نتایج جستجو برای: definite polynomial

تعداد نتایج: 124671  

Journal: :TPLP 2011
Manh Thang Nguyen Danny De Schreye Jürgen Giesl Peter Schneider-Kamp

Our goal is to study the feasibility of porting termination analysis techniques developed for one programming paradigm to another paradigm. In this paper, we show how to adapt termination analysis techniques based on polynomial interpretations very well known in the context of term rewrite systems (TRSs) to obtain new (non-transformational) termination analysis techniques for definite logic pro...

2002
Luciano PANDOLFI L. Pandolfi

where ∗ denotes both the conjugate of a complex number and the conjugate of a matrix or an operator. The first result of this type is the well-known Fejer-Riesz theorem (Riesz and SzNagy, 1955), which states that if Π(iω) is a (scalar) polynomial, then we can choose a polynomial M(z) which, additionally, does not have zeros in the right half-plane. Extensions to polynomial, hence also to ration...

Journal: :Journal of Approximation Theory 2010
M. N. de Jesus J. Petronilho

Let (pn)n be a given monic orthogonal polynomial sequence (OPS) and k a fixed positive integer number such that k ≥ 2. We discuss conditions under which this OPS originates from a polynomial mapping in the following sense: to find another monic OPS (qn)n and two polynomials πk and θm , with degrees k and m (resp.), with 0 ≤ m ≤ k − 1, such that pnk+m(x) = θm(x)qn(πk(x)) (n = 0, 1, 2, . . .). In...

2014
Reza Kamyar Matthew M. Peet MATTHEW M. PEET

In this paper, we explore the merits of various algorithms for polynomial optimization problems, focusing on alternatives to sum of squares programming. While we refer to advantages and disadvantages of Quantifier Elimination, Reformulation Linear Techniques, Blossoming and Groebner basis methods, our main focus is on algorithms defined by Polya’s theorem, Bernstein’s theorem and Handelman’s th...

Journal: :The Auk 1917

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده برق و کامپیوتر 1391

امروزه با گسترش تکنولوژی بی سیم و نیاز به برقراری امنیت استفاده از رمزنگاری امری اجتناب ناپذیر می نماید. گروه های تحقیقاتی زیادی تلاش می کنند که سیستم های رمزنگاری ایمن طراحی کنند. اما یک پیاده سازی بد می تواند تمامی این تلاش ها را بیهوده سازد. به همین دلیل در کنار طراحی و تحلیل امنیت سیستم های رمزنگاری، بحث پیاده سازی آن ها در دستور کار گروه های تحقیقاتی قرار می گیرد. در پیاده سازی دو موضوع م...

2014
L. E. Carr F. X. Giraldo

We introduce a method for constructing a polynomial preconditioner using a nonlinear least squares (NLLS) algorithm. We show that this polynomial-based NLLS-optimized (PBNO) preconditioner significantly improves the performance of 2-D continuous Galerkin (CG) and discontinuous Galerkin (DG) compressible Euler equation models when run in an implicit-explicit time integration mode. When employed ...

Journal: :SIAM J. Matrix Analysis Applications 2010
Yun-Bin Zhao

It is well-known that the Legendre-Fenchel conjugate of a positive-definite quadratic form can be explicitly expressed as another positive-definite quadratic form, and that the conjugate of the sum of several positive-definite quadratic forms can be expressed via inf-convolution. However, the Legendre-Fenchel conjugate of the product of two positive-definite quadratic forms is not clear at pres...

2003
RONALD EVANS P. T. Bateman

For each m 3 1, let A(m) = {N E Z x Z : Q(N) = m>. Note that CNEacrn) P(N) = 0 for each m > 1 if and only if e(,; P, Q) = 0. Let G denote the group of integral automorphs (of determinant &l) of Q(X). The first result in [I] states that if P(X) is a spherical polynomial with respect to Q(X) and if O(T; P, Q) E 0, then CUEG P(UX) = 0. The following theorem shows that this result holds for any hom...

Journal: :Journal of the European Second Language Association 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید