:

...(359 bytes skipped)...ude of the power ratios is relatively low when the system is not highly perturbed (for example, the analysis barely registers 10:1 mergers) and appears to be highly susceptible to noise in the X-ray images. ...(128 bytes skipped)...

286:

as defined by our virial indicator (see Section \ref{analysis-relaxation} and Fig.~\ref{fig-Vg_t}).

291:

\section{Relaxation}\label{analysis-relaxation}

415:

In Section \ref{analysis-disturbed} we found that our merger remnants generally appear relaxed through centroid (our preferr...(133 bytes skipped)...

421:

\section{Transient Structures}\label{analysis-transients}

423:

...(229 bytes skipped)...s of cold-front production have focused primarily on the disruption of the secondary's core but our analysis reveals that both cores can be involved. Several other transient phenomena such as core surface br...(293 bytes skipped)...

425:

\subsection{Bridges}\label{analysis-bridges}

444:

As discussed in Section \ref{analysis-off-axis}, material stripped by ram pressure from the interacting clusters becomes dispersed, formi...(441 bytes skipped)...

450:

\subsection{Plumes}\label{analysis-plumes}

452:

In Section \ref{analysis-off-axis} we noted that in all of the off-axis cases we have studied, outwardly propagating collima...(608 bytes skipped)...

460:

...(705 bytes skipped)...s of high velocity material over an extended period lasting well after \taccrete\ (see Section \ref{analysis-streams}).

476:

\subsection{Induced core rotation}\label{analysis-rotation}

482:

\subsection{Streams}\label{analysis-streams}

498:

The plumes of material removed from the cores of merging clusters discussed in Section \ref{analysis-plumes} collect into large collimated structures. Because of the reduced entropy of this material,...(579 bytes skipped)...

510:

\subsection{Edges}\label{analysis-edges}

514:

Occasionally when the streams discussed in Section \ref{analysis-streams} accrete to the centre of the remnant, an interface forms between it and the stationary cor...(155 bytes skipped)...

531:

In Section \ref{analysis-streams} we noted several systems which show evidence of streams of radially collimated material. ...(626 bytes skipped)...

0807:0807.1905/figures/mode_analysis_pub_1.tex : [ ]

87:

\put(0,0){\includegraphics{../figures/mode_analysis_pub_1}}%

0008:quant-ph0008122/epranalysis.tex : [ ]

549:

analysis of single photon polarization in section \ref{sec:postulate}

0508:hep-ex0508053/data-analysis-gamcut/doc.tex : [ ]

27:

% \includegraphics[width=4.2cm]{./data-analysis-gamcut/effwall65mev.eps}

28:

% \includegraphics[width=4.2cm]{./data-analysis-gamcut/effwall50-65mev.eps}

29:

\includegraphics[scale=0.45]{./data-analysis-gamcut/effwall.eps}

60:

\includegraphics[scale=0.45]{./data-analysis-gamcut/gamver.eps}

72:

\includegraphics[scale=0.38]{./data-analysis-gamcut/gamdir.eps}

0508:hep-ex0508053/data-analysis-spacut/doc.tex : [ ]

58:

\includegraphics[scale=0.46]{./data-analysis-spacut/dl_lkh.eps}

90:

\includegraphics{./data-analysis-spacut/dt.eps}

143:

% \includegraphics[scale=0.21]{./data-analysis-spacut/spaq1.eps}

144:

% \includegraphics[scale=0.21]{./data-analysis-spacut/spaq2.eps}

145:

\includegraphics[scale=0.44]{./data-analysis-spacut/spaq.eps}

178:

\includegraphics[width=4.2cm,clip]{./data-analysis-spacut/likemax3.epsi}

179:

\includegraphics[width=4.0cm,clip]{./data-analysis-spacut/likemax2.epsi}

190:

\includegraphics[scale=0.44]{./data-analysis-spacut/deadtime.eps}

0312:hep-ph0312323/text/4analysis.tex.bak : [ ]

7:

\section{Global Analysis}

12:

We now describe the global QCD analysis, which includes all relevant

15:

analysis. Several new elements (compared to the latest CTEQ6M \cite{cteq6m}

16:

analysis) are present. On the experimental side, we have added the CDHSW

32:

performed the analysis at the cross section level, applying uniform

41:

$F_2$ and $F_3$ structure function data. In our analysis, the fit to

45:

analysis of \cite{BPZ}), they have no discernible influence on the

49:

in a global QCD analysis is not a straightforward task. The experimental

53:

distribution analysis are the underlying (semi-) inclusive \textquotedblleft

56:

cuts as well as fragmentation and decay models. In our analysis, we use a

128:

of the full NLO CTEQ6 analysis with the addition of constraints due to

142:

of our analysis.\footnote{%

145:

to (\ref{eq:nlo}) in a full NLO global analysis.\ This is under active

152:

Our analysis is carried out in several stages. First we must find

170:

\item[(i)] Most of the data sets used in the previous analysis are not

246:

CCFR-NuTeV dimuon data remains unaltered from the previous CTEQ6M analysis,

264:

global analysis context, the $\chi^2$ value is nevertheless used as the only

345:

error analysis cannot be applied. This reflects the fact that $s^-(x)$ is

360:

with our global analysis in a quantitative way by applying the Lagrange

394:

the global analysis are totally insensitive to $[S^-]$, cf.\,Table 1, hence

398:

analysis (mainly due to the unquantified systematic errors that show up as a

409:

unrealistic in global analysis when combining data sets with diverse

428:

The extensive studies on quantifying uncertainties in the global analysis

432:

analysis, which corresponds to the middle horizontal line in the graph (or

458:

state of global analysis, with precision data from many experiments,

487:

The CCFR-NuTeV dimuon analysis treated the charm mass as one of the fit

498:

parabola in Fig.~\ref{fig:D}. Unlike the specific analysis of CCFR-NuTeV,

499:

the overall $\chi^2$ for the global analysis does favor a lower value of $%

548:

analysis; the results remain to be seen. The limitations on the experimental

0410:hep-ex0410041/analysis_overview.tex : [ ]

44:

The colliding beam data used in this analysis were recorded during the

57:

%used in the analysis.

64:

analysis amounts to $162 \pm 10~{\rm pb}^{-1}$ for CEM electrons and CMUP muons,

67:

For the primary data samples used in this analysis, the detector is

0508:hep-ex0508053/data-analysis-summary/doc.tex : [ ]

13:

\includegraphics{./data-analysis-summary/mceff.eps}

24:

\includegraphics{./data-analysis-summary/redstep.eps}

0501:cs0501069/analysis-internode.tex : [ ]

22:

%expressed in a number of different ways. In \cite{nowell02analysis},

28:

%and a ``per-network'' rate. For example in \cite{nowell02analysis},

30:

%simulations and analysis we use per-node rates for both joins and

33:

...(88 bytes skipped)...he rate of failures per node and $\lambda_s$ the rate of stabilizations per node. We carry out our analysis

47:

...(38 bytes skipped)... discrete event simulation environment implemented in Java which can be retrieved from \cite{ansary:analysis}. We assume the familiarity of the reader with Chord, however an exact analysis necessitates the provision of a few details. Successor stabilizations performed by a node $n$ on $n...(354 bytes skipped)...

59:

\section{The Analysis}

63:

...(66 bytes skipped)...keys of two consecutive nodes) is a fluctuating variable. An important quantity used throughout the analysis is the

66:

which are needed in the ensuing analysis...(20 bytes skipped)...ations, we omit the proof of this theorem and the properties here and provide them in \cite{ansary:analysis}.

172:

%We now derive some properties of this distribution which will be used in the ensuing analysis.

0807:0807.2108/Sections/S5_DD_Stability_Analysis.tex : [ ]

2:

% Section: Stability analysis ;

4:

\section{STABILITY ANALYSIS}

5:

\label{Sec:DD_S4_Stability_Analysis}

157:

For stability analysis, one assumes the externally applied forces to be zero (i.e.,

287:

algorithms. We employ the standard notation used in mathematical analysis. To avoid

441:

This completes the stability analysis of the $\boldsymbol{d}$-continuity method.

475:

bounded. This completes the stability analysis of the modified $\boldsymbol{d}$-continuity method.

518:

(and as usual neglecting the external forcing function for stability analysis \cite{Hughes}; i.e.,

652:

We start the stability analysis by rewriting the kinematic constraints. To this end,

886:

positive semidefinite (which we have assumed in the stability analysis of this method, see

0311:hep-ex0311019/analysis_neutralino.tex : [ ]

79:

\underline{Likelihood Ratio analysis}

84:

The first step of the analysis was to preselect the events dividing them into

122:

%PJKH at this stage of the analysis are summarised in table

192:

In the last step of the analysis, for each of the 15 windows

214:

%KH As in the chargino analysis, the value of

241:

\underline{Sequential analysis}

245:

This analysis was used as a cross-check of the likelihood ratio

255:

%KH $d_{\mathrm join}\!=\!10~\GeVc$ (see section~\ref{sec:analysis})

283:

%PJThe numbers of events selected at the final step of the analysis at the

288:

%PJto be comparable. The sequential analysis was less performant

404:

analysis, but required

460:

%KH and does not impact on the results of this analysis.

464:

fully corrected for at the time of this analysis. The phase space

466:

selection, and the excess has no impact on the analysis results.

504:

%PJKH steps of the analysis at the various centre-of-mass energies are given

211:

sections \ref{subsubsec:analysistech} and \ref{sub:CHASEL}, and

0710:0710.0386/analysis-appendix.tex : [ ]

6:

...(132 bytes skipped)...al analyses done, albeit less frequently. For instance, Liben-Nowell \textit{et al.} \cite{nowell02analysis} prove a lower bound on the

18:

analysis of physical systems. We have previously introduced our approach in

20:

a detailed analysis of the Chord system \cite{chord:ton}.

38:

this analysis to Appendix \ref{A1}. In section \ref{correction-on-change},

96:

how many pointers a node has on average). The analysis was done for a specific

113:

In \cite{aberer04tok}, an analysis, very similar in spirit to the one done in this paper, is carried out in

116:

the analysis has to be entirely redone. In contrast, a master equation description

117:

provides a foundation for the theoretical analysis of overlays,

119:

As we show in this paper, we can carry over a lot of our earlier analysis, when the maintenance scheme

177:

For the purposes of the analysis,

342:

base $b$. Thirdly, the analysis confirms that Equation \ref{eq:cost}

351:

%An added benefit of the analysis is

377:

The values of $A$ used are derived from the analysis of the previous section.

455:

However to keep the analysis simple (and in keeping with the

456:

spirit of our analysis of the periodic stabilisation scheme), we assume that

518:

\subsection{Analysis of the Correction-on-change strategy }

519:

\label{analysis}

521:

To generalise the analysis to meet the situation when some

611:

in our analysis is

839:

Our analysis can take into account most details of the

842:

There are several directions in which we can extend the present analysis.

1050:

far, we have considered in this analysis base-$2$ Chord. We can likewise

1051:

carry out this analysis for any base.

0509:hep-ph0509021/Factanalysis_final.tex : [ ]

144:

Analysis in Heavy Quarkonium Production}

317:

Eq.\ (\ref{combofact}), which will simplify our analysis

369:

The analysis of hard scattering cross sections begins with

497:

analysis in the neighborhood an arbitrary

790:

Rather, for this analysis to hold it is only necessary

1231:

our analysis in the rest frame of the

1601:

In the spirit of NRQCD analysis, and because it leads

3322:

So far our analysis has involved infrared

3325:

$mv$. Such a higher-order analysis will also require

3338:

provide a theoretical grounding for the analysis of the

0710:0710.0270/analysis-fof_jan25.tex : [ ]

21:

independently of each other to simplify the analysis.

0807:0807.3288/ArxivTheAnalysisofRotatedVectorFieldforthependulumEquation.tex : [ ]

4:

%\rm The Analysis of Vector Field for the pendulum Equation}

44:

\title{\textbf{\Large The analysis of rotated vector field on the pendulum

116:

analysis, it is found that if the $\gamma$ is bigger enough (over damping),

155:

following analysis.

196:

But it is not the subject of the current analysis.

652:

\bibitem{Li} {\small Li L.G., Ruan Y.F., The analysis on the classic model

0501:cs0501069/analysis-successors.tex : [ ]

37:

only $s_1$ here. %( We derive similar relations for $s_k, k >1$ in \cite{ansary:analysis}).

40:

%say from the ring?)). In our analysis, we consider only the case where $P_{nb}=1$. This is achieved by setting the length

0807:0807.2108/Sections/S5_DD_Stability_Analysis_July_13_2008.tex : [ ]

2:

% Section: Stability analysis ;

4:

\section{STABILITY ANALYSIS}

5:

\label{Sec:DD_S4_Stability_Analysis}

157:

For stability analysis, one assumes the externally applied forces to be zero (i.e.,

235:

algorithms. We employ the standard notation used in mathematical analysis. To avoid

389:

This completes the stability analysis of the $\boldsymbol{d}$-continuity method.

423:

bounded. This completes the stability analysis of the modified $\boldsymbol{d}$-continuity method.

465:

(and as usual neglecting the external forcing function for stability analysis \cite{Hughes}; i.e.,

544:

We start the stability analysis by rewriting the kinematic constraints. To this end,

772:

positive semidefinite (which we have assumed in the stability analysis of this method, see

0512:math0512286/analysis.tex : [ ]

2:

\label{sec:Analysis}

0805:0805.1242/analysis_thin_films/analysis_thin_films.tex : [ ]

2:

\chapter{Nonlinear dynamics of phase separation in ultra-thin films: Analysis}

3:

\label{ch:analysis_thin_films}

6:

\label{sec:analysis_thin_films:overview}

744:

\label{eq:analysis_thin_films:model}%

960:

\label{sec:analysis_thin_films:existence}

2134:

\label{sec:analysis_thin_films:regularity}

2568:

\label{sec:analysis:thin_films:uniqueness}

2842:

Using the results of Sec.~\ref{sec:analysis_thin_films:regularity}, it is

2859:

\label{sec:analysis_thin_films:conclusionos}

2870:

analysis yields many precise

0707:0707.0878/Risk_Analysis_TCS_2004.tex : [ ]

161:

\title{{\bf Risk Analysis in Robust Control --- Making the Case for

191:

presentation is based on case analysis. We first establish that

200:

significantly more risky. Finally, we join our analysis with existing results

202:

worst-case analysis is not necessarily the better tool.

220:

deterministic worst-case approach remains dominating for design and analysis

818:

design and analysis is subject to a level of risk. The goal of design

1319:

algorithms for robustness analysis,'' {\it Mathematics of Control,

1330:

rigorous justification for its use in robustness analysis,'' {\it

1373:

algorithms for robustness analysis,'' {\it Proceedings IEEE

1378:

``Constrained robustness analysis and synthesis by randomized

1414:

control analysis and synthesis have polynomial complexity,'' {\it

1473:

analysis of control systems robustness,'' {\it Automatica}, vol.

1478:

analysis for systems containing complexity,'' {\it Proceedings of

1497:

for Analysis and Control of Uncertain Systems}, Springer-Verlag,

1502:

analysis: explicit bounds for the minimum number of samples,''

0811:0811.0210/performance_analysis.tex : [ ]

2:

\section{Performance Analysis}

3:

\label{sec_performance_analysis}

6:

In this section, we present a performance analysis of the proposed

0705:0705.0306/gluino_analysis_prl_p14.tex : [ ]

36:

bunch crossing. We apply the analysis to the gluino ($\tilde g$),

118:

neutralino, $\tilde{\chi}_1^0$. The analysis has slightly reduced

138:

%parameters, but these decays will be ignored. The analysis

0311:hep-ex0311019/figures_squarks_analysis.tex : [ ]

12:

non-degenerate squark analysis. Plots include all DELPHI data from 189 to 208

36:

in the non-degenerate squark analysis:

37:

(a) 1998 data at 189~\GeV: stop analysis for $\DM >20~\GeVcc$,

38:

(b) 1999 data from 192 to 202~\GeV: sbottom analysis for $\DM >20~\GeVcc$,

40:

stop analysis for $5 \leq \DM \leq 20~\GeVcc$,

41:

(d) 2000 data with TPC sector 6 on: sbottom analysis for $5 \leq \DM \leq 20~\GeVcc$. The efficiencies are for a given combination of squark and LSP ma...(5 bytes skipped)...

61:

nearly degenerate squark analysis at preselection and final selection

0809:0809.2682/pioneerdataanalysis_correc.tex : [ ]

17:

\title{Pioneer 10 Doppler data analysis: disentangling periodic and secular anomalies }

32:

This paper reports the results of an analysis of the Doppler tracking data

34:

A software has been developed for the sake of performing a data analysis as independent as possible

36:

A first output of this new analysis is a confirmation of the existence of a secular anomaly

64:

The extensive analysis by the JPL team has been published after years of cross checks~\citep{anderson}.

65:

The presence of an anomaly and its magnitude have been confirmed by different analysis software \citep{markwardt,olsen}.

76:

Crucial informations are expected to come out from the re-analysis of Pioneer data

85:

The aim of the present paper is to report some results of the analysis of these data

122:

...(4 bytes skipped)...here are terms in $E$. This system is then solved in ODYSSEY with classical iterative least squares analysis.

125:

...(8 bytes skipped)...s of the maneuvers are provided by JPL and their amplitudes estimated as parameters in the best fit analysis.

140:

In its present status, the data analysis does not take into account the detailed thermal models of the spacecraft,

144:

Improved analysis of this important issue will only be possible when accurate enough models of

206:

The analysis performed with the software ODYSSEY confirms that a better fit is obtained with a constant sunward ...(14 bytes skipped)...

249:

In order to characterize the periodic variations of the residuals, we have performed a spectral analysis of the postfit residuals.

250:

...(18 bytes skipped)...a points are not evenly distributed, the commonly used Fourier transform is not appropriate for the analysis.

252:

The result of this spectral analysis is shown on Fig.~\ref{figure5}.

319:

best analysis without modulated terms.

334:

was in fact not detected in the spectral analysis of the best fit residuals with only a secular anomaly.

340:

seem to have robust estimates, while $\upsilon_1$ is less stable. The analysis of the correlation shows a large value between $\upsilon_1$ and the initial conditions (0.814 compa...(273 bytes skipped)...

342:

An even more impressive demonstration of the improvement of the data analysis drawn

343:

by the inclusion of modulated terms comes from the spectral analysis of the residuals.

344:

This spectral analysis is represented on Fig.~\ref{figure6} for the best fit with

352:

\caption{SparSpec analysis of the residuals from the fit with a constant acceleration.\label{figure5}}

356:

\caption{SparSpec analysis of the residuals from the fit with a constant acceleration and periodic terms.\label{figure6}}

361:

In the present paper, we have reported the first results of our re-analysis

366:

has been confirmed by this new data analysis. Its magnitude is compatible with

371:

analysis.

381:

At the present stage of the data analysis, similar effects could for example be obtained

388:

The most impressive output of the new analysis is given by the SparSpec analysis of the best fit residuals

393:

This suggests that the new analysis constitutes a richer characterization of the Pioneer data,

0807:0807.1905/figures/xxx.svn/text-base/mode_analysis_pub_3.tex.svn-base : [ ]

82:

\put(0,0){\includegraphics{../figures/mode_analysis_pub_3}}%

0710:0710.0192/fig_dd_conv_analysis.tex : [ ]

14:

\includegraphics[viewport= 90 10 880 300, width=14cm, clip]{./figures/dd_conv_analysis.eps}

18:

\label{fig:convergence-analysis}

0807:0807.1905/figures/xxx.svn/text-base/mode_analysis_pub_2.tex.svn-base : [ ]

87:

\put(0,0){\includegraphics{../figures/mode_analysis_pub_2}}%

0806:0806.2533/asymptotic_las_analysis_arXiv_ver2_d1.tex : [ ]

26:

\title{\LARGE Asymptotic Analysis of the Performance of LAS

52:

maximum-likelihood (ML) performance through simulations, no BER analysis

54:

analysis of the LAS algorithm in the large system limit, where

96:

studied through simulations. However, BER performance analysis of the LAS

99:

BER analysis of the LAS algorithm in the large system limit, where

102:

performance analysis of large systems in the context of multiuser

108:

analysis of the LAS algorithm in the large system limit. Specifically,

116:

The asymptotic analysis of the LAS algorithm is presented in Section

320:

\section{Asymptotic Analysis of LAS Algorithm}

702:

mechanics approach employed in \cite{lma3} for large CDMA system BER analysis

703:

can be investigated for such an analysis. $ii)$ While we are able to prove

849:

for the case of $d_pd_q=+1$ (a similar analysis holds for $d_pd_q=-1$).

1206:

T. Tanaka, ``A statistical-mechanics approach to large-system analysis of

0810:0810.4798/AnalysisofFiringBehaviorsinDPCN.tex : [ ]

40:

\title{Analysis of Firing Behaviors in Networks of Pulse-Coupled Oscillators\\

113:

mathematical analysis of collective dynamics of networks becomes a

116:

crucial role in mathematical analysis

122:

times made the analysis easier by reducing the number of case

378:

Numerical analysis shows that from any initial phases, the coupled

460:

The following analysis demonstrates the different synchronization

496:

In summary, our analysis demonstrates different dynamics for

0807:0807.1905/figures/xxx.svn/text-base/mode_analysis_pub_1.tex.svn-base : [ ] Duplicate result
0807:0807.1905/figures/xxx.svn/text-base/mode_analysis_pub_2.eps.svn-base : [ ]

2:

%%Title: ../figures/mode_analysis_pub_2.tex

45:

/Title (../figures/mode_analysis_pub_2.tex)

0108:hep-ph0108207/ANALYSIS/trigger.tex : [ ]

150:

%the analysis (see text). These and several other plots are collected

0807:0807.1905/figures/xxx.svn/text-base/mode_analysis_pub_1.eps.svn-base : [ ]

2:

%%Title: ../figures/mode_analysis_pub_1.tex

45:

/Title (../figures/mode_analysis_pub_1.tex)

0108:hep-ph0108207/ANALYSIS/network.tex : [ ]

2:

We now turn to the more specialized part of the analysis where we shall seek

5:

event shapes associated with each scenario. The results of the analysis are

12:

The first step in any analysis based on

73:

in an ordinary cut-based analysis. The benefit is that neural networks

137:

the present analysis with 14 inputs,

247:

networks used in the final part of the analysis (before brain-damage -- see

0010:math0010314/DGanalysis.tex : [ ]

1:

\section{Analysis} \label{DGsecana}

2:

In this section we discuss two of the basic processes of analysis:

86:

Melrose's Push-Forward Theorem gives the result of this analysis, for the

139:

first-year analysis).

177:

Same proof, after the (non-trivial) analysis argument that our

0311:hep-ex0311019/figures_chargino_analysis.tex : [ ]

40:

standard chargino analysis as a function of the $\mathcal{L}_{R_{CUT}}$ cut in the \jjl\ topology for 25 $\leq$ \DM\ $<$ 35~\...(6 bytes skipped)...

87:

standard chargino analysis as a function of the $\mathcal{L}_{R_{CUT}}$ cut in the \jjl\ topology for 25 $\leq$ \DM\ $<$ 35~\...(6 bytes skipped)...

0807:0807.1905/figures/xxx.svn/text-base/mode_analysis_pub_3.eps.svn-base : [ ]

2:

%%Title: ../figures/mode_analysis_pub_3.tex

45:

/Title (../figures/mode_analysis_pub_3.tex)

0710:0710.0270/analysis-lkpcost_jan25.tex : [ ]

31:

For this analysis, we consider timeouts and hops to add equally

32:

to the cost. We can easily generalize this analysis to investigate the case

49:

the closest preceding finger. For the purposes of the analysis,

154:

in our analysis.

209:

(\ref{eq:cost}) in the zero-churn case. This analysis is rather

216:

taken from this analysis.

243:

%which value provides the best fit. To compare, the qualitative analysis

0108:hep-ph0108207/ANALYSIS/analysis.tex : [ ]

1:

\section{Analysis of ATLAS \LV-SUSY Discovery Potential}

3:

% Points of Analysis

7:

\label{sec:analysis}

35:

we will be using in the analysis. Next, in \ref{sec:trigger} we propose

44:

In \ref{sec:cuts} and \ref{sec:net}, the main part of the analysis is

68:

Lastly, in \ref{sec:results} the results of the cut-based analysis

70:

\subsection{Points of Analysis\label{sec:points}}

105:

analysis in the mSUGRA parameter space.\label{tab:sugrapoints}}

165:

points of analysis in the $\lambda-\lambda'$ parameter space. The

192:

these grounds, the analysis is performed on a selection of points defined by

267:

\input{ANALYSIS/trigger}

269:

We now come to the cut-based analysis. The purpose here

276:

to distinguish between or aim the analysis towards any particular SUSY

283:

cuts should be placed. In a conventional analysis of

285:

a signal can be extracted by adapting the analysis to

288:

respectively, remaining after the analysis. Obviously, this requires

295:

therefore not in a position to optimize the analysis with respect to exactly

296:

quantifiable estimators. Of course, an analysis could be performed and

299:

over-tune the analysis to exactly the points considered, risking

304:

This is the real motivation why the last part of the analysis is done using

333:

neglegible contribution to the background at the end of the analysis,

396:

\caption[\small Numbers of generated SM events for the analysis]{Cross sections

478:

\caption[\small Numbers of generated SUSY events for the analysis]{Cross sections

494:

analysis are shown in tables \ref{tab:ananum_sm} and \ref{tab:ananum_susy}

501:

analysis to give an exampel of the performance of this type of model under the

505:

100\GeV\ were not possible to include in the analysis, since none of the

519:

the trigger analysis. Though these numbers are statistically sound, the

538:

are not included in the analysis. Assuming, pessimistically, that these

542:

affect the conclusions of the analysis.

545:

implemented in the analysis. Generally speaking,

564:

analysis, however, we are looking at the distributions themselves rather than

573:

analysis. This will cause the number of background events to be

579:

signals extracted in the analysis too optimistic. As we shall see, however,

609:

through to the end of the analysis.

730:

analysis further.

762:

combine the analysis here. The lepton multiplicities

873:

variables. This, however, is saved for the neural network analysis below.

879:

inputs in the neural net analysis.

882:

$p_T$'s. In the cut-based analysis,

1403:

\input{ANALYSIS/network}

1454:

coming out of the analysis plus 1.64 standard deviations to account for the

1492:

passing the analysis is too optimistic. To include an estimate of the

1499:

passing the analysis if pile-up was included seems a reasonably pessimistic

1517:

the cut-based analysis over the entire output range is shown in figure

1604:

single sparticle production not included in the present analysis. For a

1641:

the present analysis (in which the

0602:quant-ph0602134/circuit_analysis.tex : [ ]

18:

\title{Circuit analysis of quantum measurement}

876:

In the analysis of continuous-variable systems, we have introduced scaling parameter $\lambda$.

0207:cs0207061/interval_analysis.tex : [ ]

1:

\section{Interval Analysis}

5:

\emph{interval analysis}. Let $G =(V, A, r)$ be a flowgraph, and

194:

\label{thm:ia} The interval analysis algorithm runs in $O(m)$ time

236:

Interval analysis is an important component of program flow

237:

analysis~\cite{aho:dragon2}. It also has other applications,

241:

Our interval analysis algorithm gives $O(m)$-time

0512:hep-th0512267/constraintanalysis.tex : [ ]

55:

Dirac fermions are subjected to constraint analysis. Three first

112:

The FOG action is our starting point for the analysis presented. We

114:

\ref{sec:fermions}. In Sec. \ref{sec:analysis} we will analyse the

123:

It should be noted that a similar analysis has been carried out for

126:

\cite{wal01}. We extend this analysis to the general case of massive,

182:

\section{Hamiltonian Analysis}\label{sec:analysis}

530:

A similar analysis for our case is in preparation

694:

\input{constraintanalysis.bbl.fix}

696:

%\bibliography{constraintanalysis}

0710:0710.0270/analysis-internode_jan25.tex : [ ]

1:

\section{The Analysis}

14:

A detailed analysis along these lines will be given elsewhere.

69:

which will be used in the ensuing analysis.

0706:0706.2520/AnalysisOfTrafficInteractions.tex : [ ]

26:

\title{Analysis of Inter-Domain Traffic Correlations: Random Matrix Theory

56:

concurrent tasks of traffic analysis. The method verifies the uncongested

74:

Network-Wide Traffic Analysis, Random Matrix Theory, Large-Scale Correlations

84:

a consequence, there are two general approaches in analysis of the

86:

the traffic analysis considers the protocols, applications, traffic

101:

of the Renater scientific network. Moreover, the analysis of correlations

114:

more preferable for {}``black box'' analysis. To extract the meaningful

118:

component analysis, singular value decomposition, and factor analysis,

152:

traffic time series interactions analysis. Even though in this particular

156:

VLANs. Nevertheless, this information is irrelevant for our analysis

157:

and acquired only at the interpretation of the analysis results.

161:

the healthy, and free of congestion traffic. The proposed analysis

226:

Component Analysis (PCA) method for centralized network-wide volume

402:

unnecessary sparse. The exclusion does not influence the analysis

533:

is entirely devoted to the analysis of the eigenvalues and eigenvectors

538:

\section{inter-vlan traffic interactions analysis}

686:

The analysis of the significant participants of the deviating eigenvectors

752:

As the analysis of deviating eigenvectors content showed, the highly

955:

analysis is whether the found eigenvalues spectrum correlations and

979:

analysis of Internet is emphasized in \cite{Zhang}. To understand

1008:

using network-wide flow traffic, Proceedings of FloCon 2005 Analysis

1079:

\bibitem{Zhang}B. Zhang, T.S. Eugene Ng, and A. Nandi, Measurement-based analysis,

1082:

\bibitem{Mayya}K.B.K. Mayya and R.E. Amritkar, Analysis of delay correlation matrices,

1084:

\bibitem{Lau}W.-C. Lau, S.-Q. Li, Traffic analysis in large-scale high-speed integrated

1104:

and network traffic analysis \cite{Barthelemy}.

1124:

eigenvalues/eigenvectors analysis seems to be a universally accepted

1157:

proceed with statistical analysis using matrix ensemble for calculation

0806:0806.1089/analysis_evaluation.tex : [ ]

14:

The analysis requires accurate estimations on $LD$ and $b$. The

22:

%\footnotetext{Note that the proposed analysis can easily be

32:

The proposed analysis can also directly be used for buffer sizing

43:

\subsection{Performance Evaluation}\label{subsec:analysis_evaluation}

77:

and the simulation results are well in accordance. The analysis in

104:

%analysis in this paper and in \cite{Pilosof03} for varying number

0811:0811.3617/Background/HighResAnalysis.tex : [ ]

8:

The quantities of fundamental interest in the analysis of companding quantizer

15:

High resolution analysis consists of several approximations

336:

%However, analysis of quantizers through point densities does not rely on

338:

%Under the assumptions of high-resolution analysis,

341:

%to partially generalize the basic analysis to discontinuous functions.

0710:0710.0923/Bayesian_analysis_of_time_trajectories_of_single_RNA.tex : [ ]

42:

\title{Bayesian analysis of time series of single

444:

foundation, which would be left in the analysis of real

457:

Data Analysis} (Chapman and Hall, 1995).

0710:0710.0270/analysis-successors_jan25.tex : [ ]

36:

Another aspect of this system which simplifies analysis is that

45:

This is taken into account in the analysis of second and higher successor

52:

%be pointing to the same node. We take this into account in our analysis.

56:

%the rest of our analysis on successors, fingers and lookup lengths

81:

%in mind that analysis is hence not \textit{exact}.

105:

%( We derive similar relations for $s_k, k >1$ in \cite{ansary:analysis}).

108:

%say from the ring?)). In our analysis, we consider only the case where $P_{nb}=1$. This is achieved by setting the length

305:

starts becoming finite. The master equation analysis

0511:astro-ph0511359/SpitzerGOODSpdAnalysis.bbl : [ ]

70:

\bibitem[\protect\citeauthoryear{{Oliver}}{{Oliver}}{1997}]{ISOpdAnalysis-97}

5:

et~al.}{1994}]{XrayPDAnalysis-94}

42:

{de Zotti}}{{Franceschini} et~al.}{1993}]{XrayPDAnalysis-93}

103:

{Witzel}}{{Wall} et~al.}{1982}]{radioPDAnalysis-82}

0511:astro-ph0511359/SpitzerGOODSpdAnalysis.tex : [ ]

105:

analysis we determine the likely differential faint source counts down

127:

with our fluctuation analysis preferring higher faint number counts.

203:

XrayPDAnalysis-94, ISOpdAnalysis-97}.

218:

In this paper, we present a fluctuation analysis of the Spitzer GOODS survey,

227:

\item{In {\tt section \ref{section:methods}}, we discuss fluctuation analysis, both in general terms and

228:

in detail specific to the analysis presented in this paper.}

229:

\item{In {\tt section \ref{section:analysisResults}}, we present the results of our analyses.}

272:

with the sky; as our analysis considers only the one-point statistics

276:

tests show that our analysis is robust to their effects. We note that

329:

analysis.

342:

In order to carry out a fluctuation analysis, we need a method of

379:

Due to the nature of fluctuation analysis, we pay particular attention

404:

For any analysis such as this, we are aiming to determine the most

437:

For this analysis, we choose uninformative flat priors, so that we are

446:

The information extracted by such an analysis is to be found in

450:

results of our analysis.

452:

The analysis methods we have described in the previous subsections

465:

likelihood (such as are required by methods such as Fisher matrix analysis). The

466:

principal downside is that such an analysis can be computationally

474:

leaves us with over 40,000 samples for each analysis.

477:

for this type of analysis is $10^5$ or more samples), however we were

479:

likelihood values; the analysis for each band took 3-4 weeks on a 3~GHz,

506:

number counts. We note that in each analysis we have removed regions

517:

\section[]{Analysis and results} \label{section:analysisResults}

549:

best-fit model from our fluctuation analysis. \emph{Bright} is the

677:

results of this analysis.}

749:

sources, such as diffuse galactic emission. Fluctuation analysis is

774:

analysis to be robust to this. We

817:

light. One of the great advantages of MCMC analysis is that we can do

822:

integrated background light. The fluctuation analysis presented in

859:

population III stars. While our analysis does not provide information

875:

are all subject to the assumptions we have made in this analysis. Model-wise, We

904:

light is probed by our fluctuation analysis.

957:

\bibliography{../bibtex_files/pd_analysis_refs,../bibtex_files/inference_refs,../bibtex_files/Spitzer_refs,../bibtex_files/IR_refs,../bibtex_...(45 bytes skipped)...

202:

the years \citep[see e.g.][]{radioPDAnalysis-82, XrayPDAnalysis-93,

0701:gr-qc0701173/QNM_analysis_in_BEC.tex : [ ]

2:

%Quasi-normal mode analysis in BEC acoustic black holes

59:

\title{Quasi-normal mode analysis in BEC acoustic black holes}

81:

We perform a quasi-normal mode analysis of black hole configurations

82:

in Bose-Einstein condensates (BEC). In this analysis we use the full

127:

and examine their quasi-normal or relaxation modes. The analysis we

129:

analysis in gravity

167:

quasi-normal mode analysis of gravitational black holes. Then, in

380:

\section{Quasi-normal mode analysis and boundary conditions}

594:

the usual quasi-normal mode analysis in standard $(3+1)$ GR, will

599:

...(13 bytes skipped)...rward speculation is that the discrete spectrum which is obtained in the standard quasi-normal mode analysis in three-dimensionsal GR will also obtain continuous regions when taking the modification of the di...(48 bytes skipped)...

662:

%``Stability analysis of sonic horizons in Bose-Einstein condensates,''

0801:0801.2033/gibbs_sampler_analysis.tex : [ ]

20:

\title{Analysis of a Gibbs sampler method for model based clustering

40:

in-depth analysis can reveal important insights about the

53:

GO annotation analysis shows that these local maxima are all

161:

\citep{ashb00} analysis of the different modes shows that also from

377:

pattern recognition and image analysis, modified here to enforce the

493:

In the analysis below we use subsets from the \citeauthor{gaschdata}

598:

\subsection*{Analysis of whole genome data sets}

749:

for further analysis. Then it produces a number of fuzzy clusters of

751:

useful for further analysis. For the three data sets considered here,

756:

further analysis.

882:

% \bibliography{gibbs_sampler_analysis}

909:

\newblock {{C}luster analysis and display of genome-wide expression patterns}.

914:

\newblock Model-based clustering, discriminant analysis, and density

1039:

design and analysis of structure learning algorithms}.

0511:astro-ph0511614/TimeSeriesAnalysis.tex : [ ]

2:

\section{Time series analysis}\label{TimeSeriesAnalysis}

0702:cs0702159/analysisofhashfunctions.tex : [ ]

2:

\label{sec:analysis-hash-functions}

4:

In this section we sketch the analysis of the hash functions of our scheme. Note that the hash functions $h_0$, $y_1$, $y_2$, $\dots$, $y_...(293 bytes skipped)...

0003:nucl-ex0003010/analysisDescrXihong.tex : [ ]

1:

%% @(#) $Id: analysisDescrXihong.tex,v 1.17 2000/03/28 09:26:46 cole Exp $

24:

%% Log Message: $Log: analysisDescrXihong.tex,v $

134:

%simulation with the same cuts used in data analysis. }

0801:0801.4093/chap3_data_analysis.tex : [ ]

18:

The software tools run by \Xchan\ comprise the \chandra\ Interactive Analysis of Observations (\ciao) suite, version 3.3.0.1. Functions of the various \ciao\ tools were support...(311 bytes skipped)...

38:

...(486 bytes skipped)...at event and pixel. Pixels unsuitable for use -- in which any of the 32 status flags are set -- in analysis have a status code of 1.

44:

...(200 bytes skipped)...ls during which the background rate is larger than a certain threshold value were excluded from our analysis. Enhanced background seriously degrades the signal-to-noise (S/N) of galaxy clusters and other ext...(16 bytes skipped)...

0010:hep-ph0010115/JHEP_analysis.tex : [ ]

1:

\section{Analysis of \BdsJpsi}

167:

analysis.

0111:nucl-ex0111004/piAnalysis.tex : [ ]

2:

% piAnalysis.tex

5:

\label{ch:PiResults} The next step in the analysis of charged

22:

analysis were more stringent than the ones used for the \hminus\

23:

analysis. This was done mainly to select tracks with a good

27:

For this analysis, we followed a procedure similar to the one

67:

extract their yields. The analysis of the other particle species

84:

procedure as in the \hminus\ analysis. Embedding was done in the

96:

requirements for tracks in the \dedx\ analysis are more

97:

stringent than for the \hminus\ analysis.}

113:

secondary interactions. Since for this analysis the requirement on

116:

the \hminus\ analysis, and was found to be $\lesssim 5\%$. We

252:

the 5\% most central data, preliminary analysis of the phase space

365:

the centrality selection for the \hminus\ analysis which was based

368:

for this analysis, but also for other studies such as particle

0110:cond-mat0110031/fractal_analysis.tex : [ ]

1:

% Fractal analysis of Sampled Profiles: Systematic Study

13:

\title{Fractal analysis of Sampled Profiles: Systematic Study}

23:

fractal analysis of experimental profiles is of critical importance.

24:

Although this aspect has been widely recognized, a systematic analysis of

26:

systematic analysis of synthetic self-affine profiles in order to clarify

46:

exponent, numerical analysis, sampling effects}

100:

sampling on the determination of $H$, a numerical analysis can be

116:

quite surprisingly a systematic analysis of the problem, considering

132:

every generation algorithm). Only an analysis that considers different

137:

interpreted as an uncontrollable error affecting the analysis of sampled

145:

crucial both for future analysis of self-affine profiles and for a correct

160:

In this paper we present a systematic analysis considering together all

161:

the generation algorithms found in literature. The aim of our analysis is

180:

Conversely, on the basis of our analysis, we will interpret the

194:

of the fractal analysis of poorly sampled self-affine profiles, focusing

214:

In the following sections we will present a systematic analysis of

217:

experimentalists of a reliable tool for the fractal analysis of surfaces

238:

Once we have scaled down the analysis to 1+1 dimensions, the following

254:

\cite{bar95,mal97}. In the present analysis, we consider only profiles

262:

of analysis (AFs) show a typical power law behavior on self-affine

272:

calculate the exponent $H$. In the analysis of statistical self-affine

282:

The identification of the linear region in the analysis of the AFs is a

328:

the fitting procedure is essential to perform a systematic analysis. In

346:

straight-line-fit analysis through which the slopes and their errors are

382:

to the systematic analysis and we have found that the measured Hurst

390:

internal parameter of the analysis and not a direct measurement of the

393:

\section{Numerical Analysis}

447:

these values of $N$ we have repeated the numerical analysis (i.e.

496:

different way different methods of analysis. The deviation from the ideal

501:

Moreover, within the same method of analysis we observe that the different

546:

$L$. This fact has an important consequence on a fractal analysis of

559:

the methods of analysis.

619:

methods of analysis used in this article: (a) height-height correlation

628:

proposed in Ref. \cite{den99a} even though the analysis was limited to a

696:

effectiveness of the calibration graphs in the analysis of self-affine

712:

We have carried out a systematic analysis in order to achieve a deeper

715:

assessment of the reliability of fractal analysis of experimental

724:

In order to perform such a quantitative analysis we have developed a new

726:

choice of the region for the linear fit of the analysis functions. This

728:

and appears to be a significant source of error in the whole analysis.

733:

algorithms found in literature using different method of analysis.

735:

The systematic analysis presented in this paper has been carried out on

737:

of analysis (e.g. see \cite{den99a,kri93}). However, it is reasonable to

742:

analysis of profiles generated with the random midpoint displacement shown

755:

function used in the analysis. We propose that this behavior is

774:

in an experimental analysis because it usually reduces significantly the

775:

number of profiles that have to be acquired, making the analysis much less

778:

Thanks to our systematic analysis, we have built, for each method of

779:

analysis, a calibration graph representing the region of the

796:

reliable fractal analysis of both numerical and experimental profiles and

805:

reported in literature to date led to the conclusion that the analysis of

808:

calibration graphs in the analysis of self-affine profiles, we definitely

810:

of the results obtained with different method of analysis is of

0308:astro-ph0308100/WeightedAnalysisTeq.tex : [ ]

1:

\chapter{Weighted Analysis Technique}

2:

\label{WeightedAnalysisTechnique:chap}

6:

This chapter describes the theoretical basis for the weighted analysis...(103 bytes skipped)... a high data rate gamma-ray observatory like Milagro. The basic requirements for a transient search analysis...(6 bytes skipped)...o maximize signal sensitivity while keeping the computational cost low enough to enable a real time analysis on many time scales. Any analysis...(13 bytes skipped)...volves compromises between sensitivity, model independence, and speed, and I developed the weighted analysis technique as an alternative to the compromises made by the standard binned or maximum likelihood an...(25 bytes skipped)...

8:

...(202 bytes skipped)...ee Chapter \ref{Characterization:chap} where Milagro's PSF is characterized.) In an optimal binned analysis...(125 bytes skipped)...chosen to maximize the signal-to-noise ratio for the detector's average PSF. In essence the binned analysis discards the information on the quality of an individual event, and instead treats every event as i...(440 bytes skipped)...

10:

A third analysis...(486 bytes skipped)...nalyze data from Cygnus X-3, but they only outlined the technique used and never published the full analysis method. From the sketch of the analysis provided in Cassiday et al.\ \cite*{FlysEyeTeq} it is not obvious whether the PSF was Gaussian or a...(470 bytes skipped)...

12:

The weighted analysis...(108 bytes skipped)...dhams \cite*{Woodhams} to PSFs of arbitrary shape and Poisson statistics. To introduce the weighted analysis...(44 bytes skipped)... build a somewhat idealized sky map, then describe how this sky map can be used as the basis for an analysis.

21:

...(441 bytes skipped)... about the sources (spectra, angular extent, etc.) leading to different types of maximum likelihood analysis...(201 bytes skipped)... the sky map is created. Both approaches are valid, but from different points of view. The weighted analysis technique uses the later viewpoint and includes only directly measured quantities.

39:

...(532 bytes skipped)... and this individual information retained. Sky maps of this type were used in a maximum likelihood analysis by the EGRET collaboration \cite{EgretTeq} for PSFs which were binned in energy and a binary $P_\ga...(357 bytes skipped)...

45:

...(21 bytes skipped)...n Diagram]{This is diagram shows how individual photons are added to form a sky map in the weighted analysis technique. In the top frame we have events with varying PSFs. The lower frame shows how these eve...(182 bytes skipped)...

67:

...(34 bytes skipped)...photon probability distribution we need to tackle the issue of source identification, and again the analysis approach depends on exactly what question is being asked. A maximum likelihood analysis could be directly applied to the photon probability distribution of the sky map. Maximum likelihood...(535 bytes skipped)...

69:

The weighted analysis...(653 bytes skipped)...ghly model dependent and uncertain. Furthermore, since we don't know the signal duration we need an analysis which is computationally fast enough to handle a real time search over multiple time scales. So we ...(315 bytes skipped)...

78:

...(180 bytes skipped)...g functions $PSF'$ --- cover the entire sky and $N$ is deterministic. In implementing the weighted analysis...(102 bytes skipped)...f:table}). Truncating the weighting function significantly improves the computational speed of the analysis because only sample locations near the position of a new event must be updated, not the entire sky ...(846 bytes skipped)...

92:

Signal identification in the weighted analysis...(341 bytes skipped)...nd, we are less model sensitive than some maximum likelihood implementations. However, the weighted analysis method does sacrifice some features like estimating the observed spectrum in favor of speed. A sour...(129 bytes skipped)...

97:

We would like to compare the sensitivity of the weighted analysis...(83 bytes skipped)...mple analytic way of comparing the various maximum likelihood analyses to either the optimal binned analysis or the weighted analysis technique. Qualitatively we expect the weighted analysis...(62 bytes skipped)... it is safe to say that it only approaches the sensitivity of a well implemented maximum likelihood analysis...(349 bytes skipped)...re maximum likelihood is not ideal \cite{Eadie}, though it may be due to how the maximum likelihood analysis was implemented. I was not able to find citations proving the superiority of maximum likelihood.}

99:

Comparing the weighted analysis technique to an optimal binned analysis...(169 bytes skipped)...In the limit of large statistics, we can obtain analytic solutions for both the binned and weighted analysis...(274 bytes skipped)...rge statistics limit, no weighting for background rejection, and Gaussian PSFs reduces the weighted analysis technique to the Gaussian weighting analysis developed by Woodhams \cite*{Woodhams}. Since the Gaussian weighting and weighted analysis techniques are identical in this limit, we will refer to them generically as weighted analyses in t...(24 bytes skipped)...

125:

...(259 bytes skipped)...\sigma$. This implies that the weighted analyses are $\sim10\%$ more sensitive than an optimal bin analysis...(78 bytes skipped)...er limit, and that detectors which have a spectrum of PSFs should benefit even more from a weighted analysis.

127:

...(192 bytes skipped)...al bin size is $0.764\sigma$ and the sensitivity parameter is $0.312/\sigma$ for the optimal binned analysis...(34 bytes skipped)...ensitivity parameter is $0.489/\sigma$, or a $\sim 56\%$ improvement in sensitivity over the binned analysis. This is the kind of improvement we expected from a weighted analysis technique.

134:

and the signal in a weighted analysis becomes

139:

For a flat spectrum of Gaussian PSFs from width 0.1$\sigma$ to width 1$\sigma$, the weighted analysis gives less than a 7\% improvement over the binned analysis...(300 bytes skipped)...omposite PSF with a top-hat profile could be generated, and in this extreme case the optimal binned analysis...(2 bytes skipped)...ould be just as effective as the weighted analyses. This can be seen by realizing that the weighted analysis technique with a top-hat weighting function

147:

is identical to a binned analysis...(647 bytes skipped)...ility of seeing $N_{obs}$ events inside a bin of radius $R$ --- exactly the same result as a binned analysis. It can also be shown that the optimal weighting function to use in the weighted analysis...(15 bytes skipped)...he true PSF \cite{Woodhams}. Since the optimal weighting function is the true PSF, and the weighted analysis with a top-hat weighting function is identical to a binned analysis, it follows that the sensitivity of a weighted analysis is never worse than a binned analysis...(52 bytes skipped)...hat composite PSF. In general, the less square the composite PSF is, the more effective a weighted analysis will be.

149:

...(384 bytes skipped)...ions will be wrong, and we can explore how errors in the expected PSF affect the sensitivity of the analysis...(38 bytes skipped)...igma$ (all narrow PSF events), the weighted analyses are more than twice as sensitive as the binned analysis...(25 bytes skipped)... the opposite extreme, if the PSF of the signal is $1\sigma$ (all wide PSF events), then the binned analysis...(7 bytes skipped)...rly 13\% more effective than the weighted analyses. This surprising result is because the weighted analysis...(423 bytes skipped)... the expected spatial distribution. Another way of looking at this is that the power of the weighed analysis...(82 bytes skipped)...e expected PSF is wrong, there can be times when the expected optimal bin/top-hat PSF from a binned analysis...(16 bytes skipped)...ore accurate than the expected PSF. This shows that there is some model dependence in the weighted analysis technique which can be detrimental in certain specific scenarios.

151:

...(142 bytes skipped)...ground cut which treats all events passing the cut identically ($P_\gamma = 0$ or 1). The weighted analysis...(33 bytes skipped)...gamma$ value instead of a hard cut, and this will magnify the sensitivity advantage of the weighted analysis technique over a binned analysis...(85 bytes skipped)...l bin in the cut parameter, and the same argument which showed that the sensitivity of the weighted analysis technique is greater than or equal to that of the binned analysis...(32 bytes skipped)... $P_\gamma$ distributions are used). In effect, background rejection adds a third dimension to the analysis, and an optimal binned analysis...(11 bytes skipped)...kground cut uses a step-like probability distribution in all three dimensions, whereas the weighted analysis uses the expected probability distributions.

153:

...(325 bytes skipped)...it of large statistics does not hold and the similarity between Gaussian weighting and the weighted analysis...(51 bytes skipped)...ed by Woodhams \cite*{Woodhams} can only be used in the limit of large statistics, and the weighted analysis...(358 bytes skipped)...hey also observed a $\sim10\%$ improvement with maximum likelihood. This implies that the weighted analysis technique is similar to the sensitivity of maximum likelihood in this limit. The weighted analysis technique is more sensitive than the binned analysis for much but not all of the possible phase space, and should approach the sensitivity of well imple...(72 bytes skipped)...

159:

The weighted analysis technique fits a particular analysis niche. For discovery mode GRB searches with variable PSF instruments, we want an analysis...(249 bytes skipped)... give valuable information like the estimated spectrum, but are computationally slow. The weighted analysis technique is a compromise between binned and maximum likelihood techniques, landing somewhere in th...(154 bytes skipped)...

0111:nucl-ex0111004/nchAnalysis.tex : [ ]

3:

% nchAnalysis.tex

5:

\chapter{Analysis of Charged Hadron Spectra}

6:

\label{ch:nchAnalysis}

8:

In this section we delineate the relevant parts of the analysis

10:

is also the baseline for any other analysis.

14:

used for this analysis were recorded with a minimum bias trigger,

41:

events used in this analysis is shown in Fig.~\ref{fig:zdcvsctb}.

60:

An important input into this analysis is the \textit{hadronic

79:

an independent analysis by the RHIC accelerator crew

102:

efficiency is important in this analysis and for the determination

131:

analysis to events with a vertex between $\pm 95$ cm, about a $\pm

144:

The acceptance for events used in the multiplicity analysis was placed

178:

software, a visual analysis of $\sim 100$ events was performed,

222:

available to the offline analysis is $94.9 \pm 0.5\ \pm 4\ \%$ of

393:

part of the STAR trigger as well. For the analysis of the

400:

analysis done here relies on tracking. We first obtain a raw

419:

reconstructed in the TPC were accepted for this analysis if they

423:

The main goal of this analysis is to determine the corrected yield

472:

\caption[Acceptance Correction]{The acceptance correction for the \hminus\ analysis. Left panel:

492:

drops at low \pt. For the \hminus\ analysis, we accept tracks

502:

study systematic effects the multiplicity analysis was carried out

528:

\caption[Reconstruction Efficiency \vs\ \pt.]{The reconstruction efficiency for the \hminus\ analysis. Left panel:

704:

particle yield for the analysis presented here.

792:

is also used for the \hminus\ analysis.

865:

half a similar analysis yields $\hminus/\hplus = 0.988 \pm 0.005$

867:

purposes of this analysis the two halves of the TPC yield

895:

present analysis. The following corrections to the spectra and

919:

momentum analysis.

993:

our analysis (the bin limits and bin center). This matrix then

1004:

analysis (bin size 100 \mevc, range 0.1 - 2 \gevc) and for the

1005:

\piminus\ analysis (bin size 50 \mevc, range 0.05 - 0.75 \gevc).

1029:

To study the effect of splitting in this analysis, we used two

1046:

\ref{sec:embedding}, the matching as implemented in this analysis

1065:

addition, the analysis done with the more stringent requirement on

1107:

obtained in the first analysis of the data.

0601:math-ph0601052/math_analysis_creep.tex : [ ]

20:

\title{Mathematical analysis of fully coupled

23:

\emph{Institute for Applied Analysis and Numerical Simulation} \\

41:

framework for a strain localization analysis.

67:

element method (FEM) is commonly used for numerical analysis of

126:

The proper mathematical analysis of nonlinear damage

146:

the analysis of crack propagation lies beyond the scope of this article.

1601:

and can be used for a proper mathematical analysis of the problem.

1653:

Journal for Analysis and its Applications, 1999, 18, 1003-1030.}

1692:

analysis for design. Journal of Strain Analysis, 29(3), 1994,

1714:

Analysis, 29(4), 1994, 309-316.

1718:

analysis of creep crack growth by continuum damage mechanics

1752:

Steady-state creep analysis of pressurized pipe weldments by perturbation method,

0006:hep-ph0006356/BayesianAnalysis.tex : [ ]

6:

\title{BAYESIAN ANALYSIS}

69:

for a discussion of the key conceptual issue of Bayesian analysis:

131:

realistic Bayesian analysis to illustrate a point: Bayesian

680:

judgement when undertaking any realistic analysis. We introduce

736:

energy\cite{bhat,gates}. Our Bayesian analysis is comprised of four components

855:

So here is an analysis that must deal with theoretical

899:

Our Bayesian analysis has produced a result that, intuitively,

0202:astro-ph0202439/BS_analysis_01.tex : [ ]

30:

{A Multifrequency Analysis of the Polarized Diffuse Galactic Radio

61:

We present here preliminary results based on a recent analysis of the

115:

and are particularly suitable for an analysis in terms of angular

127:

In addition, the survey full coverage analysis allows to recover

139:

The main problem in the analysis of the Leiden

168:

survey full coverage analysis in the common multipole range.

258:

survey full coverage analysis.

278:

in the case of the survey full coverage analysis.

320:

Note that, for the survey full coverage analysis,

337:

analysis,

340:

From the survey full coverage analysis,

362:

In the case of the survey full coverage analysis we report

414:

We presented here preliminary results based on a recent analysis of the

455:

at $\ell =50$ are $\sim$ $-3.2$ (survey full coverage analysis),

468:

from the analysis of a sky region partially overlapped with the patch 1,

492:

(in the case of the survey full coverage analysis, note

519:

``Analysis Issues for Large CMB Data Sets'',

0702:math0702327/clu_analysis_new.tex : [ ]

1:

\section{Relationship with Cluster Analysis}

5:

Cluster Analysis (\eg~see~\cite{KM}). The overall aim of Cluster Analysis

36:

Now we consider another method of Cluster Analysis, QT~Clustering~\cite{HKY},

0006:astro-ph0006264/sn93j-analysis.tex : [ ]

35:

\title{Detailed Analysis of Early to Late-Time Spectra of

121:

the earlier spectra and we present the analysis of late-time spectra

171:

were first fulfilled with SN 1985F. Analysis of spectra of the Type

211:

analysis of the [\ion{O}{1}] $\lambda\lambda$6300, 6364 doublet in SN

227:

more detailed analysis of the clumps visible in the spectra of SN

243:

\subsection{Analysis of the Clumps}

482:

1989; Swartz 1991), although later analysis by the same authors

590:

\subsection{Prior Analysis of our Nebular to Late-Time Spectra}

632:

Analysis of the late-time spectra depends upon the amount of reddening

1373:

be an obvious choice for such an analysis, but a brighter object is

0804:0804.4483/analysis.ps : [ ]

3:

%%Title: (analysis.ps)

0311:nlin0311046/Cryptanalysis.tex : [ ]

95:

non-linear dynamical system, no analysis of security was included.

214:

\subsection{Statistical analysis}

326:

and also to perform a basic security analysis. For the present

354:

\newblock Cryptanalysis of cryptosystems based on remote chaos replication.

392:

\newblock Cryptanalysis of a chaotic encryption system.

397:

\newblock Cryptanalysis of a chaotic secure communication system.

402:

\newblock Cryptanalysis of an ergodic chaotic cipher.

413:

\newblock Cryptanalysis of a discrete chaotic cryptosystem using external key.

0403:nlin0403029/Cryptanalysis.v4.tex : [ ]

88:

analysis, the process to generate the chaotic signal is irrelevant

302:

are given, and the concrete designs and detailed security analysis

441:

\newblock Performance analysis of {Jakimoski-Kocarev} attack on a class of

44:

Chaotic cryptosystems, Baker map, Cryptanalysis, Finite precision

109:

ciphertext is pointed out. After the cryptanalysis results, which

0311:nlin0311041/CryptanalysisLorenz.tex : [ ]

140:

non-linear system, no analysis of security was included. It was

149:

\section{Power analysis attack}

175:

computed the short time power analysis of the ciphertext. The

190:

It should be emphasized that our analysis is a blind detection,

0311:nlin0311042/CryptanalysisOscillator.tex : [ ]

27:

An analysis of a recently proposed cryptosystem based on chaotic

70:

system $N$, no analysis of security is included.

127:

In Fig.~\ref{fig:spectrum} we show the power spectral analysis

339:

As a consequence of the previous analysis, the cryptosystem studied

380:

\caption{Power spectral analysis of the ciphertext

12:

\title{Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion}

0803:0803.1521/analysis.eps : [ ]

2:

%%Title: analysis.eps

0705:0705.2089/analysis_cuts.eps : [ ]

3:

%%Title: ./analysis_cuts.eps:

0609:physics0609179/HAR_75_8_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\HAR_75_8_analysis.eps

0609:physics0609179/HAR_9_95_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\HAR_9_95_analysis.eps

0609:physics0609179/JMA_6_65_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\JMA_6_65_analysis.eps

0609:physics0609179/JMA_7_75_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\JMA_7_75_analysis.eps

0609:physics0609179/JMA_8_85_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\JMA_8_85_analysis.eps

0609:physics0609179/HAR_8_85_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\HAR_8_85_analysis.eps

0609:physics0609179/HAR_7_75_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\HAR_7_75_analysis.eps

0609:physics0609179/HAR_65_7_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\HAR_65_7_analysis.eps

0609:physics0609179/HAR_6_65_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\HAR_6_65_analysis.eps

0609:physics0609179/JMA_4_45_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\JMA_4_45_analysis.eps

0609:physics0609179/JMA_3_35_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\JMA_3_35_analysis.eps

0609:physics0609179/JMA_65_7_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\JMA_65_7_analysis.eps

0609:physics0609179/JMA_75_8_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\JMA_75_8_analysis.eps

0609:physics0609179/JMA_5_55_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\JMA_5_55_analysis.eps

0704:0704.3391/analysis2d_fig.eps : [ ]

3:

%%Title: C:\Power\my_work\H_Poor\CB_sensor\analysis2d_fig.eps

0609:physics0609179/JMA_55_6_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\JMA_55_6_analysis.eps

0704:0704.3396/analysis2d_fig.eps : [ ]

3:

%%Title: C:\Power\my_work\H_Poor\CB_sensor\ICC07\analysis2d_fig.eps

0609:physics0609179/JMA_45_5_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\JMA_45_5_analysis.eps

0609:physics0609179/HAR_55_6_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\HAR_55_6_analysis.eps

0609:physics0609179/JMA_25_3_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\JMA_25_3_analysis.eps

0609:physics0609179/JMA_35_4_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\JMA_35_4_analysis.eps

0701:cond-mat0701338/MCanalysis.eps : [ ]

5:

%%Title: MCanalysis.eps

0705:0705.3683/v_analysis11_0.eps : [ ]

3:

%%Title: .\v_analysis11_0.eps

0609:physics0609179/SCEC_45_5_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\SCEC_45_5_analysis.eps

0705:0705.3683/v_analysis21_0.eps : [ ]

3:

%%Title: .\v_analysis21_0.eps

0609:physics0609179/SCEC_55_6_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\SCEC_55_6_analysis.eps

0609:physics0609179/SCEC_65_7_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\SCEC_65_7_analysis.eps

0609:physics0609179/SCEC_35_4_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\SCEC_35_4_analysis.eps

0609:physics0609179/SCEC_4_45_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\p_M_HAR_revision\SCEC_4_45_analysis.eps

0609:physics0609179/SCEC_7_75_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\SCEC_7_75_analysis.eps

0807:0807.0993/figures/multianalysis.eps : [ ]

424:

gs 1 -1 sc (Cache analysis) col0 sh gr

460:

gs 1 -1 sc (Cache analysis) col0 sh gr

2:

%%Title: multianalysis.fig

0609:physics0609179/SCEC_15_2_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\SCEC\SCEC_15_2_analysis.eps

0609:physics0609179/SCEC_75_8_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\SCEC_75_8_analysis.eps

0609:physics0609179/SCEC_6_65_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\SCEC_6_65_analysis.eps

0507:astro-ph0507384/wwz_analysis.eps : [ ]

3:

%%Title: wwz_analysis.jpg

13:

(JPEG file 'wwz_analysis.jpg' needs PostScript Level 2!\n) dup print flush

0609:physics0609179/SCEC_2_25_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\SCEC_2_25_analysis.eps

0609:physics0609179/SCEC_3_35_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\SCEC_3_35_analysis.eps

0609:physics0609179/SCEC_25_3_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\SCEC_25_3_analysis.eps

0609:physics0609179/SCEC_5_55_analysis.eps : [ ]

3:

%%Title: C:\p(m)2007\Paper\p_M_HAR_revision\SCEC_5_55_analysis.eps

0810:0810.1179/DataAnalysis/DataAnalysisFigs/online_algo.eps : [ ]

368:

(Camera 1 analysis :) dup sw 2 div 22.001790 ex sub 10.047920 m gs 1 -1 sc sh gr

0705:0705.3683/analysis_comp11.eps : [ ]

3:

%%Title: .\analysis_comp11.eps

0705:0705.3683/analysis_comp21.eps : [ ]

3:

%%Title: .\analysis_comp21.eps

0707:0707.1099/lifetimeAnalysis2.eps : [ ]

2:

%%Title: lifetimeAnalysis2.fig

0811:0811.0009/Figures/ToyAnalysis.eps : [ ]

3:

%%Title: plots/ToyAnalysis.eps: A Gfitter plot of the SM fit goodness

1454:

gsave 2268 1538 0 0 C 1121 1059 t 0 r /Helvetica-Bold findfont 58.6478 sf 0 0 m (Toy analysis incl. theo. errors) show NC gr 3 lw cs 0 0 0 P03 setcolor 997 1048 m 102 X 57 Y -102 X FA 6 lw bla...(50 bytes skipped)...

1456:

gsave 2268 1538 0 0 C 1121 977 t 0 r /Helvetica-Bold findfont 58.6478 sf 0 0 m (Toy analysis excl. theo. errors) show NC gr 0.8 1 0 c 997 966 m 102 X 57 Y -102 X f black 997 1023 m 102 X s 99...(54 bytes skipped)...

0504:physics0504213/RC_analysis-R.eps : [ ]

8:

%%Title: RC_analysis-R.agr

0504:physics0504213/RC_analysis-Q.eps : [ ]

8:

%%Title: RC_analysis-Q.agr

0810:0810.3664/2008_10_17_ToyAnalysis_logo.eps : [ ]

3:

%%Title: plots/ToyAnalysis_logo.eps: A Gfitter plot of the SM fit goodness

1454:

gsave 2268 1538 0 0 C 1121 1059 t 0 r /Helvetica-Bold findfont 58.6478 sf 0 0 m (Toy analysis incl. theo. errors) show NC gr 3 lw cs 0 0 0 P03 setcolor 997 1048 m 102 X 57 Y -102 X FA 6 lw bla...(50 bytes skipped)...

1456:

gsave 2268 1538 0 0 C 1121 977 t 0 r /Helvetica-Bold findfont 58.6478 sf 0 0 m (Toy analysis excl. theo. errors) show NC gr 0.786667 1 0 c 997 966 m 102 X 57 Y -102 X f black 997 1023 m 102 X...(55 bytes skipped)...