Institution
Bauhaus University, Weimar
Education•Weimar, Thüringen, Germany•
About: Bauhaus University, Weimar is a education organization based out in Weimar, Thüringen, Germany. It is known for research contribution in the topics: Finite element method & Isogeometric analysis. The organization has 1421 authors who have published 2998 publications receiving 104454 citations. The organization is also known as: Bauhaus-Universität Weimar & Hochschule für Architektur und Bauwesen.
Topics: Finite element method, Isogeometric analysis, Context (language use), Graphene, Fracture mechanics
Papers published on a yearly basis
Papers
More filters
••
04 Mar 2012
TL;DR: The observations indicate that the generalized God-object approach leads to plausible collision-free positions and motions of the phalanxes of the user's fingers during complex six degree-of-freedom manipulations, while artifacts such as artificial friction or a stuck hand are avoided.
Abstract: We generalize the six degree-of-freedom God-object approach to enable its use for multi-finger interactions in virtual environments. The connected finger phalanxes are modeled as multiple constrained God objects. The mutual interdependencies between multiple God objects are resolved using Gauss' principle of least constraint. This generalization of the God-object method allows us to avoid the penetration of multiple fingers and their phalanxes with objects within a physically simulated virtual world. Our observations indicate that the generalized God-object approach leads to plausible collision-free positions and motions of the phalanxes of the user's fingers during complex six degree-of-freedom manipulations, while artifacts such as artificial friction or a stuck hand are avoided.
33 citations
••
TL;DR: In this paper, a generalized Liouville-type theorem for harmonic functions and bi-harmonic functions by combining the growth behaviour estimates with the series expansions for k-monogenic functions is presented.
Abstract: In this paper, we mainly study the Rm (m>0) Riemann boundary value problems for functions with values in a Clifford algebra Cl(V3, 3). We prove a generalized Liouville-type theorem for harmonic functions and biharmonic functions by combining the growth behaviour estimates with the series expansions for k-monogenic functions. We obtain the result under only one growth condition at infinity by using the integral representation formulas for harmonic functions and biharmonic functions. By using the Plemelj formula and the integral representation formulas, a more generalized Liouville theorem for harmonic functions and biharmonic functions are presented. Combining the Plemelj formula and the integral representation formulas with the above generalized Liouville theorem, we prove that the Rm (m>0) Riemann boundary value problems for monogenic functions, harmonic functions and biharmonic functions are solvable. Explicit representation formulas of the solutions are given. Copyright © 2009 John Wiley & Sons, Ltd.
33 citations
••
TL;DR: In this paper, the sensitivity of four meso-scale uncertain input parameters on the macro-scale response of a dry textile subjected to uni-axial and biaxial deformation is investigated.
33 citations
••
TL;DR: In this article, a parametric study on the long-term deformations of monopile foundations for offshore wind turbines is presented, where finite element calculations of a monopile in fine sand were performed with a high-cycle accumulation (HCA) model.
33 citations
••
07 Dec 2008TL;DR: In this paper, the application of slide attacks to hash functions was studied and the first cryptanalytic result on Grindahl-256 and Grindahl -512 hash functions were presented.
Abstract: This paper studies the application of slide attacks to hash functions. Slide attacks have mostly been used for block cipher cryptanalysis. But, as shown in the current paper, they also form a potential threat for hash functions, namely for sponge-function like structures. As it turns out, certain constructions for hash-function-based MACs can be vulnerable to forgery and even to key recovery attacks. In other cases, we can at least distinguish a given hash function from a random oracle.
To illustrate our results, we describe attacks against the Grindahl -256 and Grindahl -512 hash functions. To the best of our knowledge, this is the first cryptanalytic result on Grindahl -512. Furthermore, we point out a slide-based distinguisher attack on a slightly modified version of RadioGatun . We finally discuss simple countermeasures as a defense against slide attacks.
33 citations
Authors
Showing all 1443 results
Name | H-index | Papers | Citations |
---|---|---|---|
Timon Rabczuk | 99 | 727 | 35893 |
Adri C. T. van Duin | 79 | 489 | 26911 |
Paolo Rosso | 56 | 541 | 12757 |
Xiaoying Zhuang | 54 | 271 | 10082 |
Benno Stein | 53 | 340 | 9880 |
Jin-Wu Jiang | 52 | 175 | 7661 |
Gordon Wetzstein | 51 | 258 | 9793 |
Goangseup Zi | 45 | 153 | 8411 |
Bohayra Mortazavi | 44 | 162 | 5802 |
Thorsten Hennig-Thurau | 44 | 123 | 17542 |
Jörg Hoffmann | 40 | 200 | 7785 |
Martin Potthast | 40 | 190 | 6563 |
Pedro M. A. Areias | 38 | 107 | 5908 |
Amir Mosavi | 38 | 432 | 6209 |
Guido De Roeck | 38 | 274 | 8063 |