Search results
Jump to navigation
Jump to search
- '''Complete spatial randomness''' ('''CSR''') describes a [[point process]] whereby point events occur wit ..., whereas in most other statistical contexts it is referred to the concept of a spatial Poisson process.<ref name="Omaimon2010DataM"/> ...5 KB (834 words) - 11:48, 17 April 2024
- '''Static hashing''' is a form of [[Hash function|hashing]] where lookups are performed on a finalized dictio ...e2013">{{cite book | author = Daniel Roche | year = 2013 | title = SI486D: Randomness in Computing, Hashing Unit | publisher = United States Naval Academy, Compu ...3 KB (482 words) - 01:07, 19 November 2023
- {{Short description|Extensions of the concept of randomness}} ...nguage=en}}</ref> This classification builds upon the three main states of randomness: mild, slow, and wild. ...12 KB (1,782 words) - 20:45, 14 April 2024
- ...xtractor that has been proven to produce truly random output from any type of weakly random source. ...neously keeping the seed length low. Intuitively, this means that as much randomness as possible has been "extracted" from the source. ...19 KB (2,979 words) - 23:36, 8 December 2024
- {{Short description|Sequence of numbers consisting of 1 and -1}} {{about|sign sequences in mathematics|sequences of roadside signs|Burma-Shave}} ...6 KB (794 words) - 21:29, 23 February 2025
- {{Short description|Cryptographical test for pseudo-randomness}} ...Computer Science, 1982.</ref> against pseudo-random sequences. A sequence of words passes Yao's test if an attacker with reasonable computational power ...3 KB (416 words) - 21:47, 18 May 2023
- ...n-of-dependent-dirichlet-processes-based-on-poisson-processes Construction of dependent Dirichlet processes based on compound Poisson processes], Neural ...is invalid for modelling temporal and spatial processes in which the order of data points plays a critical role in creating meaningful [[Cluster analysis ...3 KB (382 words) - 13:26, 30 June 2024
- ...''worst case''. By giving a security reduction to the worst-case scenario of a difficult mathematical problem, SWIFFT gives a much stronger security gua ...refore, its practical use would lie mostly in applications where the proof of collision-resistance is particularly valuable, such as digital signatures t ...13 KB (1,961 words) - 23:56, 19 October 2024
- ...of textures are often used to model surface or volumetric representations of natural elements such as [[wood]], [[marble]], [[granite]], [[metal]], [[ro ...hese functions are used as a [[Number|numerical]] representation of the "[[randomness]]" found in nature. ...6 KB (821 words) - 17:59, 22 March 2024
- ...and published in 2003 by the [[Cambridge University Press]], as volume 55 of the London Mathematical Society Student Texts book series. ...rk]]s, and the [[derandomization]] of [[randomized algorithm]]s. For these applications, the graph must be constructed explicitly, rather than merely having its ex ...8 KB (1,129 words) - 08:01, 18 February 2025
- ...upon bond]] prices, and in its most general form, today's prices for a set of caps, floors or European [[swaption]]s. The model was introduced by [[Fisch The main state variable of the model is the short rate, which is assumed to follow the stochastic diff ...4 KB (583 words) - 13:24, 19 February 2025
- ...iables and requires that this rate is essentially the same within a region of the [[parameter space]] being considered. ...h can be used to prove the [[convergence of random variables|convergence]] of [[extremum estimator]]s.<ref>{{cite journal |last=Newey |first=Whitney K. | ...6 KB (770 words) - 08:54, 31 August 2024
- ...finite set of binary strings. Consider model classes consisting of models of given maximal [[Kolmogorov complexity]]. ...The Kolmogorov structure function precisely quantifies the goodness-of-fit of an individual model with respect to individual data. ...17 KB (2,699 words) - 20:32, 3 October 2023
- ...A |s2cid=204836822 }}</ref> and (ii) understanding the universal structure of non-equilibrium and thermalization processes in quantum many-body dynamics. ...e <math>x</math> index specifies the lattice integer which connects a pair of qubits, and <math>\tau</math> is the time step. ...11 KB (1,596 words) - 03:23, 28 January 2025
- ...ounting algorithm]]s, the technique was later applied to a broad selection of [[Classification algorithm|classification]] and [[Regression analysis|regre ....g., counting the distinct elements of a stream), different randomizations of the algorithm (say, with different [[hash function]]s) should be used for r ...4 KB (550 words) - 23:14, 30 January 2025
- ...atch Randomized Matching Algorithm For Image Manipulation – Communications of the ACM |url=https://cacm.acm.org/research/the-patchmatch-randomized-matchi ...rk will be too hard to complete. So the following algorithm is done in a [[Randomness|randomized]] approach in order to accelerate the [[calculation]] speed. ...5 KB (745 words) - 10:56, 1 December 2024
- ...r, CS can be used to reconstruct a [[sparse vector]] from a smaller number of measurements, provided the signal can be represented in sparse [[Domain (ma ...a domain where only <math>{\it M}</math> [[Coefficient|coefficients]] out of <math>{\it N}</math> (where <math>{M \ll N}</math>) are non-zero, then the ...8 KB (1,113 words) - 08:27, 13 August 2024
- ...[[Authentication|authenticate]] users records, using the biometric inputs of the user as a key. ...n a biometric input.<ref>{{Cite web|title=Fuzzy Extractors: A Brief Survey of Results from 2004 to 2006 |url=https://www.cs.bu.edu/~reyzin/fuzzysurvey.ht ...28 KB (4,642 words) - 22:54, 23 July 2024
- ...s a generalization of the graph regularity method, which refers to the use of [[Szemerédi regularity lemma|Szemerédi's regularity]] and counting lemmas. ...ing lemma]] that estimates number of copies of a fixed graph as a subgraph of a larger graph. ...18 KB (2,817 words) - 03:09, 23 September 2024
- ...graph regularity and the multidimensional Szemerédi theorem|journal=Annals of Mathematics|volume=166|issue=3|pages=897–946|doi=10.4007/annals.2007.166.89 ...pergraphs isomorphic to <math>H</math> it is possible to remove all copies of <math>H</math> by removing at most <math>\varepsilon n^{r}</math> edges. ...14 KB (2,250 words) - 23:49, 27 February 2025