Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








90 Hits in 2.1 sec

Binary Prime Tableau Sequences [article]

Prashanth Busireddygari, Subhash Kak
2017 arXiv   pre-print
This paper proposes a new class of random sequences called binary primes tableau (PT) sequences that have potential applications in cryptography and communications.  ...  We also examine the dual to the PT sequences obtained by adding the rows of the tableau. It is shown that PT sequences have excellent autocorrelation properties.  ...  Here we go beyond that idea and generate pseudorandom sequences by folding the binary primes sequences using p columns.  ... 
arXiv:1704.08718v1 fatcat:uhtxmbe5dbfeffg4ioxwwe2o2a

Natural sorting over permutation spaces

R. M. Baer, P. Brock
1968 Mathematics of Computation  
of pseudorandom x, 0 < x < 1.  ...  Now, if at the ¿th step, the first i entries of the sequence have been used in the developing tableau then at the next step the element x¿+i is inserted into the first row of the tableau by displacing  ... 
doi:10.1090/s0025-5718-1968-0228216-8 fatcat:gjtl65k66jfffianhi4biweazq

Natural Sorting Over Permutation Spaces

R. M. Baer, P. Brock
1968 Mathematics of Computation  
of pseudorandom x, 0 < x < 1.  ...  Now, if at the ¿th step, the first i entries of the sequence have been used in the developing tableau then at the next step the element x¿+i is inserted into the first row of the tableau by displacing  ... 
doi:10.2307/2004668 fatcat:tbvhv46rmfcmxjm6vvclxgecli

Fast and accurate protein substructure searching with simulated annealing and GPUs

Alex D Stivala, Peter J Stuckey, Anthony I Wirth
2010 BMC Bioinformatics  
Results: We developed an improved heuristic for tableau-based protein structure and substructure searching using simulated annealing, that is as fast or faster and comparable in accuracy, with some widely  ...  AUC versus elapsed time for SA Tableau Search on different platforms for the 200 query set against the ASTRAL SCOP 95% sequence identity non-redundant database.  ...  Because the CUDA library does not contain an equivalent of the standard C library function rand() or similar, we use the CUDA SDK implementation [59] of the Mersenne Twister [60] pseudorandom number  ... 
doi:10.1186/1471-2105-11-446 pmid:20813068 pmcid:PMC2944279 fatcat:hienecc67nfppfz3etiwn5fitu

The Winnability of Klondike Solitaire and Many Other Patience Games [article]

Charlie Blake, Ian P. Gent
2023 arXiv   pre-print
For example, we discuss in Section 7.2 that this allowed us to identify and fix a bug in our pseudorandom instance generator.  ...  sequence.  ...  SP: What card may be put in a free space in the tableau, or sequence if MG allows it.  ... 
arXiv:1906.12314v4 fatcat:btabu5rqpbfgfeowp2bilv4fmq

Plactic signatures [article]

Daniel R. L. Brown
2021 IACR Cryptology ePrint Archive  
Plactic signatures use the plactic monoid (Knuth multiplication of semistandard tableaus) and full-domain hashing (SHAKE).  ...  More generally, every sequence (with entries in same finite ordered set as entries of the tableaus) represents a unique tableau, via application of the Robinson-Schensted algorithm.  ...  Each tableau has multiple sequence representations, but the standard representation is the row reading of the tableau. The values d and e must be communicated in standard representation.  ... 
dblp:journals/iacr/Brown21c fatcat:35ahrbvftrglfdqhhjpobu5leu

Step size control in the numerical solution of stochastic differential equations

Susanne Mauthner
1998 Journal of Computational and Applied Mathematics  
We use an inversive congruential generator (with parameters p=231 -1, a=b= 1, see [8] ) for generating a sequence of independent uniformly distributed pseudorandom numbers in the interval [0, 1 ).  ...  By the polar method [7] , we transform in each step two successive pseudorandom numbers into two independent standard normally distributed pseudorandom numbers and we obtain two pseudorandom numbers which  ... 
doi:10.1016/s0377-0427(98)00139-3 fatcat:3eet7k5wm5d73k2f77suuop3vy

Tighter Bounds on the Independence Number of the Birkhoff Graph [article]

Leonardo Nagami Coregliano, Fernando Granha Jeronimo
2020 arXiv   pre-print
Recall that a partition of n, λ ⊢ n, is a tuple λ := (λ 1 , . . . , λ s ) of positive integers with λ 1 ≥ · · · ≥ λ s and s i=1 λ i = n; the length s of λ as a sequence is called the height of λ and denoted  ...  A standard tableau of shape λ ⊢ n is a filling of the Young diagram of λ, where each box is filled with a distinct number from [n] so that each row and each column is increasing (see Fig. 1b ).  ...  If A ⊆ S n is (k, r)pseudorandom and K λ,h n k = 0, then Proof.  ... 
arXiv:2007.05841v2 fatcat:7e6yfx5e2rgzfjnk2p3j5vg3zy

Set partitions, tableaux, and subspace profiles under regular split semisimple matrices [article]

Amritanshu Prasad, Samrith Ram
2022 arXiv   pre-print
For partitions whose parts are at most two, these polynomials are the non-zero entries of the Catalan triangle associated to the q-Hermite orthogonal polynomial sequence.  ...  The definition of a splitting subspace can be traced back to the work of Niederreiter [24] on pseudorandom number generation.  ...  Thus a sequence of i non-empty Dyck paths, followed by a non-empty prefix Dyck path is obtained. 4. Change the last step of each Dyck path from SE to NE and concatenate.  ... 
arXiv:2112.00479v2 fatcat:yrh7vc5furejfm5nj7za6nse2u

Survey: Recent Modifications in Vigenere Cipher

Ranju S Kartha, Varghese Paul
2014 IOSR Journal of Computer Engineering  
The Vigenère cipher consists of several simple substitution ciphers in sequence with different shift values.  ...  In extended Vigenere cipher a new symbol is added into the row and column of the Vigenere Tableau. The new symbol can be used to represent or to locate the blank space in the plaintext.  ... 
doi:10.9790/0661-16294953 fatcat:roqzjiphqfg27grwwl5tlg6zdy

Concave Minimization Via Collapsing Polytopes

James E. Falk, Karla L. Hoffman
1986 Operations Research  
In addition to these small examples used primarily for feasibility testing, the major test effort involved the pseudorandom generation of polytopes coupled with the generation of concave objective functions  ...  Neighbors satisfying (1) can be identified from the tableau representing v'.  ... 
doi:10.1287/opre.34.6.919 fatcat:fththmwr2bf3dmks5ls5u63z4m

Realistic analysis of some randomized algorithms

Eric Bach
1991 Journal of computer and system sciences (Print)  
(xi, . . . . x,, xr+i ) be a liar contained in E,*, and consider the following tableau, which represents the action of the primality test on input xobservation is this: row V,in -1 of this tableau contains  ...  The performance of Monte Carlo integration procedures using pseudorandom numbers has been studied by Niederreiter [23] .  ... 
doi:10.1016/0022-0000(91)90038-7 fatcat:7vlmjmjltfbuza4haclyl42vmi

Realistic analysis of some randomized algorithms

E. Bach
1987 Proceedings of the nineteenth annual ACM conference on Theory of computing - STOC '87  
(xi, . . . . x,, xr+i ) be a liar contained in E,*, and consider the following tableau, which represents the action of the primality test on input xobservation is this: row V,in -1 of this tableau contains  ...  The performance of Monte Carlo integration procedures using pseudorandom numbers has been studied by Niederreiter [23] .  ... 
doi:10.1145/28395.28444 dblp:conf/stoc/Bach87 fatcat:uwtwwg53djh37jbmdtpxfvsx3i

Fourier Analysis of Uniform Random Number Generators

R. R. Coveyou, R. D. Macpherson
1967 Journal of the ACM  
Any general sequence C as defined above is periodic; that is, the sequences C and X are periodic from some point on at least.  ...  The method is that of Fourier analysis off the output sequences of such generators.  ...  We arbitrarily take as a figure of merit (for uniformity of distribution of (p+ l)4uples of consecutive pseudorandom numbers) the squared reciprocal of the wavde~gth of the longest wave, denoting it by  ... 
doi:10.1145/321371.321379 fatcat:2yz5dmjfdrg7xcihtnbvehio44

Improved Efficient Arguments [chapter]

Joe Kilian
1995 Lecture Notes in Computer Science  
However, we can use pseudorandom generators to conserve bits in a straightforward manner.  ...  Finally, we show how to save random bits by using cryptographically secure pseudorandom generators.  ... 
doi:10.1007/3-540-44750-4_25 fatcat:v45yljjhjbf2lcl2fhxdmnjyjq
« Previous Showing results 1 — 15 out of 90 results