User profiles for R. Sommer

Robin Sommer

- Verified email at icsi.berkeley.edu - Cited by 6349

Robert Sommer

- Verified email at ecology.uni-kiel.de - Cited by 3788

[HTML][HTML] FLAG review 2021

…, S Sint, R Sommer, N Tantalo, R Van de Water… - The European Physical …, 2022 - Springer
We review lattice results related to pion, kaon, D-meson, B-meson, and nucleon physics with
the aim of making them easily accessible to the nuclear and particle physics communities. …

[HTML][HTML] Review of lattice results concerning low-energy particle physics: Flavour Lattice Averaging Group (FLAG)

…, SR Sharpe, S Simula, R Sommer… - The European Physical …, 2017 - Springer
We review lattice results related to pion, kaon, D- and B-meson physics with the aim of making
them easily accessible to the particle-physics community. More specifically, we report on …

[HTML][HTML] FLAG review 2019: flavour lattice averaging group (FLAG)

…, S Simula, R Sommer, R Van de Water… - The European Physical …, 2020 - Springer
We review lattice results related to pion, kaon, D-meson, B-meson, and nucleon physics with
the aim of making them easily accessible to the nuclear and particle physics communities. …

A new way to set the energy scale in lattice gauge theories and its application to the static force and σs in SU (2) Yang-Mills theory

R Sommer - Nuclear Physics B, 1994 - Elsevier
… the force F (r) between static quarks at intermediate distances r. The definition F(R0)R~= …
In order to avoid an extrapolation in the distance r, we define a hadronic length scale R(c) which …

Personal space. The behavioral basis of design.

R Sommer - 1969 - ERIC
The behavior of the human organism in spatial situations is examined. Extensive research by
the author in this subject area is supplemented by other studies. Among the research areas …

Outside the closed world: On using machine learning for network intrusion detection

R Sommer, V Paxson - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
In network intrusion detection research, one popular strategy for finding attacks is monitoring
a network's activity for anomalies: deviations from profiles of normality previously learned …

[BOOK][B] A practical guide to behavioral research: Tools and techniques

BB Sommer, R Sommer - 1997 - psycnet.apa.org
Intended for students in research methods courses and for readers seeking a guide to
conducting behavioral studies, this book provides an accessible introduction to the techniques …

Modulation, losses, and semiconductor requirements of modular multilevel converters

…, S Bernet, M Hiller, R Sommer - IEEE transactions on …, 2009 - ieeexplore.ieee.org
… If r cells of n are in the on-state (with 0 ≤ r ≤ n), the sum voltage of these r capacitor …
The parasitic ohmic losses in each arm are represented by a resistor R. With this model, the …

[HTML][HTML] Review of lattice results concerning low-energy particle physics

…, SR Sharpe, S Simula, R Sommer… - The European Physical …, 2014 - Springer
We review lattice results related to pion, kaon, $$D$$ D - and $$B$$ B -meson physics with
the aim of making them easily accessible to the particle-physics community. More specifically…

Species-specific responses of Late Quaternary megafauna to climate and humans

…, K Munch, E Stephan, M Sablin, RS Sommer… - Nature, 2011 - nature.com
Despite decades of research, the roles of climate and humans in driving the dramatic extinctions
of large-bodied mammals during the Late Quaternary period remain contentious. Here …