Results 91 to 100 of about 16,691 (298)

Precise asymptotics in the law of the iterated logarithm of random fields(随机场重对数律的精确渐近性)

open access: yesZhejiang Daxue xuebao. Lixue ban, 2005
设{X,Xk,k ∈ Zd+,X(i),i ≥ 1}是独立同分布的随机变量序列,且EX = 0,对δ>0,E[X2(log log|X|)1+δ]
YUANYu-ze(袁裕泽)
doaj   +1 more source

On the Law of the Iterated Logarithm for Martingales

open access: yesThe Annals of Probability, 1992
The Kolmogorov law of the iterated logarithm fails when the boundedness condition on the increments is relaxed. In this paper, we consider this in the martingale setting and establish a lower bound, extending a result known in the independent case.
openaire   +3 more sources

Chover-Type Laws of the Iterated Logarithm for Kesten-Spitzer Random Walks in Random Sceneries Belonging to the Domain of Stable Attraction

open access: yesDiscrete Dynamics in Nature and Society, 2018
Let X={Xi,i≥1} be a sequence of real valued random variables, S0=0 and Sk=∑i=1kXi  (k≥1). Let σ={σ(x),x∈Z} be a sequence of real valued random variables which are independent of X’s.
Wensheng Wang, Anwei Zhu
doaj   +1 more source

Law of the iterated logarithm for nonstationary negatively associated random fields(非平稳NA随机变量域的重对数律)

open access: yesZhejiang Daxue xuebao. Lixue ban, 2003
利用Rosenthal型最大值不等式、Kolmogorov型指数不等式及Stein方法,邵启满、苏淳就强平稳的NA随机变量于1999年建立了重对数律.本文利用与之类似的截尾方法,在期望为0,且2+τ阶距有限的条件下,得到了非平稳的NA随机变量域的重对数律.
HUANGWei(黄炜)
doaj   +1 more source

Axion‐Like Interactions and CFT in Topological Matter, Anomaly Sum Rules and the Faraday Effect

open access: yesAdvanced Physics Research, EarlyView.
This review investigates the connection between chiral anomalies and their manifestation in topological materials, using both perturbative methods based on ordinary quantum field theory and conformal field theory (CFT). It emphasizes the role of CFT in momentum space for parity‐odd correlation functions, and their reconstruction by the inclusion of a ...
Claudio Corianò   +4 more
wiley   +1 more source

Asymptotics for the Moment Convergence of -Statistics in LIL

open access: yesJournal of Inequalities and Applications, 2010
Let be a -statistic based on a symmetric kernel and i.i.d. samples . In this paper, the exact moment convergence rates in the law of the iterated logarithm and the law of the logarithm of are obtained, which extend previous results concerning ...
Fu Ke-Ang
doaj  

The Law of the Iterated Logarithm for Lp-Norms of Kernel Estimators of Cumulative Distribution Functions

open access: yesMathematics
In this paper, we consider the strong convergence of Lp-norms (p≥1) of a kernel estimator of a cumulative distribution function (CDF). Under some mild conditions, the law of the iterated logarithm (LIL) for the Lp-norms of empirical processes is extended
Fuxia Cheng
doaj   +1 more source

Gamma Kernel Estimators for Density and Hazard Rate of Right-Censored Data

open access: yesJournal of Probability and Statistics, 2011
The nonparametric estimation for the density and hazard rate functions for right-censored data using the kernel smoothing techniques is considered. The “classical” fixed symmetric kernel type estimator of these functions performs well in the interior ...
T. Bouezmarni, A. El Ghouch, M. Mesfioui
doaj   +1 more source

On the Multivariate Law of the Iterated Logarithm

open access: yesThe Annals of Probability, 1979
A Hilbert space law of the iterated logarithm is proved which generalizes Kolmogorov's law for bounded random variables and which generalizes results of Teicher for unbounded random variables. The result for identically distributed random vectors is a consequence.
openaire   +3 more sources

Data, not documents: Moving beyond theories of information‐seeking behavior to advance data discovery

open access: yesJournal of the Association for Information Science and Technology, Volume 76, Issue 4, Page 649-664, April 2025.
Abstract Many theories of human information behavior (HIB) assume that information objects are in text document format. This paper argues four important HIB theories are insufficient for describing users' search strategies for data because of assumptions about the attributes of objects that users seek.
Anthony J. Million   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy