共查询到20条相似文献,搜索用时 0 毫秒
1.
Ole Østerby 《BIT Numerical Mathematics》2003,43(4):811-822
Crank—Nicolson is a popular method for solving parabolic equations because it is unconditionally stable and second-order accurate. One drawback of CN is that it responds to jump discontinuities in the initial conditions with oscillations which are weakly damped and therefore may persist for a long time. We compare a selection of methods to reduce the amplitude of these oscillations.This revised version was published online in October 2005 with corrections to the Cover Date. 相似文献
2.
In this paper suitable linear combinations for a multivariate extension of the generalized sampling series are considered, also in the Kantorovich version. These combinations provide a better order of approximation. Finally the particular example of the Bochner-Riesz kernel is discussed. 相似文献
3.
《Journal of computational and graphical statistics》2013,22(2):362-382
Bayesian approaches to prediction and the assessment of predictive uncertainty in generalized linear models are often based on averaging predictions over different models, and this requires methods for accounting for model uncertainty. When there are linear dependencies among potential predictor variables in a generalized linear model, existing Markov chain Monte Carlo algorithms for sampling from the posterior distribution on the model and parameter space in Bayesian variable selection problems may not work well. This article describes a sampling algorithm based on the Swendsen-Wang algorithm for the Ising model, and which works well when the predictors are far from orthogonality. In problems of variable selection for generalized linear models we can index different models by a binary parameter vector, where each binary variable indicates whether or not a given predictor variable is included in the model. The posterior distribution on the model is a distribution on this collection of binary strings, and by thinking of this posterior distribution as a binary spatial field we apply a sampling scheme inspired by the Swendsen-Wang algorithm for the Ising model in order to sample from the model posterior distribution. The algorithm we describe extends a similar algorithm for variable selection problems in linear models. The benefits of the algorithm are demonstrated for both real and simulated data. 相似文献
4.
Saul Stahl 《Journal of Graph Theory》1978,2(1):41-52
Covering projections are used to provide a logical foundation for the generalized embedding schemes which describe embeddings of graphs on closed surfaces that are not necessarily orientable. Criteria are provided to resolve the question of when such schemes describe the same embedding, and when that embedding is orientable. The schemes are then applied to derive some interpolation-type theorems for embeddings on closed surfaces. 相似文献
5.
Carles Padró Ignacio Gracia Sebastià Martín Molleví Paz Morillo 《Designs, Codes and Cryptography》2002,25(3):281-298
In a key predistribution scheme, some secret information is distributed among a set of users. For a given family of privileged groups, this secret information must enable every user in a privileged group to compute a common key associated with that group. Besides, this common key must remain unknown to some specified coalitions of users outside the privileged group. We present in this paper a new model, based on linear algebraic techniques, for the design of key predistribution schemes that unifies all previous proposals. This new model provides a common mathematical formulation and a better understanding of key predistribution schemes. Two new families of key predistribution schemes that are obtained by using this model are presented. Those families provide, for some specification structures, schemes that have better information rates than the ones given in previous proposals or fit in situations that have not been considered before. 相似文献
6.
7.
8.
9.
10.
11.
Let E and F be idempotent operators on a complex Hilbert space, and let a and b be nonzero scalars with a + b ≠ 0. We prove that aE + bF is Fredholm if and only if E + F is, thus answering affirmatively a question asked by Koliha and Rakočević.
相似文献
12.
讨论了反幂等阵线性组合的幂等性,指出可对角化矩阵可表示为反幂等阵的线性组合,并由此得到了由非奇异矩阵构造两两正交且可交换的反幂等阵的一种方法. 相似文献
13.
14.
We prove merge theorems along the entire sequence of natural numbers for the distribution functions of suitably centered and normed linear combinations of independent and identically distributed random variables from the domain of geometric partial attraction of any non-normal semistable law. Surprisingly, for some sequences of linear combinations, not too far from those with equal weights, the merge theorems reduce to ordinary asymptotic distributions with semistable limits. The proofs require working out general conditions for merging in terms of characteristic functions. 相似文献
15.
《复变函数与椭圆型方程》2012,57(8):719-725
Complex-valued continuous functions are approximated using solutions of complex partial differential equations of Vekua type. 相似文献
16.
Let Pn be the collection of all polynomials of degree at mostn with real coefficients. A subtle Bernstein-type extremal problemis solved by establishing the inequality
for all , and m= 1, 2, ..., where c is an absolute constant and
Some related inequalities and direct and inversetheorems about the approximation by elements of in Lq (R) are also discussed. 2000 Mathematics SubjectClassification 41A17 (primary). 相似文献
17.
18.
Qiulan Qi Shunsheng Guo Zhanjie Song Lixia Liu 《Southeast Asian Bulletin of Mathematics》2003,26(2):321-329
For linear combinations of Gamma operators Gn,r(f,x), we give an equivalent theorem with
(f,t), where
(f,t) are the Ditzian-Totik moduli of smoothness (
).AMS Subject Classification (1991): 41A25, 41A36.Supported by NSF of Hebei ProvinceSupported by NSF of Hebei Province 相似文献
19.
A Linear Construction of Secret Sharing Schemes 总被引:1,自引:0,他引:1
Marten van Dijk 《Designs, Codes and Cryptography》1997,12(2):161-201
In this paper, we will generalize the vector space construction due to Brickell. This generalization, introduced by Bertilsson, leads to secret sharing schemes with rational information rates in which the secret can be computed efficiently by each qualified group. A one to one correspondence between the generalized construction and linear block codes is stated, and a matrix characterization of the generalized construction is presented. It turns out that the approach of minimal codewords by Massey is a special case of this construction. For general access structures we present an outline of an algorithm for determining whether a rational number can be realized as information rate by means of the generalized vector space construction. If so, the algorithm produces a secret sharing scheme with this information rate. 相似文献
20.
Shunsheng GuoLixia Liu Qiulan Qi 《Journal of Mathematical Analysis and Applications》2002,265(1):135-147
For linear combinations of Bernstein-Kantorovich operators Kn, r(f, x), we give an equivalent theorem with ω2r?λ(f, t). The theorem unites the corresponding results of classical and Ditzian-Totik moduli of smoothness. 相似文献