scientific article; zbMATH DE number 1099195

From MaRDI portal
Publication:4369384

zbMath0883.68015MaRDI QIDQ4369384

Donald E. Knuth

Publication date: 18 December 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Series expansions for analytic systems linear in controlGlobally optimal clusterwise regression by column generation enhanced with heuristics, sequencing and ending subset optimizationAsymptotic analysis via Mellin transforms for small deviations in \(L^2\)-norm of integrated Brownian sheetsNew algorithms for Taylor coefficients of indefinite integrals and their applicationsParameter-hiding order revealing encryptionWhat is a sorting function?Efficient optimally lazy algorithms for minimal-interval semanticsOrbit Dirichlet series and multiset permutationsImproving quantum state transfer efficiency and entanglement distribution in binary tree spin network through incomplete collapsing measurementsMathematics, philosophical and semantic considerations on infinity. II: Dialectical visionStable concurrent synchronization in dynamic system networksNew statistical randomness tests based on length of runsSimulated division with approximate factoring for the multiple recursive generator with both unrestricted multiplier and non-Mersenne prime modulusAn experimental study of approximation algorithms for the joint spectral radiusRandom binary search tree with equal elementsExploring confusion in product ciphers through regression analysisEnumerative encoding of correlation-immune Boolean functionsSorting and generating reduced wordsFast modular multi-exponentiation using modified complex arithmeticAre electroencephalogram (EEG) signals pseudo-random number generators?The weak-heap data structure: variants and applicationsISB-tree: A new indexing scheme with efficient expected behaviourShape matching using a binary search tree structure of weak classifiersThe universality of iterated hashing over variable-length stringsAscending runs of sequences of geometrically distributed random variables: A probabilistic analysisSelective association rule generatorModel based peer-to-peer estimator over wireless sensor networks with lossy channelsPadovan numbers as sums over partitions into odd partsFurther advances on low-energy lunar impact dynamicsProfiles of PATRICIA triesA quantitative study of pure parallel processesGlobal stability analysis with a discretization approach for an age-structured multigroup SIR epidemic modelBenford's law and continuous dependent random variablesImproved bounds for finger search on a RAMSurvey on hardware implementation of random number generators on FPGA: theory and experimental analysesEfficient adaptive collect algorithmsMore is less: perfectly secure oblivious algorithms in the multi-server settingQuantifying local randomness in human DNA and RNA sequences using Erdös motifsEnumerating permutations by their run structureEnumerations of plane trees with multiple edges and Raney lattice pathsA stochastically quasi-optimal search algorithm for the maximum of the simple random walkThe geometry of impacts on a synchronous planetary satelliteSample-path analysis of general arrival queueing systems with constant amount of work for all customersScheduling results applicable to decision-theoretic troubleshootingA fast algorithm for order-preserving pattern matchingAdaptive initialization algorithm for ad hoc radio networks with carrier sensingValue-at-Risk model for hazardous material transportationOn differences of zeta valuesOn the evaluation of finite-time ruin probabilities in a dependent risk modelWeighted sampling without replacement from data streamsMathematical morphology on irregularly sampled data in one dimensionEnumerating models of DNF faster: breaking the dependency on the formula sizeA necessary condition for c-Wilf equivalenceOrder acceptance and scheduling with consideration of service levelCombinatorial proofs of some properties of tangent and Genocchi numbersConstructing quantum hash functions based on quantum walks on Johnson graphsDrinfeld modules with complex multiplication, Hasse invariants and factoring polynomials over finite fieldsPickover biomorphs and non-standard complex numbersChecking the quality of approximation of \(p\)-values in statistical tests for random number generators by using a three-level testDynamic space efficient hashingFun-Sort -- or the chaos of unordered binary searchSingularity analysis, Hadamard products, and tree recurrencesEfficiency test of pseudorandom number generators using random walksDeletions in random binary search trees: a story of errorsEffective and efficient restriction on producing the multipliers for the multiple recursive random number generatorReflected Brownian bridge local time conditioned on its local time at the originSome minimum merging networksOn reasoning about structural equality in XML: a description logic approachOptimal alphabetic search trees with restricted maximal heightBranching and bounding improvements for global optimization algorithms with Lipschitz continuity propertiesHashing and canonicalizing Notation 3 graphsAn image encryption scheme with a pseudorandom permutation based on chaotic mapsSort and Search: exact algorithms for generalized dominationLempel-Ziv-78 compressed string dictionariesExtremal permutations in routing cyclesDuality of graded graphs through operadsExtremal values of the Sackin tree balance indexMasking patterns in sequences: A new class of motif discovery with don't caresThe fibres of the Scott map on polygon tilings are the flip equivalence classesA robust scheme of model parameters estimation based on the particle swarm method in the image matching problemSymmetric and quasi-symmetric functions associated to polymatroidsAbout optimal management of work-stealing deques in two-level memoryTweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizesThe \(S\)-digraph optimization problem and the greedy algorithmGenerating random binary trees -- a surveyTightening the bounds on the Baron's omni-sequenceEfficient proximal mapping computation for low-rank inducing normsSharp phase transition for random loop models on treesA note on Dekker's FastTwoSum algorithmFault tolerant sorting -- theoretical and empirical analyses of the randomized quickmergesort algorithmHardware implementation of multiplication over quartic extension fieldsPseudorandom vector generation using elliptic curves and applications to Wiener processesOn the negation-limited circuit complexity of mergingMeasuring with jugsThe distributions of the entries of Young tableauxPreimages under the bubblesort operatorTwo descent statistics over \(321\)-avoiding centrosymmetric involutionsAnalysis of quickselect under Yaroslavskiy's dual-pivoting algorithmEnumeration of maximal common subsequences between two stringsLocating factors of the infinite Fibonacci wordCan one hear a matrix? Recovering a real symmetric matrix from its spectral dataHollow HeapsEquivalency in periodicity and spectral test for two associated multiple recursive random number generatorsFast Mesh-to-Mesh Remaps Using Hash AlgorithmsSum of alternating-like series as definite integralsEfficient Computation of Higher-Order Cumulant TensorsFighting fish and two-stack sortable permutationsNormal approximations for descents and inversions of permutations of multisetsThe \(m\)th longest runs of multivariate random sequencesOptimum service capacity and demand management with price incentivesTractable Relaxations of Composite FunctionsBridging between short-range and long-range dependence with mixed spatio-temporal Ornstein–Uhlenbeck processesArray Layouts for Comparison-Based SearchingBijections for faces of the Shi and Catalan arrangementsModular Fuss-Catalan numbersEfficient and reliable algorithms for the computation of non-twist invariant circlesPartial-Collision Attack on the Round-Reduced Compression Function of Skein-256On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomialsMallows permutations and finite dependenceAbout optimal management of FIFO-queues in two-level memoryOn testing pseudorandom generators via statistical tests based on the arcsine lawGlobal analysis of a new reaction-diffusion multi-group SVEIR propagation model with time delayRegenerative random permutations of integersRed-black trees with constant update timeGeometric p-Center Problems with Centers Constrained to Two LinesOn some combinatorial properties of LINUX process treesThe effect of bottleneck size on evolution in nested Darwinian populationsUnnamed ItemSOME TOPOLOGICAL RESULTS ON LEVEL SETS AND MULTIFRACTAL SETSDEGREE-BASED GINI INDEX FOR GRAPHSClean Reversible Simulations of Ranking Binary TreesRNA secondary structures with given motif specification: combinatorics and algorithmsSingle machine scheduling with delivery dates and cumulative payoffsExploring the long-term dynamics of perturbed Keplerian motion in high degree potential fieldsA uniform paradigm to succinctly encode various families of treesDetecting the morphic images of a word : improving the general algorithmA modular extension for a computer algebra systemGeneric smooth representationsThe \(k\)-cut model in deterministic and random treesConnection Scan AlgorithmDensity Independent Algorithms for Sparsifying k-Step Random WalksPairing heaps: the forward variant.Generating random factored ideals in number fieldsPattern classes of permutations via bijections between linearly ordered setsCombinatorial sums and finite differencesImproving the pseudo-randomness properties of chaotic maps using deep-zoomComputing the modular inverses is as simple as computing the GCDsUnnamed ItemA framework for incremental generation of closed itemsetsConstant-time sortingSmall \(k\)-pyramids and the complexity of determining \(k\)The CB tree: a practical concurrent self-adjusting search treeIncreasing robustness in global adaptive quadrature through interval selection heuristicsAn algorithm for multiple-precision floating-point multiplicationSmall gaps in the spectrum of the rectangular billiardAlgorithmic combinatorics based on slicing posetsEntropy rates for Horton self-similar treesHashing via finite fieldThe faster methods for computing Bessel functions of the first kind of an integer order with application to graphic processorsTesting randomness via aperiodic wordsRobust principal component pursuit via inexact alternating minimization on matrix manifoldsК вопросу о предельном распределении серий в случайной двоичной последовательностиUnnamed ItemHashed Patricia Trie: Efficient Longest Prefix Matching in Peer-to-Peer SystemsUnnamed ItemRobust chaos of cubic polynomial discrete maps with application to pseudorandom number generatorsСпектрально-линейный и спектрально-дифференциальный методы построения S-бокcов с близкими к оптимальным значениями криптографических параметровForest resampling for distributed sequential Monte CarloHalving the Bounds for the Markov, Chebyshev, and Chernoff Inequalities Using SmoothingCryptology, Mathematics, and TechnologyUnnamed ItemBinary representation of natural numbersRepresenting Permutations with Few MovesGlobal dynamic behavior of a multigroup cholera model with indirect transmissionFast Compressed Tries through Path DecompositionsReal-time Traffic Assignment Using Engineered Customizable Contraction HierarchiesFinding Safe Strategies for Competitive Diffusion on TreesArithmetic and \(k\)-maximality of the cyclic free magmaAn Efficient Implementation of the CRT Algorithm Based on an Interval-Index Characteristic and Minimum-Redundancy Residue CodeNumerical validation of compensated algorithms with stochastic arithmeticPermutation patterns and cell decompositionsUnnamed ItemR-2 composition tests: a family of statistical randomness tests for a collection of binary sequencesEnumerating Large Orbits and Direct CondensationDynamic Space Efficient Hashing.A Twin Error Gauge for Kaczmarz's IterationsProbabilistic analysis of algorithms for the Dutch national flag problemOn explicit formulae for Bernoulli numbers and their counterparts in positive characteristicImportance sampling for partially observed temporal epidemic modelsMahonian STAT on rearrangement class of wordsGeneric undecidability of universal theoriesRigorous validation of stochastic transition pathsEfficient big integer multiplication and squaring algorithms for cryptographic applicationsOn Floyd and Rivest's SELECT algorithmInternet routing between autonomous systems: fast algorithms for path tradingNo easy puzzles: hardness results for jigsaw puzzlesMrDIRECT: a multilevel robust DIRECT algorithm for global optimization problemsScalable mechanisms for rational secret sharingPhase transition for Parking blocks, Brownian excursion and coalescenceThe arithmetic computational complexity of linear transformsA Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMsToken Swapping on TreesFurther analysis of the statistical independence of the NIST SP 800-22 randomness testsOn the approximation of Euclidean SL via geometric methodWhite Noise Test from Ordinal Patterns in the Entropy–Complexity PlaneCombinatorial and stochastic properties of ranked tree‐child networksEfficient Generic Quotients Using Exact ArithmeticUnnamed ItemSoftware as storytelling: a systematic literature reviewPlanar tanglegram layouts and single edge insertionEuMMD: efficiently computing the MMD two-sample test statistic for univariate dataHighly optimized quantum circuits synthesized via data-flow enginesIdentities and periodic oscillations of divide-and-conquer recurrences splitting at halfLinear-time 2-party secure merge from additively homomorphic encryptionConstrained polynomial zonotopesA color-avoiding approach to subgraph counting in bounded expansion classesPrivate evaluation of a decision tree based on secret sharingFast exact Bayesian inference for sparse signals in the normal sequence modelGaussian Distribution of Trie Depth for Strongly Tame SourcesSimplifying Inclusion–Exclusion FormulasUnnamed ItemStability Analysis of Inline ZFP Compression for Floating-Point Data in Iterative MethodsUnnamed ItemGeneralization of Knuth's Formula for the Number of Skew TableauxProfiles of random trees: correlation and width of random recursive trees and binary search treesON GENERIC UNDECIDABILITY OF HILBERT’S TENTH PROBLEM FOR POLYNOMIAL TREESON GENERIC COMPLEXITY OF THE EXISTENTIAL THEORIESMoving boundary transformation for American call options with transaction cost: finite difference methods and computingEx post efficiency in the buyer's bid double auction when demand can be arbitrarily larger than supplyAn experimental study of a compressed indexReconstruction of piecewise constant functions from x-ray dataPolynomial hash functions are reliableMultisets, heaps, bags, families: What is a multiset?COOMA: A Components Overlaid Mining Algorithm for Enumerating Connected Subgraphs with Common ItemsetsCoin-Flipping, Ball-Dropping, and Grass-Hopping for Generating Random Graphs from Matrices of Edge ProbabilitiesInference for conditioned Galton-Watson trees from their Harris pathInequalities involving the generating function for the number of partitions into odd partsKoopman operator and its approximations for systems with symmetriesUnnamed ItemCalculation of Discrepancy Measures and ApplicationsClifford Algebras, Spin Groups and Qubit Trees