理学 >>> 数学 >>> 数理逻辑与数学基础 >>> 数学基础 >>>
搜索结果: 1-15 共查到数学基础 q-Analysis相关记录15条 . 查询时间(0.467 秒)
Theorise of Data Analysis:From Magical Thinking Through Classical Statistics。
An analog of the spectral analysis of time series is developed for data in general spaces. This is applied to data from an election in which 5738 people rank ordered five candidates. Group theoret...
Eigen Analysis for Some Examples of the Metropolis Algorithm.
Spectral Analysis for Discrete Longitudinal Data.
We show how to use subgroups of the symmetry group of a reversible Markov chain to give useful bounds on eigenvalues and their multiplicity. We supplement classical representation theoretic tools invo...
Bayesian analysis for reversible Markov chains
The Workshop on Recent Advances in Numerical Analysis will be held from Nov 15 to Nov 16, in the Department of Mathematics, Shanghai Jiao University, Shanghai, China.
Abstract: The Riemann Xi-function Xi(t)=xi(1/2+it) is a particularly interesting member of a broad family of entire functions which can be expanded in terms of symmetrized Pochhammer polynomials depen...
As described in the classic works of Lee--Stewart and Short--Stewart, the numerical evaluation of linear stability of planar detonation waves is a computationally intensive problem of considerable int...
The paper considers gossip distributed estimation of a (static) distributed random field (a.k.a., large scale unknown parameter vector) observed by sparsely interconnected sensors, each of which only ...
The classical Heron problem states: \emph{on a given straight line in the plane, find a point $C$ such that the sum of the distances from $C$ to the given points $A$ and $B$ is minimal}. This problem ...
In this paper we propose a new design of LT codes, which decreases the average amount of redundancy in comparison to existing designs. The design focuses on a parameter of the LT decoding process call...
An accumulator based on bilinear pairings was proposed at CT-RSA’05. In this paper, we first demonstrate that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator which i...
In a (r, n)-threshold secret sharing scheme, no group of (r − 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time. In order to d...
Constrained hamiltonian structure of noncommutative gauge theory for the gauge group U(1) is discussed. Constraints are shown to be first class, although, they do not give an Abelian algebra in terms...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...