搜索结果: 1-15 共查到“数学基础 Analysis”相关记录15条 . 查询时间(0.567 秒)
Theorise of Data Analysis:From Magical Thinking Through Classical Statistics
Establish theory data analysis the classical statistics magical thinking
font style='font-size:12px;'>
2015/7/14
Theorise of Data Analysis:From Magical Thinking Through Classical Statistics。
THE 1987 WALD MEMORIAL LECTURES A GENERALIZATION OF SPECTRAL ANALYSIS WITH APPLICATION TO RANKED DATA
Spectral analysis the simulation data the space
font style='font-size:12px;'>
2015/7/14
An analog of the spectral analysis of time series is developed for data in
general spaces. This is applied to data from an election in which 5738 people
rank ordered five candidates. Group theoret...
Eigen Analysis for Some Examples of the Metropolis Algorithm
Analysis the metropolis algorithm example
font style='font-size:12px;'>
2015/7/14
Eigen Analysis for Some Examples of the Metropolis Algorithm.
Spectral Analysis for Discrete Longitudinal Data
Discrete longitudinal data spectral analysis
font style='font-size:12px;'>
2015/7/14
Spectral Analysis for Discrete Longitudinal Data.
Symmetry Analysis of Reversible Markov Chains
Theory of markov chain the tool orbital diagram building
font style='font-size:12px;'>
2015/7/8
We show how to use subgroups of the symmetry group of a reversible Markov chain to give useful bounds on eigenvalues and their multiplicity. We supplement classical representation theoretic tools invo...
Bayesian analysis for reversible Markov chains
Bayesian analysis markov chain
font style='font-size:12px;'>
2015/7/8
Bayesian analysis for reversible Markov chains。
Workshop on Recent Advances in Numerical Analysis
Numerical Analysis Recent Advances
font style='font-size:12px;'>
2014/11/3
The Workshop on Recent Advances in Numerical Analysis will be held from Nov 15 to Nov 16, in the Department of Mathematics, Shanghai Jiao University, Shanghai, China.
Numerical analysis of minimal beta-sequences associated with a family of entire functions
Numerical analysis Entire functions Pochhammer polynomials Riemann Xi-function
font style='font-size:12px;'>
2011/9/22
Abstract: The Riemann Xi-function Xi(t)=xi(1/2+it) is a particularly interesting member of a broad family of entire functions which can be expanded in terms of symmetrized Pochhammer polynomials depen...
Efficient numerical stability analysis of detonation waves in ZND
Efficient numerical stability analysis detonation waves in ZND
font style='font-size:12px;'>
2010/11/9
As described in the classic works of Lee--Stewart and Short--Stewart, the numerical evaluation of linear stability of planar detonation waves is a computationally intensive problem of considerable int...
Convergence Rate Analysis of Distributed Gossip (Linear Parameter) Estimation: Fundamental Limits and Tradeoffs
Convergence Rate Analysis Fundamental Limits and Tradeoffs
font style='font-size:12px;'>
2010/11/12
The paper considers gossip distributed estimation of a (static) distributed random field (a.k.a., large scale unknown parameter vector) observed by sparsely interconnected sensors, each of which only ...
Solving a Generalized Heron Problem by means of Convex Analysis
Generalized Heron Problem Convex Analysis
font style='font-size:12px;'>
2010/11/19
The classical Heron problem states: \emph{on a given straight line in the plane, find a point $C$ such that the sum of the distances from $C$ to the given points $A$ and $B$ is minimal}. This problem ...
Design and Analysis of LT Codes with Decreasing Ripple Size
LT Codes with Decreasing Ripple Size math
font style='font-size:12px;'>
2010/11/15
In this paper we propose a new design of LT codes, which decreases the average amount of redundancy in comparison to existing designs. The design focuses on a parameter of the LT decoding process call...
Analysis of Bilinear Pairing-based Accumulator for Identity Escrowing
Bilinear Pairing Collision Resistance Cryptographic Accumulators Identity Escrow Group Signature
font style='font-size:12px;'>
2012/12/3
An accumulator based on bilinear pairings was proposed at CT-RSA’05. In this paper, we first demonstrate that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator which i...
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
Secret Sharing Scheme Threshold Changeability Information Rate Security Rate Chinese Remainder Theorem Dealer Free Update.
font style='font-size:12px;'>
2012/12/3
In a (r, n)-threshold secret sharing scheme, no group of (r − 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time. In order to d...
BFV-BRST analysis of equivalence between noncommutative and ordinary gauge theories
BFV-BRST analysis equivalence noncommutative ordinary gauge theories
font style='font-size:12px;'>
2010/11/2
Constrained hamiltonian structure of noncommutative gauge theory for the gauge group U(1) is discussed. Constraints are shown to be first class, although, they do not give an Abelian algebra in terms...