Kruskal count: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Line 60: Line 60:
* {{cite magazine |title=The Kruskal Principle<!-- by Charles Hudson --> |author-first=Charles |author-last=Hudson |location=Chicago, Illinois, USA |department=Card Corner |magazine=[[The Linking Ring]] |issn=0024-4023 |publisher=[[International Brotherhood of Magicians]] |publication-place=Bluffton, Ohio, USA |date=1977-10-01 |volume=57 |number=10 |page=85}}
* {{cite magazine |title=The Kruskal Principle<!-- by Charles Hudson --> |author-first=Charles |author-last=Hudson |location=Chicago, Illinois, USA |department=Card Corner |magazine=[[The Linking Ring]] |issn=0024-4023 |publisher=[[International Brotherhood of Magicians]] |publication-place=Bluffton, Ohio, USA |date=1977-10-01 |volume=57 |number=10 |page=85}}
* {{cite magazine |title=Ten Amazing Mathematical Tricks |author-first=Martin |author-last=Gardner |author-link=Martin Gardner |magazine=[[Math Horizons]] |issn=1072-4117 |department=Gardner's Gatherings |publisher=[[Mathematical Association of America]] / [[Taylor & Francis, Ltd.]] |volume=6 |number=1 |date=September 1998 |jstor=25678174 |pages=13–15, 26}} (4 pages)
* {{cite magazine |title=Ten Amazing Mathematical Tricks |author-first=Martin |author-last=Gardner |author-link=Martin Gardner |magazine=[[Math Horizons]] |issn=1072-4117 |department=Gardner's Gatherings |publisher=[[Mathematical Association of America]] / [[Taylor & Francis, Ltd.]] |volume=6 |number=1 |date=September 1998 |jstor=25678174 |pages=13–15, 26}} (4 pages)
* {{cite book |title=Taking Chances: Winning with Probability |author-first=John |author-last=Haigh |publication-place=Oxford, UK |publisher=[[Oxford University Press Inc.]] |date=2009 |orig-date=2003, 1999 |edition=2 |isbn=978-0-19-852663-6}}
* {{cite journal |title=A Random Walk on a Circular Path |author-first1=Wai-Ki |author-last1=Ching |author-link1=:d:Q102247201 |author-first2=Yiu-Fai |author-last2=Lee |journal={{ill|International Journal of Mathematical Education in Science and Technology|d|Q15765610}} |issn=0020-739X |eissn=1464-5211 |publisher=[[Taylor & Francis, Ltd.]] |department=Miscellany |volume=36 |issue=6 |date=September 2005 |orig-date=2004-05-05 |doi=10.1080/00207390500064254 |pages=680-683}}
* {{cite journal |title=On Convergent Probability of a Random Walk |author-first1=Yiu-Fai |author-last1=Lee |author-first2=Wai-Ki |author-last2=Ching
* {{cite journal |title=On Convergent Probability of a Random Walk |author-first1=Yiu-Fai |author-last1=Lee |author-first2=Wai-Ki |author-last2=Ching
|author-link2=:d:Q102247201 |date=2006-03-07 |department=Classroom notes |journal={{ill|International Journal of Mathematical Education in Science and Technology|d|Q15765610}} |issn=0020-739X |eissn=1464-5211 |volume=37 |issue=7 |publisher=[[Taylor & Francis, Ltd.]] |orig-date=2005-09-29<!--, 2006-11-24 --> |doi=10.1080/00207390600712299 |location=Advanced Modeling and Applied Computing Laboratory and Department of Mathematics, The University of Hong Kong, Hong Kong |pages=833–838 |url=http://www.math.hku.hk/imrwww/IMRPreprintSeries/2006/IMR2006-11.pdf |access-date=2023-09-02 |url-status=live |archive-url=https://web.archive.org/web/20230902190323/http://www.math.hku.hk/imrwww/IMRPreprintSeries/2006/IMR2006-11.pdf |archive-date=2023-09-02}} (6 pages)
|author-link2=:d:Q102247201 |date=2006-03-07 |department=Classroom notes |journal={{ill|International Journal of Mathematical Education in Science and Technology|d|Q15765610}} |issn=0020-739X |eissn=1464-5211 |volume=37 |issue=7 |publisher=[[Taylor & Francis, Ltd.]] |orig-date=2005-09-29<!--, 2006-11-24 --> |doi=10.1080/00207390600712299 |location=Advanced Modeling and Applied Computing Laboratory and Department of Mathematics, The University of Hong Kong, Hong Kong |pages=833–838 |url=http://www.math.hku.hk/imrwww/IMRPreprintSeries/2006/IMR2006-11.pdf |access-date=2023-09-02 |url-status=live |archive-url=https://web.archive.org/web/20230902190323/http://www.math.hku.hk/imrwww/IMRPreprintSeries/2006/IMR2006-11.pdf |archive-date=2023-09-02}} (6 pages)
Line 69: Line 71:
* {{cite conference |title=Instruction-Level Steganography for Covert Trigger-Based Malware |author-first1=Dennis |author-last1=Andriesse |author-first2=Herbert |author-last2=Bos |author-link2=:d:Q56565972 |date=2014-07-10<!-- /11 --> |editor-first=Sven |editor-last=Dietrich |conference=11th [[International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment]] (DIMVA) |publisher=[[Springer International Publishing]] |series=[[Lecture Notes in Computer Science]] |publication-place=Egham, UK; Switzerland |location=Vrije Universiteit Amsterdam, Amsterdam, Netherlands |doi=10.1007/978-3-319-08509-8_3 |s2cid=4634611 |id=LNCS 8550 |issn=0302-9743 |eissn=1611-3349 |isbn=978-3-31908508-1 |pages=41–50 [45] |url=https://www.cs.vu.nl/~herbertb/papers/stega_dimva14.pdf |access-date=2023-08-26 |url-status=live |archive-url=https://web.archive.org/web/20230826135254/https://www.cs.vu.nl/~herbertb/papers/stega_dimva14.pdf |archive-date=2023-08-26}} (10 pages)
* {{cite conference |title=Instruction-Level Steganography for Covert Trigger-Based Malware |author-first1=Dennis |author-last1=Andriesse |author-first2=Herbert |author-last2=Bos |author-link2=:d:Q56565972 |date=2014-07-10<!-- /11 --> |editor-first=Sven |editor-last=Dietrich |conference=11th [[International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment]] (DIMVA) |publisher=[[Springer International Publishing]] |series=[[Lecture Notes in Computer Science]] |publication-place=Egham, UK; Switzerland |location=Vrije Universiteit Amsterdam, Amsterdam, Netherlands |doi=10.1007/978-3-319-08509-8_3 |s2cid=4634611 |id=LNCS 8550 |issn=0302-9743 |eissn=1611-3349 |isbn=978-3-31908508-1 |pages=41–50 [45] |url=https://www.cs.vu.nl/~herbertb/papers/stega_dimva14.pdf |access-date=2023-08-26 |url-status=live |archive-url=https://web.archive.org/web/20230826135254/https://www.cs.vu.nl/~herbertb/papers/stega_dimva14.pdf |archive-date=2023-08-26}} (10 pages)
* {{cite book |title=Kruskal's Principle and Collision Time for Monotone Transitive Walks on the Integers |author-first1=Ravi |author-last1=Montenegro |author-link1=:d:Q102271025 |author-first2=Prasad V. |author-last2=Tetali |author-link2=Prasad V. Tetali |date=2014-09-07 |url=https://tetali.math.gatech.edu/PUBLIS/MT14.pdf |access-date=2023-08-22 |url-status=live |archive-url=https://web.archive.org/web/20230822002748/https://tetali.math.gatech.edu/PUBLIS/MT14.pdf |archive-date=2023-08-22}} (18 pages)
* {{cite book |title=Kruskal's Principle and Collision Time for Monotone Transitive Walks on the Integers |author-first1=Ravi |author-last1=Montenegro |author-link1=:d:Q102271025 |author-first2=Prasad V. |author-last2=Tetali |author-link2=Prasad V. Tetali |date=2014-09-07 |url=https://tetali.math.gatech.edu/PUBLIS/MT14.pdf |access-date=2023-08-22 |url-status=live |archive-url=https://web.archive.org/web/20230822002748/https://tetali.math.gatech.edu/PUBLIS/MT14.pdf |archive-date=2023-08-22}} (18 pages)
* {{cite conference |title=Collision of random walks and a refined analysis of attacks on the discrete logarithm problem |author-first1=Shuji |author-last1=Kijima |author-first2=Ravi |author-last2=Montenegro |date=2015 |conference=PKC 2015 |publisher=Springer |doi=10.1007/978-3-662-46447-2_6 |pages=127-149 |url=https://www.iacr.org/archive/pkc2015/90200136/90200136.pdf |access-date=2023-09-03 |url-status=live |archive-url=https://web.archive.org/web/20230903083941/https://www.iacr.org/archive/pkc2015/90200136/90200136.pdf |archive-date=2023-09-03}} (23 pages)
* {{cite book |title=On Offensive and Defensive Methods in Software Security |author-last=Jämthagen |author-first=Christopher |date=November 2016 |issn=1654-790X |number=89 |isbn=978-91-7623-942-1 |type=Thesis |publisher=Department of Electrical and Information Technology, [[Lund University]] |publication-place=Lund, Sweden |page=96 |url=https://lucris.lub.lu.se/ws/portalfiles/portal/15764406/dissertation.pdf |access-date=2023-08-26 |url-status=live |archive-url=https://web.archive.org/web/20230826135321/https://lucris.lub.lu.se/ws/portalfiles/portal/15764406/dissertation.pdf |archive-date=2023-08-26}} (1+xvii+1+152 pages)
* {{cite book |title=On Offensive and Defensive Methods in Software Security |author-last=Jämthagen |author-first=Christopher |date=November 2016 |issn=1654-790X |number=89 |isbn=978-91-7623-942-1 |type=Thesis |publisher=Department of Electrical and Information Technology, [[Lund University]] |publication-place=Lund, Sweden |page=96 |url=https://lucris.lub.lu.se/ws/portalfiles/portal/15764406/dissertation.pdf |access-date=2023-08-26 |url-status=live |archive-url=https://web.archive.org/web/20230826135321/https://lucris.lub.lu.se/ws/portalfiles/portal/15764406/dissertation.pdf |archive-date=2023-08-26}} (1+xvii+1+152 pages)
* {{cite journal |title=Sensorless Pose Determination Using Randomized Action Sequences |author-first1=Pragna |author-last1=Mannam |author-first2=Alexander |author-last2=Volkov, Jr. |author-first3=Robert |author-last3=Paolini |author-first4=Gregory Scott |author-last4=Chirikjian |author-link4=Gregory Scott Chirikjian |author-first5=Matthew Thomas |author-last5=Mason |author-link5=Matthew Thomas Mason<!-- |chapter=1. Introduction --> |journal=[[Entropy (journal)|Entropy]] |issn=1099-4300 |publisher=[[Multidisciplinary Digital Publishing Institute]] |publication-place=Basel, Switzerland |date=2019-02-06 |orig-date=2018-12-04 |volume=21 |number=2 |id=Article 154 |doi=10.3390/e21020154 |s2cid=54444590 |arxiv=1812.01195 |pmc=7514636 |pmid=33266870 |url=https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514636/pdf/entropy-21-00154.pdf |access-date=2023-09-01 |url-status=live |archive-url=https://web.archive.org/web/20230901194748/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514636/pdf/entropy-21-00154.pdf |archive-date=2023-09-01 |quote-page=2 |quote=[…] The phenomenon, while also reminiscent of [[contraction mapping]], is similar to an interesting [[card trick]] called the Kruskal Count […] so we have dubbed the phenomenon as "Kruskal effect". […]}} (13 pages)
* {{cite journal |title=Sensorless Pose Determination Using Randomized Action Sequences |author-first1=Pragna |author-last1=Mannam |author-first2=Alexander |author-last2=Volkov, Jr. |author-first3=Robert |author-last3=Paolini |author-first4=Gregory Scott |author-last4=Chirikjian |author-link4=Gregory Scott Chirikjian |author-first5=Matthew Thomas |author-last5=Mason |author-link5=Matthew Thomas Mason<!-- |chapter=1. Introduction --> |journal=[[Entropy (journal)|Entropy]] |issn=1099-4300 |publisher=[[Multidisciplinary Digital Publishing Institute]] |publication-place=Basel, Switzerland |date=2019-02-06 |orig-date=2018-12-04 |volume=21 |number=2 |id=Article 154 |doi=10.3390/e21020154 |s2cid=54444590 |arxiv=1812.01195 |pmc=7514636 |pmid=33266870 |url=https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514636/pdf/entropy-21-00154.pdf |access-date=2023-09-01 |url-status=live |archive-url=https://web.archive.org/web/20230901194748/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514636/pdf/entropy-21-00154.pdf |archive-date=2023-09-01 |quote-page=2 |quote=[…] The phenomenon, while also reminiscent of [[contraction mapping]], is similar to an interesting [[card trick]] called the Kruskal Count […] so we have dubbed the phenomenon as "Kruskal effect". […]}} (13 pages)

Revision as of 09:07, 3 September 2023

The Kruskal count[1][2] (also known as Kruskal's principle,[3][4][5][6][7] Dynkin–Kruskal count,[8] Dynkin's counting trick,[9] Dynkin's card trick,[10][11][12][13] coupling card trick[14][15][16] or shift coupling[10][11][12][13]) is a probabilistic concept originally demonstrated by the Russian mathematician Eugene Borisovich Dynkin in the 1960s[when?] discussing coupling effects[14][15][9][16] and rediscovered as a card trick by the American mathematician Martin David Kruskal in the early 1970s as a side-product while working on another problem.[17] It was published by his friend[18] Martin Gardner[19][1] and magician Karl Fulves in 1975.[20] It is related to a similar trick published by magician Alexander F. Kraus in 1957 as Sum total[21][22][23] and later called Kraus principle.[2][7][17]

Besides uses as a card trick, the underlying phenomenon has applications in cryptography, code breaking, software tamper protection, code self-synchronization, control-flow resynchronization, design of variable-length codes and variable-length instruction sets, automatic object realignment, and others.

Card trick

Explanation of Kruskal count

The trick is performed with cards, but is more a magical-looking effect than a conventional magic trick. The magician has no access to the cards, which are manipulated by members of the audience. Thus sleight of hand is not possible. Rather the effect is based on the mathematical fact that the output of a Markov chain, under certain conditions, is typically independent of the input.[24][25][26][27][6] A simplified version using the hands of a clock is as follows.[28] A volunteer picks a number from one to twelve and does not reveal it to the magician. The volunteer is instructed to start from 12 on the clock and move clockwise by a number of spaces equal to the number of letters that the chosen number has when spelled out. This is then repeated, moving by the number of letters in the new number. The output after three or more moves does not depend on the initially chosen number and therefore the magician can predict it.

See also

References

  1. ^ a b Gardner, Martin (February 1978). "On checker jumping, the Amazon game, weird dice, card tricks and other playful pastimes". Scientific American. Mathematical Games. Vol. 238, no. 2. pp. 19–32. ISSN 0036-8733. JSTOR 24955629.
  2. ^ a b Gardner, Martin (1989) [1988]. "Chapter 19". Penrose Tiles to Trapdoor Ciphers ... and the return of Mr. Matrix (1 ed.). W. H. Freeman. p. 274; Gardner, Martin (1997). "Chapter 19. Sicherman Dice, the Kruskal Count and Other Curiosities". Penrose Tiles to Trapdoor Ciphers ... and the return of Mr. Matrix (PDF). Spectrum Series (Revised ed.). Washington, D.C., USA: Mathematical Association of America. pp. 265–280 [280]. ISBN 0-88385-521-6. LCCN 97-70505. Archived (PDF) from the original on 2023-08-19. Retrieved 2023-08-19. (1+ix+319 pages)
  3. ^ Haga, Wayne; Robins, Sinai [at Wikidata] (June 1997) [1995-12-12]. "On Kruskal's Principle". Written at Simon Fraser University, Burnaby, British Columbia, Canada. Organic Mathematics. Canadian Mathematical Society Conference Proceedings. Vol. 20. Providence, Rhode Island, US: American Mathematical Society. pp. 407–411. ISBN 978-0-8218-0668-5. ISSN 0731-1036. LCCN 97-179. ISBN 0-8218-0668-8. Retrieved 2023-08-19. (5 pages)
  4. ^ a b Pollard, John M. (July 1978) [1977-05-01, 1977-11-18]. "Monte Carlo Methods for Index Computation (mod p)" (PDF). Mathematics of Computation. 32 (143). Mathematics Department, Plessey Telecommunications Research, Taplow Court, Maidenhead, Berkshire, UK: American Mathematical Society: 918–924. ISSN 0025-5718. Archived (PDF) from the original on 2013-05-03. Retrieved 2023-08-19. (7 pages)
  5. ^ a b Pollard, John M. (2000-08-10) [1998-01-23, 1999-09-27]. "Kangaroos, Monopoly and Discrete Logarithms" (PDF). Journal of Cryptology. 13 (4). Tidmarsh Cottage, Manor Farm Lane, Tidmarsh, Reading, UK: International Association for Cryptologic Research: 437–447. doi:10.1007/s001450010010. ISSN 0933-2790. S2CID 5279098. Archived (PDF) from the original on 2023-08-18. Retrieved 2023-08-19. (11 pages)
  6. ^ a b c Pollard, John M. (July 2000). "Kruskal's Card Trick" (PDF). The Mathematical Gazette. 84 (500). Tidmarsh Cottage, Manor Farm Lane, Tidmarsh, Reading, UK: The Mathematical Association: 265–267. doi:10.2307/3621657. ISSN 0025-5572. JSTOR 3621657. S2CID 125115379. 84.29. Archived (PDF) from the original on 2023-08-18. Retrieved 2023-08-19. (1+3 pages)
  7. ^ a b MacTier, Arthur F. (2000). "Chapter 6: Kruskal Principle (Extraordinary Coincidence) / Chapter 7: Kraus Principle (The Magic of 52, Magical Coincidence II)". Card Concepts - An Anthology of Numerical & Sequential Principles Within Card Magic (1 ed.). London, UK: Lewis Davenport Limited. pp. 34–38, 39–46. (vi+301 pages)
  8. ^ Artymowicz, Pawel [in Polish] (2020-01-29) [2020-01-26]. "Codes for PHYD57 Advanced Computing in Physics, UTSC: Dynkin–Kruskal count - convergent Markov chains". Archived from the original on 2023-08-20. Retrieved 2023-08-20. […] We looked at the Markov chains, where a given random sequence of cards or numbers is traversed in a linked-list manner, that is when you see a value in a list of integers, you use it to determine the position of the next number in a sequence, and you repeat that until the list ends. This is the basis of a card trick with a magician correctly guessing the final number in a seemingly hidden/random sequence computed by a spectator in his/her mind (but using a given well-shuffled deck of 52 cards. […] Random sequences that converge when the length of element is used to create a jump to the next element are called Dynkin–Kruskal sequences, after Eugene Dynkin (1924–2014), a Russian-American mathematician, who mentioned them in his work, and American mathematician Martin David Kruskal (1925–2006). The nature of these Kruskal sequences is that they converge exponentially fast, and for N=52 there is already more than 90% chance that the two randomly started sequences converge at the end of the deck, that is the magician and the spectator independently arrive at the same last key card. I saw the trick demonstrated […] at one conference, but didn't know that these convergent, linked list-like, series are so common. Almost any books can be used to show that. Skip a number of words equal to the number of letters in a key word. By the end of the third line you normally converge to the same sequence forever after, no matter which word in the top line you start with. […] [1][2][3]
  9. ^ a b Jiang, Jiming [at Wikidata] (2010). "Chapter 10 Stochastic Processes; 10.1 Introduction". Written at University of California, Davis, California, USA. Large Sample Techniques for Statistics. Springer Texts in Statistics (1 ed.). New York, USA: Springer Science+Business Media, LLC. pp. 317–319. doi:10.1007/978-1-4419-6827-2. ISBN 978-1-4419-6826-5. ISSN 1431-875X. LCCN 2010930134. Retrieved 2023-09-02. (xvii+610 pages); Jiang, Jiming [at Wikidata] (2022) [2010]. "Chapter 10 Stochastic Processes; 10.1 Introduction". Written at University of California, Davis, California, USA. Large Sample Techniques for Statistics. Springer Texts in Statistics (2 ed.). Cham, Switzerland: Springer Nature Switzerland AG. pp. 339–341. doi:10.1007/978-3-030-91695-4. eISSN 2197-4136. ISBN 978-3-030-91694-7. ISSN 1431-875X. Retrieved 2023-09-02. p. 339: […] During the author's time as a graduate student, one of the classroom examples that struck him the most was given by Professor David Aldous in his lectures on Probability Theory. The example was taken from Durrett (1991, p. 275). A modified (and expanded) version is given below. Example 10.1. Professor E. B. Dynkin used to entertain the students in his probablility class with the following counting trick. A professor asks a student to write 100 random digits from 0 to 9 on the blackboard. Table 10.1 shows 100 such digits generated by a computer. The professor then asks another student to choose one of the first 10 digits without telling him. Here, we use the computer to generate a random number from 1 to 10. The generated number is 7, and the 7th number of the first 10 digits in the table is also 7. Suppose that this is the number that the second student picks. She then counts 7 places along the list, starting from the number next to 7. The count stops at (another) 7. She then counts 7 places along the list, again. This time the count stops at 3. She then counts 3 places along the list, and so on. In the case that the count stops at 0, the student then counts 10 places on the list. The student's counts are underlined in Table 10.1. The trick is that these are all secretly done behind the professor, who then turns around and points out where the student's counts finally ends, which is the last 9 in the table. […] (xv+685 pages)
  10. ^ a b Barthe, Gilles [at Wikidata] (2016). "Probabilistic couplings for cryptography and privacy" (PDF). Madrid, Spain: IMDEA Software Institute. Archived (PDF) from the original on 2023-08-19. Retrieved 2023-08-19. (66 pages); Barthe, Gilles [at Wikidata] (2016-09-13). "Probabilistic couplings for cryptography and privacy" (PDF). Madrid, Spain: IMDEA Software Institute. Archived (PDF) from the original on 2023-08-19. Retrieved 2023-08-19. (49 pages)
  11. ^ a b Barthe, Gilles [at Wikidata]; Grégoire, Benjamin [at Wikidata]; Hsu, Justin; Strub, Pierre-Yves (2016-11-07) [2016-09-21]. "Coupling Proofs are Probabilistic Product Programs". Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. pp. 161–174. arXiv:1607.03455v5. doi:10.1145/3009837.3009896. ISBN 978-1-45034660-3. S2CID 3931131. Archived from the original on 2023-08-19. Retrieved 2023-08-19. [4] (14 pages)
  12. ^ a b Barthe, Gilles [at Wikidata]; Espitau, Thomas; Grégoire, Benjamin [at Wikidata]; Hsu, Justin; Stefanesco, Léo; Strub, Pierre-Yves (2017-07-12) [2015]. "Relational Reasoning via Probabilistic Coupling". Logic for Programming, Artificial Intelligence, and Reasoning. Lecture Notes in Computer Science. Vol. 9450. Suva, France: LPAR. pp. 387–401. arXiv:1509.03476. doi:10.1007/978-3-662-48899-7_27. ISBN 978-3-662-48898-0. S2CID 3518579. hal-01246719v2. Archived from the original on 2023-08-19. Retrieved 2023-08-19. (17 pages)
  13. ^ a b Hsu, Justin (2018) [2017-11-01]. "Probabilistic Couplings for Probabilistic Reasoning" (PDF) (Thesis). p. 34. Archived (PDF) from the original on 2023-08-19. Retrieved 2023-08-19. (147 pages)
  14. ^ a b Durrett, Richard "Rick" Timothy (1991) [1989]. Probability: Theory and Examples. The Wadsworth & Brooks/Cole Statistics/Probability Series (1 ed.). Pacific Grove, California, USA: Wadsworth & Brooks/Cole [d] Advanced Books & Software. p. 275. ISBN 0-534-13206-5. MR1068527. (x+453 pages) (NB. This can be found quoted in Jiang (2010).); Durrett, Richard "Rick" Timothy (2005). "Example 5.2. A coupling card trick.". Probability: Theory and Examples. The Duxbury Advanced Series in Statistics and Decision Sciences (3 ed.). Thomson Brooks/Cole Publishing [d]. p. 312. ISBN 0-534-42441-4. ISBN 978-0-534-42441-1. (497 pages) (NB. This can be found quoted in Kovchegov (2007).)
  15. ^ a b Kovchegov, Yevgeniy V. [at Wikidata] (2007-10-06). "From Markov Chains to Gibbs Fields" (PDF). Corvallis, Oregon, USA: Department of Mathematics, Oregon State University. p. 22. Archived (PDF) from the original on 2023-09-01. Retrieved 2023-09-01. p. 22: […] Here we will quote [R. Durrett, "Probability: Theory and Examples."]: "Example. A coupling card trick. The following demonstration used by E. B. Dynkin in his probability class is a variation of a card trick that appeared in Scientific American. The instructor asks a student to write 100 random digits from 0 to 9 on the blackboard. Another student chooses one of the first 10 numbers and does not tell the instructor. If that digit is 7 say she counts 7 places along the list, notes the digit at that location, and continues the process. If the digit is 0 she counts 10. A possible sequence is underlined on the list below: 3 4 7 8 2 3 7 5 6 1 6 4 6 5 7 8 3 1 5 3 0 7 9 2 3 . . . The trick is that, without knowing the student's first digit, the instructor can point to her final stopping position. To this end, he picks the first digit, and forms his own sequence in the same manner as the student and announces his stopping position. He makes an error if the coupling time is larger than 100. Numerical computation done by one of Dynkin's graduate students show that the probability of error is approximately .026. (45 pages) (NB. This can be found quoted in Weinhold (2011).)
  16. ^ a b Weinhold, Leonie (2011-05-13). "Vorstellung der Kopplung bei Markovketten" (PDF) (in German). Ulm, Germany: University of Ulm. p. 7. Archived (PDF) from the original on 2023-09-01. Retrieved 2023-09-01. (1+9 pages) (NB. This work quotes Kovchegov (2007).)
  17. ^ a b c d Nishiyama, Yutaka (July 2013) [2012-12-10]. "The Kruskal principle" (PDF). International Journal of Pure and Applied Mathematics [d]. 85 (6). Department of Business Information, Faculty of Information Management, Osaka University of Economics, Osaka, Japan: Academic Publications, Ltd.: 983–992. doi:10.12732/ijpam.v85i6.1. eISSN 1314-3395. ISSN 1311-8080. Archived (PDF) from the original on 2023-08-19. Retrieved 2023-08-19. (10 pages)
  18. ^ Farrell, Jeremiah (2010). "Foshee Magically Interpreted". Indianapolis, Indiana, USA. p. 316. Archived from the original on 2023-08-19. Retrieved 2023-08-19. p. 316: Kruskal had two mathematically inclined brothers, William at the University of Chicago and Joseph of Bell Labs. All three were friends of Martin Gardner who had earlier written about their mother, Lillian Oppenheimer, a remarkable origamist. (1 page)
  19. ^ Gardner, Martin (June 1975). "The Kruskal Principle". The Pallbearers Review. Vol. 10, no. 8. L&L Publishing. pp. 967–, 985; Braunmüller, Rudolf, ed. (January 1984). "Das Kruskal-Prinzip" [The Kruskal Principle]. intermagic - Ein Magisches Journal (in German). Vol. 10, no. 3 & 4. Munich, Germany. p. 125.
  20. ^ Fulves, Karl (June 1975). "Kruskal Phone Effect". The Pallbearers Review. Vol. 10, no. 8. L&L Publishing. pp. 970–.
  21. ^ Kraus, Alexander F. (December 1957). Lyons, P. Howard (ed.). "Sum Total". ibidem. No. 12. Toronto, Ontario, Canada. p. 7. Part 1 (Problem). (1 page); Kraus, Alexander F. (1993). "Sum Total (Problem)". In Ransom, Tom; Field, Matthew; Phillips, Mark (eds.). ibidem - P. Howard Lyons. Vol. 1. Lyons, Pat Patterson (illustrations) (1 ed.). Washington DC, USA: Richard Kaufman & Alan Greenberg (Kaufman and Greenberg); Hermetic Press, Inc. (Jogestja, Ltd.). p. 232. (319 pages) (NB. Volume 1 of a three-volume hardcover reprint of ibidem magazine numbers 1 (June 1955) – 15 (December 1958).)
  22. ^ Kraus, Alexander F. (March 1958). Lyons, P. Howard (ed.). "Sum Total". ibidem. No. 13. Toronto, Ontario, Canada. pp. 13–16. Part 2 (Solution). (4? pages); Kraus, Alexander F. (1993). "Sum Total (Solution)". In Ransom, Tom; Field, Matthew; Phillips, Mark (eds.). ibidem - P. Howard Lyons. Vol. 1. Lyons, Pat Patterson (illustrations) (1 ed.). Washington DC, USA: Richard Kaufman & Alan Greenberg (Kaufman and Greenberg); Hermetic Press, Inc. (Jogestja, Ltd.). pp. 255–258. (319 pages) (NB. Volume 1 of a three-volume hardcover reprint of ibidem magazine numbers 1 (June 1955) – 15 (December 1958).)
  23. ^ Ransom, Tom; Katz, Max (March 1958). Lyons, P. Howard (ed.). "Sum More". ibidem. No. 13. Toronto, Ontario, Canada. pp. 17–18. (2 pages); Ransom, Tom; Katz, Max (1993). "Sum More". In Ransom, Tom; Field, Matthew; Phillips, Mark (eds.). ibidem - P. Howard Lyons. Vol. 1. Lyons, Pat Patterson (illustrations) (1 ed.). Washington DC, USA: Richard Kaufman & Alan Greenberg (Kaufman and Greenberg); Hermetic Press, Inc. (Jogestja, Ltd.). pp. 258–259. (319 pages) (NB. Volume 1 of a three-volume hardcover reprint of ibidem magazine numbers 1 (June 1955) – 15 (December 1958).)
  24. ^ Lagarias, Jeffrey "Jeff" Clark; Vanderbei, Robert J. (1988). The Kruskal Count. Murray Hill, New Jersey, USA: AT&T Bell Laboratories.
  25. ^ a b Lagarias, Jeffrey "Jeff" Clark; Rains, Eric Michael; Vanderbei, Robert J. (2009) [2001-10-13]. "The Kruskal Count". In Brams, Stephen; Gehrlein, William V.; Roberts, Fred S. (eds.). The Mathematics of Preference, Choice and Order. Essays in Honor of Peter J. Fishburn. Studies in Choice and Welfare. Berlin / Heidelberg, Germany: Springer-Verlag. pp. 371–391. arXiv:math/0110143. doi:10.1007/978-3-540-79128-7_23. ISBN 978-3-540-79127-0. S2CID 18273053. (22 pages)
  26. ^ a b Jacob, Matthias; Jakubowski, Mariusz H.; Venkatesan, Ramarathnam [at Wikidata] (20–21 September 2007). Towards Integral Binary Execution: Implementing Oblivious Hashing Using Overlapped Instruction Encodings (PDF). Proceedings of the 9th workshop on Multimedia & Security (MM&Sec '07). Dallas, Texas, USA: Association for Computing Machinery. pp. 129–140. CiteSeerX 10.1.1.69.5258. doi:10.1145/1288869.1288887. ISBN 978-1-59593-857-2. S2CID 14174680. Archived (PDF) from the original on 2018-09-04. Retrieved 2021-12-25. (12 pages)
  27. ^ Paulos, John Allen (November 1998). "An old card trick and new Biblical hoax". Once Upon a Number - The Hidden Mathematical Logic of Stories (1 ed.). Basic Books. p. 64. ISBN 978-0-46505159-5. Archived from the original on 2015-04-01.
  28. ^ Delbert, Caroline (2020-02-27). "How to Do the Math Magic Trick That Will Impress Everyone You Know - Here's the secret". Science. Popular Mechanics. Hearst Magazine Media, Inc. ISSN 0032-4558. Archived from the original on 2021-10-19. Retrieved 2021-12-25.
  29. ^ Jakubowski, Mariusz H. (February 2016). "Graph Based Model for Software Tamper Protection". Microsoft. Archived from the original on 2019-10-31. Retrieved 2023-08-19.

Further reading