𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Painleve Analysis and the Yang-Mills Equation in Two Specific Cases

✍ Scribed by A. Roy Chowdhury; Minati Naskar


Publisher
John Wiley and Sons
Year
1988
Tongue
English
Weight
202 KB
Volume
500
Category
Article
ISSN
0003-3804

No coin nor oath required. For personal study only.

✦ Synopsis


A b s t r a c t . Two important configurations of Yang-Mills fieIds are discussed applying to them the Painleve test of Ablowitz. The case with a constant electric E-field does not a d a i t an exact solution while the cylindrically symmetric self-dual system admits an inverse scattering approach for instanton solution.

Yainlcve Analyse der Yang-Millsgleichung in zwei speziellen Fallen

I n h a l t s u b ersi cht. Zwei wichtige Yang-Millsfelder werden unter Anwendung des Painlevetests nach Ablowitz diskutiert. I m Falle des konstanten, elektrischen E-Feldes gibt es keine exakte Losung, tvahrend das zylindersymmetrische selbstduale System mit einem inversen Streuansatz zur Instantonlosung fdhrt.


📜 SIMILAR VOLUMES


Painlevé analysis and integrable cases o
✍ Jesús Palacián; Patricia Yanguas 📂 Article 📅 2000 🏛 Elsevier Science 🌐 English ⚖ 123 KB

Given a mechanical system, a two-dimensional anharmonic oscillator whose potential is represented by an arbitrary third-degree polynomial in the co-ordinates, a Painlev e analysis is performed in order to detect integrable families of it, ®nding two of them.

Wilson Loops in the Adjoint Representati
✍ A. Bassetto; L. Griguolo; F. Vian 📂 Article 📅 2000 🏛 Elsevier Science 🌐 English ⚖ 318 KB

QCD 2 with fermions in the adjoint representation is invariant under SU(N )ÂZ N and thereby is endowed with a nontrivial vacuum structure (k-sectors). The static potential between adjoint charges, in the limit of infinite mass, can be therefore obtained by computing Wilson loops in the pure Yang Mil

Case Studies in the Specification and An
✍ Dilia E. Rodríguez 📂 Article 📅 2000 🏛 Elsevier Science 🌐 English ⚖ 166 KB

We follow the method for the specification and analysis of protocols introduced in [3], further exploiting the capabilities of Maude. Our specifications are highly structured and allow the detection of type flaws, as well as replay attacks. We describe a variation of the search strategy introduced i