Linear element

Results: 166



#Item
91AIMETA ‘03 XVI Congresso AIMETA di Meccanica Teorica e Applicata 16th AIMETA Congress of Theoretical and Applied Mechanics BIFURCATIONS AND SHEAR BANDS BY THE BOUNDARY ELEMENT METHOD

AIMETA ‘03 XVI Congresso AIMETA di Meccanica Teorica e Applicata 16th AIMETA Congress of Theoretical and Applied Mechanics BIFURCATIONS AND SHEAR BANDS BY THE BOUNDARY ELEMENT METHOD

Add to Reading List

Source URL: www.ing.unitn.it

Language: English - Date: 2003-09-12 18:00:00
92Optimized LU-Decomposition, Small Batched Matrices | GTC 2013

Optimized LU-Decomposition, Small Batched Matrices | GTC 2013

Add to Reading List

Source URL: on-demand.gputechconf.com

Language: English - Date: 2013-03-20 22:12:49
93Copyright © 2009 Tech Science Press  CMES, vol.40, no.1, pp.29-62, 2009 A boundary element formulation for incremental nonlinear elastic deformation of compressible solids

Copyright © 2009 Tech Science Press CMES, vol.40, no.1, pp.29-62, 2009 A boundary element formulation for incremental nonlinear elastic deformation of compressible solids

Add to Reading List

Source URL: www.ing.unitn.it

Language: English - Date: 2009-05-06 18:00:00
94Comput. Methods Appl. Mech. Engrg[removed]–2499 www.elsevier.com/locate/cma A boundary element technique for incremental, non-linear elasticity Part II: Bifurcation and shear bands

Comput. Methods Appl. Mech. Engrg[removed]–2499 www.elsevier.com/locate/cma A boundary element technique for incremental, non-linear elasticity Part II: Bifurcation and shear bands

Add to Reading List

Source URL: www.ing.unitn.it

Language: English - Date: 2003-06-09 18:00:00
95Rational and Polynomial Matrices Each rational matrix R(λ) can be seen as the transfer-function matrix of a continuous- or discrete-time descriptor system. Thus, each R(λ) can be equivalently realized by a descriptor s

Rational and Polynomial Matrices Each rational matrix R(λ) can be seen as the transfer-function matrix of a continuous- or discrete-time descriptor system. Thus, each R(λ) can be equivalently realized by a descriptor s

Add to Reading List

Source URL: www.dlr.de

Language: English - Date: 2007-05-21 06:02:22
96197  Internat. J. Math. & Math. Sci[removed]  VOL. 20 NO.

197 Internat. J. Math. & Math. Sci[removed] VOL. 20 NO.

Add to Reading List

Source URL: www.kurims.kyoto-u.ac.jp

Language: English - Date: 2010-03-26 13:30:28
97Numer. Math. manuscript No. (will be inserted by the editor) Finite Element Approximation for Time-Dependent Diffusion with Measure-Valued Source Thomas I. Seidman · Matthias K.

Numer. Math. manuscript No. (will be inserted by the editor) Finite Element Approximation for Time-Dependent Diffusion with Measure-Valued Source Thomas I. Seidman · Matthias K.

Add to Reading List

Source URL: userpages.umbc.edu

Language: English - Date: 2012-04-25 05:46:42
98What is a Good Linear Element? Interpolation, Conditioning, and Quality Measures Jonathan Richard Shewchuk University of California at Berkeley, Berkeley, CA, U.S.A. [removed]  Abstract

What is a Good Linear Element? Interpolation, Conditioning, and Quality Measures Jonathan Richard Shewchuk University of California at Berkeley, Berkeley, CA, U.S.A. [removed] Abstract

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2005-09-24 04:17:07
99FINITE ELEMENT METHOD: AN INTRODUCTION Uday S. Dixit Department of Mechanical Engineering, Indian Institute of Technology Guwahati[removed], India 1. Introduction Finite element method (FEM) is a numerical method for solv

FINITE ELEMENT METHOD: AN INTRODUCTION Uday S. Dixit Department of Mechanical Engineering, Indian Institute of Technology Guwahati[removed], India 1. Introduction Finite element method (FEM) is a numerical method for solv

Add to Reading List

Source URL: www.iitg.ernet.in

Language: English - Date: 2008-12-11 23:09:53
100A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS JINTAI DING, ALEXEI MIASNIKOV, AND ALEXANDER USHAKOV Abstract. In this paper we analyze the Kahrobaei-Lam-Shpilrain (KLS) key exchange prot

A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS JINTAI DING, ALEXEI MIASNIKOV, AND ALEXANDER USHAKOV Abstract. In this paper we analyze the Kahrobaei-Lam-Shpilrain (KLS) key exchange prot

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-14 17:20:26