|< 4 5 6 7 8 >|
CSV
publication icon
Dong W (2022) Subspace clustering via joint l 1 , 2 and l 2 , 1 norms in Information Sciences
publication icon
Dong W (2022) Subspace clustering via joint l 1 , 2 and l 2 , 1 norms in Information Sciences
publication icon
Aubert B (2009) Search for B -meson decays to b 1 ? and b 1 K * in Physical Review D
publication icon
Prochazka V (2016) N = 1 $$ \mathcal{N}=1 $$ Euler anomaly flow from dilaton effective action in Journal of High Energy Physics
publication icon
Prochazka V (2016) N = 1 $$ \mathcal{N}=1 $$ Euler anomaly flow from dilaton effective action in Journal of High Energy Physics
publication icon
Prochazka V (2016) N = 1 $$ \mathcal{N}=1 $$ Euler anomaly flow from dilaton effective action in Journal of High Energy Physics
publication icon
Aubert B (2009) Search for B -meson decays to b 1 ? and b 1 K * in Physical Review D
publication icon
Martín-Martínez E (2015) (1+1)D Calculation Provides Evidence that Quantum Entanglement Survives a Firewall. in Physical review letters