نتایج جستجو برای: positive proper efficient solution

تعداد نتایج: 1580969  

2006
Peter Ibach Vladimir Stantchev Christian Keller

Data sharing in a large scale and for high volatility tolerance requires peer-to-peer solutions where traditional multiprocessor shared memory systems are not applicable. Efficiency of those P2P shared memory systems depends, in particular, on scale, dynamics, and concurrent write accesses. We have developed a P2P shared memory solution, DAEDALUS, based on SUN’s JXTA framework, and integrated a...

Journal: :European Journal of Operational Research 2019

Journal: :Bulletin of the Belgian Mathematical Society - Simon Stevin 2013

Journal: :Computer Methods in Applied Mechanics and Engineering 2021

The FE2 method is a very flexible but computationally expensive tool for multiscale simulations. In conventional implementations, the microscopic displacements are iteratively solved within each macroscopic iteration loop, although strains imposed as boundary conditions at micro-scale only represent estimates. order to reduce number of iterations, present contribution presents monolithic scheme...

Journal: :IEEE Transactions on Communications 2016

Journal: :Neural Parallel & Scientific Comp. 2010
James S. Sochacki

ABSTRACT. Let P be a polynomial from R → R and D ∈ R. I will consider the properties of the class of ODEs Y ′ = P (y) ; Y (0) = D and their solutions. The solution space to these ODEs form a proper subspace of the analytic functions with ODEs. They have many interesting algebraic and topological properties. I will present efficient methods for generating the power series solutions to these poly...

1995
Luis Emilio Garcia-Castillo Magdalena Salazar-Palma Tapan K. Sarkar

One of the problems of the finite element and the finite difference method is that as the dimension of the problem increases, the condition number of the system matrix increases as @(l/hz) (of the order of hz, where h is the subsection length). Through the use of a suitable basis function tailored for rectangular regions, it is shown that the growth of the condition number can be checked while ...

2009
Chehai Wu

Using rootkit mechanisms to hide malware presence is pervasive in today’s computer attacks. We propose the CompareView framework, a host-based solution to detect stealthy outbound traffic generated by rootkit-based malware. Using a lightweight cryptographic protocol, our CompareView framework compares the views of outbound network packets at different layers of the host network stack and verify...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید