2013
DOI: 10.1007/s10463-013-0398-9
|View full text |Cite
|
Sign up to set email alerts
|

Mittag-Leffler vector random fields with Mittag-Leffler direct and cross covariance functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 33 publications
0
7
0
Order By: Relevance
“…There is thus a need for multivariate random fields that are more general than the Gaussian random field. Examples of such models in the literature are multivariate max‐stable processes for spatial extremes (Genton et al ., ) and Mittag‐Leffler random fields (Ma, ). A common approach for constructing non‐Gaussian fields is to multiply a Gaussian random field with a random scalar.…”
Section: Introductionmentioning
confidence: 99%
“…There is thus a need for multivariate random fields that are more general than the Gaussian random field. Examples of such models in the literature are multivariate max‐stable processes for spatial extremes (Genton et al ., ) and Mittag‐Leffler random fields (Ma, ). A common approach for constructing non‐Gaussian fields is to multiply a Gaussian random field with a random scalar.…”
Section: Introductionmentioning
confidence: 99%
“…The Gaussian assumption makes a spatial model simple in structure and facilitates statistical predictions, but this assumption is often not supported by the data. To deal with this issue, we may consider non-Gaussian processes (Du et al, 2012, Ma, 2013a, 2013b, 2015, Du, Ma and Li, 2013), such as the skew-Gaussian (Alegría et al, 2017a) and the Tukey gand-h random fields (Xu and Genton, 2017). These are promising for various applications, but their implementation remains unexplored.…”
Section: Discussionmentioning
confidence: 99%
“…form a covariance matrix function, as is shown in the proof of Theorem 4, Ma (2013). Using identities (3) and (13), we rewrite (11) as…”
Section: Proof Of Theoremmentioning
confidence: 99%