نتایج جستجو برای: dependence polynomial
تعداد نتایج: 253488 فیلتر نتایج به سال:
Multivariate integration of high dimension s occurs in many applications. In many such applications, for example in finance, integrands can often be approximated by sums of functions of just a few variables. In this situation the superposition (or effective) dimension is small, and we can model the problem with finite-order weights, where the weights describe the relative importance of each dis...
the topological index of a graph g is a numeric quantity related to g which is invariant underautomorphisms of g. the vertex pi polynomial is defined as piv (g) euv nu (e) nv (e).then omega polynomial (g,x) for counting qoc strips in g is defined as (g,x) =cm(g,c)xc with m(g,c) being the number of strips of length c. in this paper, a new infiniteclass of fullerenes is constructed. the ...
We present two deterministic algorithms for the arithmetic circuit identity testing problem. The running time of our algorithms is polynomially bounded in s and m, where s is the size of the circuit and m is an upper bound on the number monomials with non-zero coefficients in its standard representation. The running time of our algorithms also has a logarithmic dependence on the degree of the p...
Abstract Bivariate polynomial copulas of degree 5 (containing the family Eyraud-Farlie-Gumbel-Morgenstern copulas) are in a one-to-one correspondence to certain real parameter triplets ( , b c ), i.e., some set polynomials two variables 1: p x y ) = ax + by . The parameters yielding copula is characterized and visualized detail. Polynomial satisfying particular (in)equalities (symmetry, Schur c...
A belief network comprises a graphical representation of dependencies between variables of a domain and a set of conditional probabilities associated with each dependency. Unless P=NP, an efficient, exact algorithm does not exist to compute probabilistic inference in belief networks. Stochastic simulation methods, which often improve run times, provide an alternative to exact inference algorith...
امروزه با گسترش تکنولوژی بی سیم و نیاز به برقراری امنیت استفاده از رمزنگاری امری اجتناب ناپذیر می نماید. گروه های تحقیقاتی زیادی تلاش می کنند که سیستم های رمزنگاری ایمن طراحی کنند. اما یک پیاده سازی بد می تواند تمامی این تلاش ها را بیهوده سازد. به همین دلیل در کنار طراحی و تحلیل امنیت سیستم های رمزنگاری، بحث پیاده سازی آن ها در دستور کار گروه های تحقیقاتی قرار می گیرد. در پیاده سازی دو موضوع م...
let $g$ be a simple graph of order $n$. we consider the independence polynomial and the domination polynomial of a graph $g$. the value of a graph polynomial at a specific point can give sometimes a very surprising information about the structure of the graph. in this paper we investigate independence and domination polynomial at $-1$ and $1$.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید