Sciweavers

2681 search results - page 430 / 537
» Problem F
Sort
View
JDCTA
2010
135views more  JDCTA 2010»
13 years 5 months ago
Signal Framing Methods of Automotive Embedded Networked Control System for Bandwidth Consumption Optimization
Parameter (or variable) of automotive embedded networked control system is named as signal. In order to improve system performance and provide more remaining bandwidth for system ...
Jian Hu, Gangyan Li, Yeqiong Song
SIAMCO
2010
119views more  SIAMCO 2010»
13 years 4 months ago
Feedback Stabilization of a Fluid-Structure Model
We study a system coupling the incompressible Navier-Stokes equations in a 2D rectangular type domain with a damped Euler-Bernoulli beam equation, where the beam is a part of the u...
Jean-Pierre Raymond
SIAMMAX
2010
117views more  SIAMMAX 2010»
13 years 4 months ago
On the Convergence of Rational Ritz Values
Ruhe's rational Krylov method is a popular tool for approximating eigenvalues of a given matrix, though its convergence behavior is far from being fully understood. Under fair...
Bernhard Beckermann, Stefan Güttel, Raf Vande...
SIAMMAX
2010
103views more  SIAMMAX 2010»
13 years 4 months ago
On Chebyshev Polynomials of Matrices
The mth Chebyshev polynomial of a square matrix A is the monic polynomial that minimizes the matrix 2-norm of p(A) over all monic polynomials p(z) of degree m. This polynomial is u...
Vance Faber, Jörg Liesen, Petr Tichý
TCOS
2010
13 years 4 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...