On the subdifferentiability of convex functions
نویسندگان
چکیده
منابع مشابه
On the Subdifferentiability of Convex Functions
(Thus the subgradients of / correspond to the nonvertical supporting hyperplanes to the convex set consisting of all the points of E®R lying above the graph of /.) The set of subgradients of / at x is denoted by dfix). If d/(x) is not empty, / is said to be subdifferentiable at x. If/actually had a gradient x* = V/(x) at x in the sense of Gateaux (or Frechet), one would in particular have d/(x)...
متن کاملOn the quadratic support of strongly convex functions
In this paper, we first introduce the notion of $c$-affine functions for $c> 0$. Then we deal with some properties of strongly convex functions in real inner product spaces by using a quadratic support function at each point which is $c$-affine. Moreover, a Hyers–-Ulam stability result for strongly convex functions is shown.
متن کاملA Smooth Variational Principle with Applications to Subdifferentiability and to Differentiability of Convex Functions
We show that, typically, lower semicontinuous functions on a Banach space densely inherit lower subderivatives of the same degree of smoothness as the norm. In particular every continuous convex function on a space with a Gâteaux (weak Hadamard, Fréchet) smooth renorm is densely Gâteaux (weak Hadamard, Fréchet) differentiable. Our technique relies on a more powerful analogue of Ekeland's variat...
متن کاملSome Results on Convex Spectral Functions: I
In this paper, we give a fundamental convexity preserving for spectral functions. Indeed, we investigate infimal convolution, Moreau envelope and proximal average for convex spectral functions, and show that this properties are inherited from the properties of its corresponding convex function. This results have many applications in Applied Mathematics such as semi-definite programmings and eng...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the American Mathematical Society
سال: 1965
ISSN: 0002-9939
DOI: 10.1090/s0002-9939-1965-0178103-8