Search alternatives:
combinatorial method » combination methods (Expand Search), combinatorial design (Expand Search)
method theory » meson theory (Expand Search)
flow theory » from theory (Expand Search)
Showing 1 - 5 results of 5 for search '(( combinatorial flow theory ) OR ( combinatorial method theory ))', query time: 0.09s Refine Results
  1. 1

    On the intermediate Jacobian of M5-branes by Jefferson, Patrick, Kim, Manki

    Published 2024
    “…Our method utilizes simple combinatorial formulae (that we prove) for the equivariant Hodge numbers of the Calabi-Yau orientifolds and their prime toric divisors, along with a formula for the Euler characteristic of vertical divisors in the corresponding elliptic Calabi-Yau fourfold. …”
    Get full text
    Article
  2. 2

    Mathematical foundation of data science by Fang, Xiaowei

    Published 2020
    “…The theoretical tools includesa bunch of comparison inequalities for Gaussian processes and the technique of Gaussian interpo-lation, which helps us ferret out the bound on the operator norm of Gaussian random matrix anda lowered bound on the Gaussian width, as well as bounds on the diameter of random projectionof sets. Later, the method of chaining and the combinatorial reasoning based on the VC dimensionenables us to bound the subgaussian-incremented processes and random quadratic form, extending two applications about empirical processes and statistical learning theory. …”
    Get full text
    Final Year Project (FYP)
  3. 3

    Signal processing on simplicial complexes with vertex signals by Ji, Feng, Kahn, Giacomo, Tay, Wee Peng

    Published 2023
    “…A graph or a 1-complex is a combinatorial object that models binary relations, which do not directly capture complex high arity relations. …”
    Get full text
    Journal Article
  4. 4

    Nonlinear regression approach for GPS multipath mitigation : from code to carrier-phase measurements by Phan, Quoc Huy

    Published 2012
    “…Advantageously, while being scalable with data rate, the proposed method is shown to be not harmful to other signals (simulation). …”
    Get full text
    Thesis
  5. 5