Contact preserving families of functions

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Derandomization of Families of Entropy-Preserving Functions

In probabilistic computations, random bits are viewed as a resource. An important goal is to consume as little of it as possible. We study functions, which decrease the number of random bits needed by an algorithms. Loss-less condensers take as input a low entropy source, and output a source, which is statistically close to a high entropy source. This closeness is referred to as the error of th...

متن کامل

Linear Functions Preserving Multivariate and Directional Majorization

Let V and W be two real vector spaces and let &sim be a relation on both V and W. A linear function T : V → W is said to be a linear preserver (respectively strong linear preserver) of &sim if Tx &sim Ty whenever x &sim y (respectively Tx &sim Ty if and only if x &sim y). In this paper we characterize all linear functions T : M_{n,m} → M_{n,k} which preserve or strongly preserve multivariate an...

متن کامل

Linear Functions Preserving Sut-Majorization on RN

Suppose $textbf{M}_{n}$ is the vector space of all $n$-by-$n$ real matrices, and let $mathbb{R}^{n}$ be the set of all $n$-by-$1$ real vectors. A matrix $Rin textbf{M}_{n}$ is said to be $textit{row substochastic}$ if it has nonnegative entries and each row sum is at most $1$. For $x$, $y in mathbb{R}^{n}$, it is said that $x$ is $textit{sut-majorized}$ by $y$ (denoted by $ xprec_{sut} y$) if t...

متن کامل

Privacy-Preserving Lawful Contact Chaining

How can government agencies acquire actionable, useful information about legitimate targets, while preserving the privacy of innocent parties and holding government agencies accountable? Towards understanding this crucial issue, we present the first privacy-preserving protocol for contact chaining, an operation that law-enforcement and intelligence agencies have used effectively. Our experiment...

متن کامل

Comparison of Union-Preserving and Contact Transformations.

a given group then it is not possible for one of them to be contained in the other. If the operators which are commutative with one of the non-invariant operators of one of the groups under consideration do not always constitute an Abelian group then the prime number of the conjugates for each of its sets of conjugate operators of its non-invariant operators must be the same and hence these gro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Topology

سال: 1980

ISSN: 0040-9383

DOI: 10.1016/0040-9383(80)90013-0