Browsing by Subject "Approximation theory"
Now showing items 1-20 of 80
-
Conference Object
Adaptive bounding techniques for stable neural control systems
(IEEE, 1995)This paper considers the design of stable adaptive neural controllers for uncertain nonlinear dynamical systems with unknown nonlinearities. The Lyapunov synthesis approach is used to develop state-feedback adaptive control ...
-
Article
Analysis of the singular function boundary integral method for a biharmonic problem with one boundary singularity
(2012)In this article, we analyze the singular function boundary integral method (SFBIM) for a two-dimensional biharmonic problem with one boundary singularity, as a model for the Newtonian stick-slip flow problem. In the SFBIM, ...
-
Article
Approximate Equilibria and Ball Fusion
(2003)We consider selfish routing over a network consisting of m parallel links through which n selfish users route their traffic trying to minimize their own expected latency. We study the class of mixed strategies in which the ...
-
Conference Object
Approximating optimal place sensor selection for structural observability in discrete event systems modeled by petri nets
(2007)In this paper, we study place sensor selection problems in Discrete Event Systems modeled by Petri nets with outputs (i.e., Petri nets with transition and place sensors). Our goal is to place a minimal number of sensors ...
-
Conference Object
A broadband 1:4 Series power divider using metamaterial phase-shifting lines
(2005)A metamaterial 1:4 series power divider that provides equal power split to all four output ports over a large bandwidth Is presented. The divider comprises four non-radiating metamaterial lines In series that can each Incur ...
-
Article
Charged-particle multiplicity p p̄ collisions at √s = 1.8 TeV
(2001)The mean charged-particle multiplicity of jets in dijet events with dijet masses were analyzed using collider detectors. The jet energy and direction were measured in the central lead-scintillator electromagnetic (CEM) and ...
-
Article
Comparison of two methods for the computation of singular solutions in elliptic problems
(1997)We compare two numerical methods for the solution of elliptic problems with boundary singularities. The first is the integrated singular basis function method (ISBFM), a finite-element method in which the solution is ...
-
Article
Complex-valued tapers
(2005)The spectral estimation method based on the average of short, tapered periodograms is re-examined. The bias of such estimators is typically O(1/b2), where b is the length of the short blocks. Much of the current researeh ...
-
Article
-
Conference Object
Computing Nash equilibria for scheduling on restricted parallel links
(2004)We consider the problem of routing n users on m parallel links, under the restriction that each user may only be routed on a link from a certain set of allowed links for the user. Thus, the problem is equivalent to the ...
-
Article
Conditioning of pseudospectral matrices for certain domain decompositions
(1999)In this paper we examine the conditioning of the matrices resulting from certain conforming pseudospectral approximations. In particular, we consider non-conforming domain decompositions in rectangular domains and the ...
-
Article
Content-selection strategies for the periodic prefetching of WWW resources via satellite
(2001)In this paper we study satellite-caching, that is, the employment of satellite multicasting for the dissemination of prefetched content to WWW caches. This approach is currently being deployed by major satellite operators ...
-
Article
Curvilinear crosscuts of subdivision for a domain decomposition method in numerical conformal mapping
(1999)Let Q:= {Ω
-
Article
The d-identifying codes problem for vertex identification in graphs: Probabilistic analysis and an approximation algorithm
(2006)Given a graph G(V, E), the identifying codes problem is to find the smallest set of vertices D ⊆ V such that no two vertices in V are adjacent to the same set of vertices in D. The identifying codes problem has been applied ...
-
Article
Direct methods for spectral approximations in nonconforming domain decompositions
(1998)The application of a conforming spectral collocation method to certain nonconforming domain decompositions leads to global matrices which have a particular block structure. We study the performance of various direct linear ...
-
Conference Object
Distributed strategies for balancing a weighted digraph
(2012)A weighted digraph is balanced if, for each node, the sum of the weights of the edges outgoing from that node is equal to the sum of the weights of the edges incoming to that node. Weight-balanced digraphs play a key role ...
-
Conference Object
An edgeworth series expansion for multipath fading channel densities
(2002)Identifying the statistical characteristics of the received signal in wireless communications, plays an important role in the design of different functions of the overall communications system. We demonstrate here that the ...
-
Article
Evaluation of fermion loops applied to the calculation of the η ′ mass and the nucleon scalar and electromagnetic form factors
(2012)The exact evaluation of the disconnected diagram contributions to the flavor-singlet pseudo-scalar meson mass, the nucleon σ-term and the nucleon electromagnetic form factors is carried out utilizing GPGPU technology with ...
-
Article
Finite element computations for the Reissner-Mindlin plate model
(1998)We consider the finite element (FE) approximation of the Reissner - Mindlin (RM) plate model, and indicate how to design meshes that yield accurate results when the p/hp version of the standard FE method is used. These ...
-
Article
Finite-time disturbance attenuation control problem for singularly perturbed discrete-time systems
(1998)In this paper we consider the problem of finite-time H∞-optimal control of linear, singularly perturbed, discrete-time systems. The problem is addressed from the game theoretic approach. This leads to a singularly perturbed, ...