Index

Note: Page numbers followed by f indicate figures and t indicate tables.

A

Abilene network 
PCA 125, 125f
Sammon mapping 126, 127f
Accept states 139
Adjacency matrix 78–80
Adjacent vertex 71
Affine alignment string similarity 
example alignments 154–156
global affine alignment 151–154
optimality and dynamic programming 150–151
α hull 163, 163f
Alphabets 137–138
Artifact 136–137
Associative laws 9
Autoregressive Integrated Moving Average (ARIMA) 63

B

Barcode 167, 168f
Bar plot 52–53
Beer-Quiche signaling game 112, 112f
Bernoulli distributions 35, 41
Betti numbers 165–166 See also Fundamental number of cycles
Bijective function 9–10
Binary alphabet 137
Binomial distribution 35–36, 41
Bipartite graph 69
Bivariate analysis 
bipartite variables ...

Get Cybersecurity and Applied Mathematics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.