Context. Globular clusters (GCs) host multiple populations of stars that are well-separated in a photometric diagram - the chromosome map - built from specific Hubble Space Telescope (HST) filters. Stars from different populations feature at various locati ...
Binary logic operations are the building blocks of computing machines. In this paper, we present a new programmable binary logic gate based on programmable multistable mechanisms (PMM), which are multistable structures whose stability behavior depends on m ...
In this work, we present a simple biometric indexing scheme which is binning and retrieving cancelable deep face templates based on frequent binary patterns. The simplicity of the proposed approach makes it applicable to unprotected as well as protected, i ...
We report the discovery of a surprising binary configuration of the double-mode Cepheid OGLE-LMC-CEP-1347 pulsating in the first (P-1= 0.690 days) and second-overtone (P-2= 0.556 days) modes. The orbital period (P-orb= 59 days) of the system is five times ...
Masses of classical Cepheids of 3-11 M are predicted by theory but those measured clump between 3.6-5 M. As a result, their mass-luminosity relation is poorly constrained, impeding our understanding of basic stellar physics and the Leavitt Law. All Cepheid ...
An open problem in polarization theory is to determine the binary operations that always lead to polarization (in the general multilevel sense) when they are used in Arikan style constructions. This paper, which is presented in two parts, solves this probl ...
We present a detailed study of stellar rotation in the massive 1.5 Gyr old cluster NGC 1846 in the Large Magellanic Cloud. Similar to other clusters at this age, NGC 1846 shows an extended main-sequence turn-off (eMSTO), and previous photometric studies ha ...
We consider an adaptive network made of interconnected agents engaged in a binary decision task. It is assumed that the agents cannot deliver full-precision messages to their neighbors, but only binary messages. For this scenario, a modified version of the ...
Analyzing the security of closed source binaries is currently impractical for end-users, or even developers who rely on third-party libraries. Such analysis relies on automatic vulnerability discovery techniques, most notably fuzzing with sanitizers enable ...
An open problem in polarization theory is to determine the binary operations that always lead to polarization (in the general multilevel sense) when they are used in Arikan style constructions. This paper, which is presented in two parts, solves this probl ...
Institute of Electrical and Electronics Engineers2017