Symmetric functions

Results: 142



#Item
81Ring theory / Symmetric functions / Homogeneous polynomials / Polynomials / Invariant theory / Quasisymmetric function / Elementary symmetric polynomial / Complete homogeneous symmetric polynomial / Schur polynomial / Algebra / Abstract algebra / Mathematics

Formal Power Series and Algebraic Combinatorics Nankai University, Tianjin, China, 2007 Noncommutative Monomial Symmetric Functions. Lenny Tevlin Abstract. This presentation will introduce noncommutative analogs of monom

Add to Reading List

Source URL: www.fpsac.org

Language: English - Date: 2008-01-23 11:18:41
82Functions and mappings / Operator theory / Hilbert space / Tensors / Linear algebra / Symmetric matrix / Self-adjoint operator / Exchangeable random variables / Spectral theorem / Mathematics / Algebra / Mathematical analysis

A Prior Work on Listwise Ranking The exchangeability assumption as defined in this paper on ranking functions seems intuitively natural, and indeed, specific ranking functions previously proposed in the literature are a

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2014-10-31 18:59:56
83Automated theorem proving / Method of analytic tableaux / Predicate logic / Symmetric functions / Modal logic / Lambda calculus / Well-formed formula / Function / Term / Mathematics / Logic / Mathematical logic

DOC Document

Add to Reading List

Source URL: www.calculemus.org

Language: English - Date: 2001-11-06 03:27:00
84Symmetric functions / Representation theory of finite groups / Representation theory / Invariant theory / Homogeneous polynomials / Schur polynomial / Littlewood–Richardson rule / Young tableau / Symmetric group / Abstract algebra / Algebra / Mathematics

Algorithms for the Character Theory of the Symmetric Group Omer Egecio~lu Department of Computer Science University of California

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2008-05-29 17:43:02
85Symmetric matrix / Matrix / Trace / Design of experiments / Representation theory / Algebra / Mathematics / Matrices

A Murnaghan-Nakayama Rule For k-Schur Functions Jason Bandlow (joint work with Anne Schilling, Mike Zabrocki) University of Pennsylvania July 15, 2010 – Fields Institute

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2010-09-09 15:46:36
86Function / Spline / Invariant theory / Symmetric functions / Mathematics / Interpolation / Polynomial

Solving the Incomplete Markets Model with Aggregate Uncertainty using Explicit Aggregation Wouter J. DEN HAAN and Pontus RENDAHLyz July 13, 2009 Abstract

Add to Reading List

Source URL: wouterdenhaan.com

Language: English - Date: 2011-07-21 02:26:04
87NIST hash function competition / Authenticated encryption / Symmetric-key algorithm / Crypt / Advanced Encryption Standard / Cryptography / Cryptographic hash functions / Keccak

Tutorial on Keccak and SHA-3 by Guido Bertoni Abstract: Keccak has been selected as SHA-3 in[removed]It is a very flexible algorithm allowing to perform all the primitives of symmetric key cryptography: stream cipher, hash

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2014-07-02 15:54:48
88Symmetric functions / Abstract algebra / Homogeneous polynomials / Invariant theory / Polynomials / Algebra / Mathematics

Grade 9 – Unit 5: Polynomials Student Name: ___________________ Assessment Focus Rubric Date: ___________________ Lesson 1: Modeling Polynomials Not Yet Adequate Adequate

Add to Reading List

Source URL: www.scs.sk.ca

Language: English - Date: 2009-12-30 14:04:42
89Cryptographic hash functions / Data Encryption Standard / Advanced Encryption Standard / Symmetric-key algorithm / Key size / FIPS 140-2 / Block cipher / SHA-2 / Message authentication code / Cryptography / Key management / Cryptography standards

ITS-SEC-01 Data Encryption and Cryptography

Add to Reading List

Source URL: oit.ohio.gov

Language: English - Date: 2010-03-08 12:44:45
90Public-key cryptography / Key size / Ciphertext / Key / Symmetric-key algorithm / Crypt / Cipher / Data Encryption Standard / SHA-2 / Cryptography / Key management / Cryptographic hash functions

Microsoft PowerPoint - 2013_KYCOT_SecurityMonth_UsingEncryption.pptx

Add to Reading List

Source URL: technology.ky.gov

Language: English - Date: 2013-11-05 08:59:32
UPDATE