Hasil untuk "cs.CG"

Menampilkan 20 dari ~89016 hasil · dari DOAJ, CrossRef

JSON API
CrossRef Open Access 2016
Institutional shareholder activism in Nigeria

Chinyere Uche, Emmanuel Adegbite, Michael John Jones

Purpose The purpose of this paper is to investigate institutional shareholder activism in Nigeria. It addresses the paucity of empirical research on institutional shareholder activism in sub-Saharan Africa. Design/methodology/approach This study uses agency theory to understand the institutional shareholder approach to shareholder activism in Nigeria. The data are collected through qualitative interviews with expert representatives from financial institutions. Findings The findings indicate evidence of low-level shareholder activism in Nigeria. The study provides empirical insight into the reasons why institutional shareholders might adopt an active or passive approach to shareholder activism. The findings suggest the pension structure involving two types of pension institutions affects the ability to engage in shareholder activism. Research limitations/implications The research study advances our understanding of the status quo of institutional shareholder activism in an African context such as Nigeria. Practical implications The paper makes a practical contribution by highlighting that regulators need to consider how the financial market conditions and characteristics affect effective promotion of better governance practices and performance through shareholder activism. Originality/value This study draws attention to the implication for shareholder activism of complexities associated with an institutional arrangement where two types of financial institutions are expected to operate and manage the private pension funds in a country.

DOAJ Open Access 2012
Locally Restricted Compositions IV. Nearly Free Large Parts and Gap-Freeness

Edward Bender, Rodney Canfield, Zhicheng Gao

We define the notion of $t$-free for locally restricted compositions, which means roughly that if such a composition contains a part $c_i$ and nearby parts are at least $t$ smaller, then $c_i$ can be replaced by any larger part. Two well-known examples are Carlitz and alternating compositions. We show that large parts have asymptotically geometric distributions. This leads to asymptotically independent Poisson variables for numbers of various large parts. Based on this we obtain asymptotic formulas for the probability of being gap free and for the expected values of the largest part and number distinct parts, all accurate to $o(1)$.

Mathematics
DOAJ Open Access 2012
A phase transition in the distribution of the length of integer partitions

Dimbinaina Ralaivaosaona

We assign a uniform probability to the set consisting of partitions of a positive integer $n$ such that the multiplicity of each summand is less than a given number $d$ and we study the limiting distribution of the number of summands in a random partition. It is known from a result by Erdős and Lehner published in 1941 that the distributions of the length in random restricted $(d=2)$ and random unrestricted $(d \geq n+1)$ partitions behave very differently. In this paper we show that as the bound $d$ increases we observe a phase transition in which the distribution goes from the Gaussian distribution of the restricted case to the Gumbel distribution of the unrestricted case.

Mathematics
DOAJ Open Access 2012
Stokes polyhedra for $X$-shaped polyminos

Yu. Baryshnikov, L. Hickok, N. Orlow et al.

Consider a pair of $\textit{interlacing regular convex polygons}$, each with $2(n + 2)$ vertices, which we will be referring to as $\textit{red}$ and $\textit{black}$ ones. One can place these vertices on the unit circle $|z | = 1$ in the complex plane; the vertices of the red polygon at $\epsilon^{2k}, k = 0, \ldots , 2n − 1$, of the black polygon at $\epsilon^{2k+1}, k = 0, \ldots , 2n − 1$; here $\epsilon = \exp(i \pi /(2n + 2))$. We assign to the vertices of each polygon alternating (within each polygon) signs. Note that all the pairwise intersections of red and black sides are oriented consistently. We declare the corresponding orientation positive.

Mathematics
DOAJ Open Access 2007
Randomized Optimization: a Probabilistic Analysis

Jean Cardinal, Stefan Langerman, Guy Louchard

In 1999, Chan proposed an algorithm to solve a given optimization problem: express the solution as the minimum of the solutions of several subproblems and apply the classical randomized algorithm for finding the minimum of $r$ numbers. If the decision versions of the subproblems are easier to solve than the subproblems themselves, then a faster algorithm for the optimization problem may be obtained with randomization. In this paper we present a precise probabilistic analysis of Chan's technique.

Mathematics
DOAJ Open Access 2007
Tail Bounds for the Wiener Index of Random Trees

Tämur Ali Khan, Ralph Neininger

Upper and lower bounds for the tail probabilities of the Wiener index of random binary search trees are given. For upper bounds the moment generating function of the vector of Wiener index and internal path length is estimated. For the lower bounds a tree class with sufficiently large probability and atypically large Wiener index is constructed. The methods are also applicable to related random search trees.

Mathematics
DOAJ Open Access 2007
A new method for computing asymptotics of diagonal coefficients of multivariate generating functions

Alexander Raichev, Mark C. Wilson

Let $\sum_{\mathbf{n} \in \mathbb{N}^d} F_{\mathbf{n}} \mathbf{x}^{\mathbf{n}}$ be a multivariate generating function that converges in a neighborhood of the origin of $\mathbb{C}^d$. We present a new, multivariate method for computing the asymptotics of the diagonal coefficients $F_{a_1n,\ldots,a_dn}$ and show its superiority over the standard, univariate diagonal method. Several examples are given in detail.

Mathematics
DOAJ Open Access 2007
Uniqueness of polynomial canonical representations

Manuel Lladser

Let $P(z)$ and $Q(y)$ be polynomials of the same degree $k \geq 1$ in the complex variables $z$ and $y$, respectively. In this extended abstract we study the non-linear functional equation $P(z)=Q(y(z))$, where $y(z)$ is restricted to be analytic in a neighborhood of $z=0$. We provide sufficient conditions to ensure that all the roots of $Q(y)$ are contained within the range of $y(z)$ as well as to have $y(z)=z$ as the unique analytic solution of the non-linear equation. Our results are motivated from uniqueness considerations of polynomial canonical representations of the phase or amplitude terms of oscillatory integrals encountered in the asymptotic analysis of the coefficients of mixed powers and multivariable generating functions via saddle-point methods. Uniqueness shall prove important for developing algorithms to determine the Taylor coefficients of the terms appearing in these representations. The uniqueness of Levinson's polynomial canonical representations of analytic functions in several variables follows as a corollary of our one-complex variables results.

Mathematics
DOAJ Open Access 2007
The Height of List-tries and TST

N. Broutin, L. Devroye

We characterize the asymptotics of heights of the trees of de la Briandais and the ternary search trees (TST) of Bentley and Sedgewick. Our proof is based on a new analysis of the structure of tries that distinguishes the bulk of the tree, called the $\textit{core}$, and the long trees hanging down the core, called the $\textit{spaghettis}$.

Mathematics
DOAJ Open Access 2003
Average properties of combinatorial problems and thermodynamics of spin models on graphs

Alessandro Vezzani, Davide Cassi, Raffaella Burioni

The study of thermodynamic properties of classical spin models on infinite graphs naturally leads to consider the new combinatorial problems of random-walks and percolation on the average. Indeed, spinmodels with O(n) continuous symmetry present spontaneous magnetization only on transient on the average graphs, while models with discrete symmetry (Ising and Potts) are spontaneously magnetized on graphs exhibiting percolation on the average. In this paper we define the combinatorial problems on the average, showing that they give rise to classifications of graph topology which are different from the ones obtained in usual (local) random-walks and percolation. Furthermore, we illustrate the theorem proving the correspondence between Potts model and average percolation.

Mathematics
DOAJ Open Access 2003
Rigorous Result for the CHKNS Random Graph Model

Rick Durrett

We study the phase transition in a random graph in which vertices and edges are added at constant rates. Two recent papers in Physical Review E by Callaway, Hopcroft, Kleinberg, Newman, and Strogatz, and Dorogovstev, Mendes, and Samukhin have computed the critical value of this model, shown that the fraction of vertices in finite clusters is infinitely differentiable at the critical value, and that in the subcritical phase the cluster size distribution has a polynomial decay rate with a continuously varying power. Here we sketch rigorous proofs for the first and third results and a new estimates about connectivity probabilities at the critical value.

Mathematics
DOAJ Open Access 2005
Convex hull for intersections of random lines

Daniel Berend, Vladimir Braverman

The problem of finding the convex hull of the intersection points of random lines was studied in Devroye and Toussaint, 1993 and Langerman, Golin and Steiger, 2002, and algorithms with expected linear time were found. We improve the previous results of the model in Devroye and Toussaint, 1993 by giving a universal algorithm for a wider range of distributions.

Mathematics
DOAJ Open Access 2003
Discrete Random Walks on One-Sided ``Periodic'' Graphs

Michael Drmota

In this paper we consider discrete random walks on infinite graphs that are generated by copying and shifting one finite (strongly connected) graph into one direction and connecting successive copies always in the same way. With help of generating functions it is shown that there are only three types for the asymptotic behaviour of the random walk. It either converges to the stationary distribution or it can be approximated in terms of a reflected Brownian motion or by a Brownian motion. In terms of Markov chains these cases correspond to positive recurrence, to null recurrence, and to non recurrence.

Mathematics
DOAJ Open Access 2005
Human and constructive proof of combinatorial identities: an example from Romik

D. Merlini, R. Sprugnoli, M. C. Verri

It has become customary to prove binomial identities by means of the method for automated proofs as developed by Petkovšek, Wilf and Zeilberger. In this paper, we wish to emphasize the role of "human'' and constructive proofs in contrast with the somewhat lazy attitude of relaying on "automated'' proofs. As a meaningful example, we consider the four formulas by Romik, related to Motzkin and central trinomial numbers. We show that a proof of these identities can be obtained by using the method of coefficients, a human method only requiring hand computations.

Mathematics
DOAJ Open Access 2003
Non Uniform Random Walks

Nisheeth Vishnoi

Given $\epsilon _i ∈ [0,1)$ for each $1 < i < n$, a particle performs the following random walk on $\{1,2,...,n\:\}$par If the particle is at $n$, it chooses a point uniformly at random (u.a.r.) from $\{1,...,n-1\}$. If the current position of the particle is $m (1 < m < n)$, with probability $\epsilon _m$ it decides to go back, in which case it chooses a point u.a.r. from $\{m+1,...,n\}$. With probability $1-\epsilon _m$ it decides to go forward, in which case it chooses a point u.a.r. from $\{1,...,m-1\}$. The particle moves to the selected point. What is the expected time taken by the particle to reach 1 if it starts the walk at $n$? Apart from being a natural variant of the classical one dimensional random walk, variants and special cases of this problemarise in Theoretical Computer Science [Linial, Fagin, Karp, Vishnoi]. In this paper we study this problem and observe interesting properties of this walk. First we show that the expected number of times the particle visits $i$ (before getting absorbed at 1) is the same when the walk is started at $j$, for all $j > i$. Then we show that for the following parameterized family of $\epsilon 's: \epsilon _i = \frac{n-i}{n-i+ α · (i-1)}$,$1 < i < n$ where $α$ does not depend on $i$, the expected number of times the particle visits $i$ is the same when the walk is started at $j$, for all $j < i$. Using these observations we obtain the expected absorption time for this family of $\epsilon 's$. As $α$ varies from infinity to 1, this time goes from $Θ (log n) to Θ (n)$. Finally we studythe behavior of the expected convergence timeas a function of $\epsilon$ . It remains an open question to determine whether this quantity increases when all $\epsilon 's$ are increased. We give some preliminary results to this effect.

Mathematics
DOAJ Open Access 2001
Performance Evaluation of Demodulation Methods: a Combinatorial Approach

Daniel Krob, Ekaterina A. Vassilieva

This paper provides a combinatorial approach for analyzing the performance of demodulation methods used in GSM. We also show how to obtain combinatorially a nice specialization of an important performance evaluation formula, using its connection with a classical bijection of Knuth between pairs of Young tableaux and {0,1}-matrices.

Mathematics
DOAJ Open Access 2005
Analysis of the multiplicity matching parameter in suffix trees

Mark Daniel Ward, Wojciech Szpankowski

In a suffix tree, the multiplicity matching parameter (MMP) $M_n$ is the number of leaves in the subtree rooted at the branching point of the $(n+1)$st insertion. Equivalently, the MMP is the number of pointers into the database in the Lempel-Ziv '77 data compression algorithm. We prove that the MMP asymptotically follows the logarithmic series distribution plus some fluctuations. In the proof we compare the distribution of the MMP in suffix trees to its distribution in tries built over independent strings. Our results are derived by both probabilistic and analytic techniques of the analysis of algorithms. In particular, we utilize combinatorics on words, bivariate generating functions, pattern matching, recurrence relations, analytical poissonization and depoissonization, the Mellin transform, and complex analysis.

Mathematics
DOAJ Open Access 2005
Application of data compression methods to hypothesis testing for ergodic and stationary processes

Boris Ryabko, Jaakko Astola

We show that data compression methods (or universal codes) can be applied for hypotheses testing in a framework of classical mathematical statistics. Namely, we describe tests, which are based on data compression methods, for the three following problems: i) identity testing, ii) testing for independence and iii) testing of serial independence for time series. Applying our method of identity testing to pseudorandom number generators, we obtained experimental results which show that the suggested tests are quite efficient.

Mathematics

Halaman 7 dari 4451