(redirected from permute)
Also found in: Dictionary, Thesaurus, Medical, Encyclopedia, Wikipedia.

PERMUTATION, civil law. Exchange; barter.
     2. This contract is formed by the consent of the parties, but delivery is indispensable; for, without it, it mere agreement. Dig. 31, 77, 4; Code, 4, 64, 3.
     3. Permutation differs from sale in this, that in the former a delivery of the articles sold must be made, while in the latter it is unnecessary. It agrees with the contract of sale, however, in the following particulars: 1. That he to whom the delivery is made acquires the right or faculty of prescribing. Dig. 41, 3, 4, 17. 2. That the contracting parties are bound to guaranty to each other the title of the things delivered. Code, 4, 64, 1. 3. That they are bound to take back the things delivered, when they have latent defects which they have concealed. Dig. 21, 1, 63. See Aso & Man. Inst. B. 2, t. 16, c. 1; Nutation; Transfer.

A Law Dictionary, Adapted to the Constitution and Laws of the United States. By John Bouvier. Published 1856.
References in periodicals archive ?
We used a cross-validation technique that permutes the variables randomly for comparison.
Note that the proposed global permutation and 3D permutation at bit-level data or DNA-level data can change the positions of bits or DNAs to lead the values of pixels changed, and thus they can simultaneously permute and diffuse the images at bit-level or DNA-level data.
Whenever a move labeling an edge e of a James-Peel tree just permutes rows or columns, we can eliminate that move from the tree at the cost of relabeling rows and columns of James-Peel moves below e.
Based on the previous idea, Langville and Meyer come out with a method that recursively permutes the top lett block until the final [P.sub.11] hasnozerorows.
In this case, the encryption process may not need to be arbitrarily reversible, but instead is used to permute the data, then the key is thrown away.
(1981) showed how the barycenter heuristic can be used as a subalgorithm of a larger algorithm to permute the vertices in the hierarchical layers so that the number of crossings is minimized.
The permute program involves producer/consumer communication over a pipe.
In order not to obscure the issues through the complexity of the example, and to facilitate comparison with other approaches, we select the very "standard" permute example.
This, he thinks, goes against the Joycean grain, for Joyce's textual strategies "depend upon the perception of a material human `subject,' a character whose experience materializes in space and time and whose ontological boundaries permute, on the narrative level, from the identity to affinity with the `outside' world" (20).
The "secondary grammar" proposed by the title would "model intuitions about how to decompose, permute, reassemble, and more generally manipulate text-sized structures" (191).
Suppose that S is the secret message bits stream to be embedded, and a private key k is used to permute the secret message to be a pseudo-random message s'.
Let all controllable units permute on 0 [less than or equal to] [b.sub.1] [less than or equal to] [b.sub.2] [less than or equal to] ...