Results 1  10
of
282,312
Realizing Site Permutations
, 2011
"... Given n fixed sites on the plane, there are several ways to determine a permutation of the sites as a function of a unit vector u or a vantage point v. Given such a scheme and a permutation π, we can ask whether there is any unit vector or vantage point for which the permutation is π. We give linear ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
lineartime algorithms for this realization problem under three schemes for determining permutations: sweeping a line across the sites in a direction u; expanding a circle starting from a vantage point v; and sweeping a ray from v to give a cyclic permutation.
Applying the Rasch model: Fundamental measurement in the human sciences
, 2001
"... I guess I just grew sick and tired of the same old request after almost every presentation I made at conferences involving developmental psychologists: “Trevor, could you just give me a simple ten minute explanation of what Rasch analysis is all about? ” After a dozen or so inquiries of this nature, ..."
Abstract

Cited by 319 (4 self)
 Add to MetaCart
, I thought there must be a shortcut. A couple of us Piagetians gathered and developed a little web site for developmentalists interested in Rasch analysis. When we tried to suggest introductory readings for our colleagues — many of whom had very little explicit training in statistics
Image Segmentation by Data Driven Markov Chain Monte Carlo
, 2001
"... This paper presents a computational paradigm called Data Driven Markov Chain Monte Carlo (DDMCMC) for image segmentation in the Bayesian statistical framework. The paper contributes to image segmentation in three aspects. Firstly, it designs effective and well balanced Markov Chain dynamics to exp ..."
Abstract

Cited by 277 (32 self)
 Add to MetaCart
, clustering, region growing, splitmerge, SNAKEs, region competition, are revealed as either realizing Markov chain dynamics or computing importance proposal probabilities. We report some results on color and grey level image segmentation in this paper and refer to a detailed report and a web site
PERSPECTIVE Permutation
"... tests for univariate or multivariate analysis of variance and regression ..."
Sequences realized by oligomorphic permutation groups
 J. Integer Seq
, 2000
"... Abstract: The purpose of this paper is to identify, as far as possible, those sequences in the Encyclopedia of Integer Sequences which count orbits of an infinite permutation group acting on nsets or ntuples of elements of the permutation domain. The paper also provides an introduction to the prop ..."
Abstract

Cited by 15 (0 self)
 Add to MetaCart
Abstract: The purpose of this paper is to identify, as far as possible, those sequences in the Encyclopedia of Integer Sequences which count orbits of an infinite permutation group acting on nsets or ntuples of elements of the permutation domain. The paper also provides an introduction
THE NUMBER OF PERMUTATIONS REALIZED BY A SHIFT
, 909
"... Abstract. A permutation π is realized by the shift on N symbols if there is an infinite word on an Nletter alphabet whose successive left shifts by one position are lexicographically in the same relative order as π. The set of realized permutations is closed under consecutive pattern containment. P ..."
Abstract

Cited by 10 (7 self)
 Add to MetaCart
Abstract. A permutation π is realized by the shift on N symbols if there is an infinite word on an Nletter alphabet whose successive left shifts by one position are lexicographically in the same relative order as π. The set of realized permutations is closed under consecutive pattern containment
realizations
"... Nesse artigo apresentase um breve histórico das realizações do ITRS, dando ..."
Abstract
 Add to MetaCart
Nesse artigo apresentase um breve histórico das realizações do ITRS, dando
NonMalleable NonInteractive Zero Knowledge and Adaptive ChosenCiphertext Security
, 1999
"... We introduce the notion of nonmalleable noninteractive zeroknowledge (NIZK) proof systems. We show how to transform any ordinary NIZK proof system into one that has strong nonmalleability properties. We then show that the elegant encryption scheme of Naor and Yung [NY] can be made secure against ..."
Abstract

Cited by 187 (18 self)
 Add to MetaCart
the strongest form of chosenciphertext attack by using a nonmalleable NIZK proof instead of a standard NIZK proof. Our encryption scheme is simple to describe and works in the standard cryptographic model under general assumptions. The encryption scheme can be realized assuming the existence of trapdoor
Scale invariance of the PNG droplet and the Airy process
 J. Stat. Phys
"... We establish that the static height fluctuations of a particular growth model, the PNG droplet, converges upon proper rescaling to a limit process, which we call the Airy process, A(y). The Airy process is stationary, it has continuous sample paths, its single “time ” (fixed y) distribution is the T ..."
Abstract

Cited by 176 (21 self)
 Add to MetaCart
, which can be analyzed through fermionic techniques. Specializing our result to a fixed value of y, one reobtains the celebrated result of Baik, Deift, and Johansson on the length of the longest increasing subsequence of a random permutation. 1 The PNG droplet The polynuclear growth (PNG) model is a
Results 1  10
of
282,312