Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Random Polymer Models

Buy
Random Polymer Models, 9781860947865 (1860947867), Imperial College Press, 2007

This work deals with a well-defined class of probabilistic models. The focus is on polymers. More precisely I should say that the focus is on the equilibrium statistical mechanics of a class of polymers: dynamical and non-equilibrium phenomena are not treated, reflecting the fact that these directions are at the moment under-developed, at least from the viewpoint of the so called rigorous results. Moreover, only a subset of the world of polymer models is taken into consideration.

If I try to characterize such a subset, keeping in mind the motivations (that come from physics, biology, chemistry, material science, etc.), I end up with a list: (1+d)-dimensional pinning models, (1+1)-dimensional wetting models, adsorption models, copolymer models, DNA denaturation models, etc. and to each model in this list one should probably add the adjective disordered, since this work is mostly focused on disordered systems, even if non-disordered systems do play a central role. But such a list may at first appear quite disordered in itself...

If instead I take a purely mathematical standpoint, there is a totally natural thread connecting the models in the list: take a (persistent or terminating) renewal process and modify its law by giving rewards or penalties at the renewal epochs, possibly depending on time lapsed since the previous renewal epoch, and do that by introducing exponential, or Boltzmann, weights. On page 685 of his celebrated review paperWalks, Walls, Wetting, and Melting [Fisher (1984)] Michael E. Fisher writes:

“In fact, there is a rather simple but general mathematical mechanism which underlies a broad class of exactly soluble one-dimensional models which display phase transitions. This mechanism does not seem to be as well appreciated as it merits and it operates in a number of applications we wish to discuss.”

(HTML tags aren't allowed.)

Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Our civilization runs on software. Yet the art of creating it continues to be a dark mystery, even to the experts, and the greater our ambitions, the more spectacularly we seem to fail.

Big software projects regularly crash and burn--just ask the FBI and the IRS, the Pentagon and the FAA, or any decent-size corporation. The...

Excel Hacks: Tips & Tools for Streamlining Your Spreadsheets
Excel Hacks: Tips & Tools for Streamlining Your Spreadsheets

Millions of users create and share Excel spreadsheets every day, but few go deeply enough to learn the techniques that will make their work much easier. There are many ways to take advantage of Excel's advanced capabilities without spending hours on advanced study. Excel Hacks provides more than 130 hacks -- clever tools, tips...

Focus On Photon Mapping (Game Development)
Focus On Photon Mapping (Game Development)

From the basics of the nature of light to ray tracing and photon rendering, you'll learn how to bring a new dimension of reality to the graphics in your games. By beginning with the standard foundations of ray tracing and radiosity, you'll quickly learn how photon mapping has been able to combine the positive aspects of each...


Building a Web 2.0 Portal with ASP.NET 3.5
Building a Web 2.0 Portal with ASP.NET 3.5
If you think you're well versed in ASP.NET, think again. This exceptional guide gives you a master class in site building with ASP.NET 3.5 and other cutting-edge Microsoft technologies. You learn how to develop rock-solid web portal applications that can withstand millions of hits every day while surviving scalability and security pressures -- not...
Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Learning Red Hat Enterprise Linux and Fedora
Learning Red Hat Enterprise Linux and Fedora

You've probably heard about Linux from a magazine, radio or TV program, or a friend. You're wondering what Linux is about and whether you should give it a try. If so, particularly if you currently use Microsoft Windows, this book was written for you.

When the first edition of this book was being...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy