The implementation of implicit Runge-Kutta methods requires the solution of large systems of non-linear equations. Normally these equations are solved by a modified Newton process, which can be very expensive for problems of high dimension. The recently proposed triangularly implicit iteration methods for ODE-IVP solvers [HSw95] substitute the Runge-Kutta matrix A in the Newton process for a triangular matrix T that approximates A, hereby making the method suitable for parallel implementation. The matrix T is constructed according to a simple procedure, such that the stiff error components in the numerical solution are strongly damped. In this paper we prove for a large class of Runge-Kutta methods that this procedure can be carried out and...
This paper presents a numerical method for the computation of compressible flows in domains whose bo...
This paper describes issues in the design and implementation of checkpointing and recovery modules f...
Even, Goldreich and Micali showed at Crypto'89 that the existence of signature schemes secure agains...
The implementation of implicit Runge-Kutta methods requires the solution of large systems of non-lin...
This paper presents an approach for the automatic layout generation of regular arrays. These arrays ...
International audiencePoster showing late binding mecanisms as implemented in the SmallEiffel compil...
We study the spectral asymptotics of the Dirichlet-to-Neumann operator Λγ on a multiply-connected, b...
URL: http://www-spht.cea.fr/articles/t95/026/ Le calcul analytique efficace des amplitudes aux ordre...
Colloque avec actes et comité de lecture. internationale.International audienceWe present a framewor...
The authors present an object oriented model of symbol table construction and name lookup for ISO C+...
We consider the following stochastic differential equation for describing financial data evolution: ...
This note presents a non trivial combination of two techniques previously used with randomized incre...
International audiencePoster showing late binding mecanisms as implemented in the SmallEiffel compil...
International audienceThe determination of the position and the orientation of the camera from the k...
Cardiologists assume that analysis of the motion of the heart (especially the left ventricle) can gi...
This paper presents a numerical method for the computation of compressible flows in domains whose bo...
This paper describes issues in the design and implementation of checkpointing and recovery modules f...
Even, Goldreich and Micali showed at Crypto'89 that the existence of signature schemes secure agains...
The implementation of implicit Runge-Kutta methods requires the solution of large systems of non-lin...
This paper presents an approach for the automatic layout generation of regular arrays. These arrays ...
International audiencePoster showing late binding mecanisms as implemented in the SmallEiffel compil...
We study the spectral asymptotics of the Dirichlet-to-Neumann operator Λγ on a multiply-connected, b...
URL: http://www-spht.cea.fr/articles/t95/026/ Le calcul analytique efficace des amplitudes aux ordre...
Colloque avec actes et comité de lecture. internationale.International audienceWe present a framewor...
The authors present an object oriented model of symbol table construction and name lookup for ISO C+...
We consider the following stochastic differential equation for describing financial data evolution: ...
This note presents a non trivial combination of two techniques previously used with randomized incre...
International audiencePoster showing late binding mecanisms as implemented in the SmallEiffel compil...
International audienceThe determination of the position and the orientation of the camera from the k...
Cardiologists assume that analysis of the motion of the heart (especially the left ventricle) can gi...
This paper presents a numerical method for the computation of compressible flows in domains whose bo...
This paper describes issues in the design and implementation of checkpointing and recovery modules f...
Even, Goldreich and Micali showed at Crypto'89 that the existence of signature schemes secure agains...