نتایج جستجو برای: alternating direction implicit adi method

تعداد نتایج: 1806048  

1999
Luca Gammaitoni Markus Löcher Adi Bulsara Peter Hänggi Joseph Neff Kurt Wiesenfeld William Ditto Mario E. Inchiosa

Luca Gammaitoni,1 Markus Löcher,4 Adi Bulsara,2 Peter Hänggi,3 Joseph Neff,4 Kurt Wiesenfeld,4 William Ditto,4 and Mario E. Inchiosa2 1Dipartimento di Fisica, Universitá di Perugia and Instituto Nazionale di Fisica Nucleare, Sezione di Perugia, I-06100 Perugia, Italy 2Space and Naval Warfare Systems Center San Diego, Code D-364, San Diego, California 92152-5001 3Institut für Physik, Universität...

2000
Danny Barash Ronny Kimmel

EEcient numerical schemes for nonlinear diiusion ltering based on additive operator splitting (AOS) were introduced in 15]. AOS schemes are eecient and unconditionally stable, yet their accuracy is limited. Future applications of nonlinear diiusion ltering may require better accuracy at the expense of a relatively modest cost in computations and complexity. In this report we explore second orde...

Journal: :Computers & Mathematics with Applications 2014
Peter Benner Patrick Kürschner

We investigate the factored ADI iteration for large and sparse Sylvester equations. A novel low-rank expression for the associated Sylvester residual is established which enables cheap computations of the residual norm along the iteration, and which yields a reformulated factored ADI iteration. The application to generalized Sylvester equations is considered as well. We also discuss the efficie...

2000
Thomas Pornin Jacques Stern

This paper shows how a well-balanced trade-off between a generic workstation and dumb but fast reconfigurable hardware can lead to a more efficient implementation of a cryptanalysis than a full hardware or a full software implementation. A realistic cryptanalysis of the A5/1 GSM stream cipher is presented as an illustration of such trade-off. We mention that our cryptanalysis requires only a mi...

1964
J. R. RICE D. H. THOMAS A. S. Householder

1. Introduction. This note presents a few of the results which we have obtained by applying a classical and fundamental idea to the analysis of certain partial difference equations. The idea is that certain multidimensional problems can be solved by solving a few one-dimensional problems—it is the basis of the classical method of separation of variables of mathematical physics. In the case of p...

2000
Edgar Allan Poe

This issue of Wireless Security Perspectives focuses on GSM and the December 1999 article titled Real Time Cryptanalysis of the Alleged A5/1 on a PC (preliminary draft) by Alex Biryukov and Adi Shamir. The authors describe an attack on the GSM A5/1 traffic encryption algorithm and claim that by analyzing the output of the algorithm, one can recover the cryptographic key in less than a second us...

2006
Ngai Wong Venkataramanan Balakrishnan

Balanced truncation (BT), as applied to date in model order reduction (MOR), is known for its superior accuracy and computable error bounds. Positive-real balanced truncation (PRBT) is a particular BT procedure that preserves passivity and stability, and imposes no structural constraints on the original state space. However, PRBT requires solving two algebraic Riccati equations (AREs), whose co...

Journal: :Computers & Mathematics with Applications 1994

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید