Part of
Language and Text: Data, models, information and applications
Edited by Adam Pawłowski, Jan Mačutek, Sheila Embleton and George Mikros
[Current Issues in Linguistic Theory 356] 2021
► pp. 3754
References
Blei, David M., Andrew Y. Ng & Michael I. Jordan
2003Latent Dirichlet allocation. Journal of Machine Learning Research 3 (4–5). 993–1022.Google Scholar
Bolshoy, Alexander, Zeev (Vladimir) Volkovich, Valery Kirzhner & Zeev Barzily
2010Genome clustering from linguistic models to classification of genetic texts. Berlin: Springer.Google Scholar
Conroy, Matthew M.
2018A collection of dice problems. [URL] (16 August 2018.)
Cornwell, Benjamin
2015Social sequence analysis: Methods and applications, (Structural analysis in the social sciences 37). Cambridge: Cambridge University Press. DOI logoGoogle Scholar
d’Imperio, Mary E.
1978The Voynich manuscript: An elegant enigma. Fort George G. Meade, MD: National Security Agency/Central Security Service.Google Scholar
Gastwirth, Joseph L.
1972The estimation of the Lorenz curve and Gini index. The Review of Economics and Statistics 54(3). 306–316. DOI logoGoogle Scholar
Govindan, Vidya, Rajat Subhra Chakraborty, Pranesh Santikellur & Aditya Kumar Chaudhary
2018A hardware Trojan attack on FPGA-based cryptographic key generation: Impact and detection. Journal of Hardware and Systems Security 2. 225–239. DOI logoGoogle Scholar
Haahr, Mads
2018True random integer generator, RANDOM.ORG: True Random Number Service. Randomness and Integrity Services Ltd.Google Scholar
Hamano, Kenji & Hirosuke Yamamoto
2010Randomness test based on T-complexity. Communications and Computer Sciences E93-A(7). 1346–1354. DOI logoGoogle Scholar
Hamid, Raffay, Amos Johnson, Samir Batta, Aaron Bobick, Charles Isbell & Graham Coleman
2005Detection and explanation of anomalous activities: representing activities as bags of event n-grams. IEEE Computer Society Conference on Computer Vision and Pattern Recognition 1. 1031–1038. DOI logoGoogle Scholar
Huffman, David A.
1952A method for the construction of minimum-redundancy codes. Proceedings of the IRE 40(9). 1098–1101. DOI logoGoogle Scholar
Jain, Ashish & Narendra S. Chaudhari
2015A new heuristic based on the cuckoo search for cryptanalysis of substitution ciphers. In Sabri Arik, Tingwen Huang, Weng Kin Lai & Qingshan Liu (eds.), Neural Information Processing (Lecture Notes in Computer Science 9490). 206–215. Dordrecht: Springer. DOI logoGoogle Scholar
Lasry, George
2018A methodology for the cryptanalysis of classical ciphers with search metaheuristics. Kassel: Kassel University Press.Google Scholar
Maaten, Laurens Van Der & Geoffrey Hinton
2008Visualizing data using t-SNE. Journal of Machine Learning Research 9(9). 2579–2605.Google Scholar
Matlach, Vladimír
2018Aplikace kvantitativní lingvistiky na analýzu sekvencí. Olomouc: Palacký University Olomouc PhD dissertation. [URL] (5 December 2019.)
Mikros, George & Jan Macutek
(eds.) 2015Sequences in language and text, Volume 69. Berlin: Walter de Gruyter GmbH & Co KG. DOI logoGoogle Scholar
Mitzenmacher, Michael & Eli Upfal
2005Probability and computing: Randomized algorithms and probabilistic analysis. Cambridge: Cambridge University Press. DOI logoGoogle Scholar
Pritchard, Jonathan K., Matthew Stephens & Peter Donnelly
2000Inference of population structure using multilocus genotype data. Genetics 155(2). 945–959. DOI logoGoogle Scholar
Rao, Rajesh P.
2010Probabilistic analysis of an ancient undeciphered script. Computer 43(4). 76–80. DOI logoGoogle Scholar
Rao, Rajesh P., Nisha Yadav, Mayank N. Vahia, Hrishikesh Joglekar, R. Adhikari & Iravatham Mahadevan
2009Entropic evidence for linguistic structure in the Indus script. Science 324. 1165. DOI logoGoogle Scholar
Riedel, Marko
2018Probability of throwing exactly V distinct sides on N sided dice by K rolls. [URL] (20 June 2018.)
Rukhin, Andrew, Juan Soto, James Nechvatal, Miles Smid & Elaine Barker
2001A statistical test suite for random and pseudorandom number generators for cryptographic applications. Booz-Allen and Hamilton Inc Mclean VA.Google Scholar
Schenkel, Alain, Jun Zhang & Yi-Cheng Zhang
1993Long range correlations in human writings. Fractals 1(1). 47–55. DOI logoGoogle Scholar
Shannon, Claude E.
1948A mathematical theory of communication. Bell System Technical Journal 27(3). 623–656. DOI logoGoogle Scholar
Sproat, Richard
2010Ancient symbols, computational linguistics, and the reviewing practices of the general science journals. Computational Linguistics 36(3). 585–594. DOI logoGoogle Scholar
2014A statistical comparison of written language and nonlinguistic symbol systems. Language 90(2). 457–481. DOI logoGoogle Scholar
Stuttard, Dafydd & Marcus Pinto
2011The web application hacker’s handbook: Finding and exploiting security flaws. Indianapolis: Wiley.Google Scholar
Torgerson, Warren S.
1958Theory and methods of scaling. New York: Wiley.Google Scholar
Ziv, Jacob & Abraham Lempel
1978Compression of individual sequences via variable-rate coding. IEEE Transactions on Information Theory 24(5). 530–536. DOI logoGoogle Scholar