The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
A positive integer is called a square-free number if it is not divisible by a perfect square except . Let be an odd prime. For with , the smallest positive integer such that is called the exponent of modulo . If the exponent of modulo is , then is called a primitive root mod . Let be the characteristic function of the square-free primitive roots modulo . In this paper we study the distribution
and give an asymptotic formula by using properties of character sums.
In this paper, the consensus of heterogeneous multi-agent systems (MASs) with uncertain Deny-of-Service (DoS) attack strategies is studied. In our system, all agents are time synchronized and they communicate with each other with a constant sampling period normally. When the system is under attack, all agents use the hold-input mechanism to update the control protocol. By assuming that the attack duration is upper bounded and the occurrence of the attack follows a Markovian jumping process, the...
Download Results (CSV)