نتایج جستجو برای: admissible vector

تعداد نتایج: 204780  

2011
Ze Tao Xiaoxia Liu

IA Petri net controller method for Petri net model with uncontrollable transitions that enforces the conjunctions a set of linear inequalities on the Parikh vector or place markings is proposed. The method for constructing a Petri net feedback controller is based on part design and Petri net reduction technique. Constraints are classified into admissible and inadmissible constraints. Matrix-Tra...

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Daren Kunkle Matthias Schröder

Representations of spaces are the key device in Type-2 Theory of Effectivity (TTE) for defining computability on non-countable spaces. Almost-compact representations permit a simple measurement of the time complexity of functions using discrete parameters, namely the desired output precision together with “size” information about the argument, rather than continuous ones. We present some intere...

2015
Jelani Nelson

where the inf is taken over all admissible sequences. We also let dX(T ) denote the diameter of T with respect to norm ‖·‖X . For the remainder of this section we make the definitions πrx = argminy∈Tr‖y − x‖X and ∆rx = πrx− πr−1x. Throughout this section we let ‖ · ‖ denote the `2→2 operator norm in the case of matrix arguments, and the `2 norm in the case of vector arguments. Krahmer, Mendelso...

2001
Gavin Johnstone

We calculate fusion rules for the admissible representations of the superalgebra ŝl(2|1;C)k at fractional level k = −1/2 in the Ramond sector. By representing 3point correlation functions involving a singular vector as the action of differential operators on the sl(2|1;C) invariant 3-point function, we obtain conditions on permitted quantum numbers involved. We find that in this case the primar...

Journal: :Oper. Res. Lett. 2017
Danial Davarnia Gérard Cornuéjols

We study a class of quadratic stochastic programs where the distribution of random variables has unknown parameters. A traditional approach is to estimate the parameters using a maximum likelihood estimator (MLE) and to use this as input in the optimization problem. For the unconstrained case, we show that an estimator that shrinks the MLE towards an arbitrary vector yields a uniformly better r...

2008
Vytautas Pašk

Let F be a finite extension of Q p , p > 2. We construct admissible unitary completions of certain representations of GL 2 (F) on L-vector spaces, where L is a finite extension of F. When F = Q p using the results of Berger, Breuil and Colmez we obtain some results about lifting 2-dimensional mod p representations of the absolute Galois group of Q p to crystabelline representations with given H...

2001
Gavin Johnstone

We calculate fusion rules for the admissible representations of the superalgebra ŝl(2|1;C)k at fractional level k = −1/2 in the Ramond sector. By representing 3point correlation functions involving a singular vector as the action of differential operators on the sl(2|1;C) invariant 3-point function, we obtain conditions on permitted quantum numbers involved. We find that in this case the primar...

Journal: :Proceedings of the American Mathematical Society 2020

Journal: :Graphs and Combinatorics 2021

A pinnacle of a permutation is value that larger than its immediate neighbors when written in one-line notation. In this paper, we build on previous work characterized admissible sets permutations. For these sets, there can be specific orderings the pinnacles are not admissible, meaning they realized by any permutation. Here characterize orderings, using relationship between x and rank set to b...

Journal: :EURASIP J. Audio, Speech and Music Processing 2013
Wei Li Xiu Zhang Zhurong Wang

Digital audio has been ubiquitous over the past decade. Since it can be easily modified by editing tools, there has been a strong need to protect its content for secure multimedia applications. Previous audio authentication algorithms are mainly focused on either human speech or general audio with music as part of the test data, while special research on music authentication has been somewhat n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید