scispace - formally typeset
Search or ask a question
Institution

Bauhaus University, Weimar

EducationWeimar, Thüringen, Germany
About: Bauhaus University, Weimar is a education organization based out in Weimar, Thüringen, Germany. It is known for research contribution in the topics: Finite element method & Isogeometric analysis. The organization has 1421 authors who have published 2998 publications receiving 104454 citations. The organization is also known as: Bauhaus-Universität Weimar & Hochschule für Architektur und Bauwesen.


Papers
More filters
Proceedings ArticleDOI
04 Mar 2012
TL;DR: The observations indicate that the generalized God-object approach leads to plausible collision-free positions and motions of the phalanxes of the user's fingers during complex six degree-of-freedom manipulations, while artifacts such as artificial friction or a stuck hand are avoided.
Abstract: We generalize the six degree-of-freedom God-object approach to enable its use for multi-finger interactions in virtual environments. The connected finger phalanxes are modeled as multiple constrained God objects. The mutual interdependencies between multiple God objects are resolved using Gauss' principle of least constraint. This generalization of the God-object method allows us to avoid the penetration of multiple fingers and their phalanxes with objects within a physically simulated virtual world. Our observations indicate that the generalized God-object approach leads to plausible collision-free positions and motions of the phalanxes of the user's fingers during complex six degree-of-freedom manipulations, while artifacts such as artificial friction or a stuck hand are avoided.

33 citations

Journal ArticleDOI
TL;DR: In this paper, a generalized Liouville-type theorem for harmonic functions and bi-harmonic functions by combining the growth behaviour estimates with the series expansions for k-monogenic functions is presented.
Abstract: In this paper, we mainly study the Rm (m>0) Riemann boundary value problems for functions with values in a Clifford algebra Cl(V3, 3). We prove a generalized Liouville-type theorem for harmonic functions and biharmonic functions by combining the growth behaviour estimates with the series expansions for k-monogenic functions. We obtain the result under only one growth condition at infinity by using the integral representation formulas for harmonic functions and biharmonic functions. By using the Plemelj formula and the integral representation formulas, a more generalized Liouville theorem for harmonic functions and biharmonic functions are presented. Combining the Plemelj formula and the integral representation formulas with the above generalized Liouville theorem, we prove that the Rm (m>0) Riemann boundary value problems for monogenic functions, harmonic functions and biharmonic functions are solvable. Explicit representation formulas of the solutions are given. Copyright © 2009 John Wiley & Sons, Ltd.

33 citations

Journal ArticleDOI
TL;DR: In this paper, the sensitivity of four meso-scale uncertain input parameters on the macro-scale response of a dry textile subjected to uni-axial and biaxial deformation is investigated.

33 citations

Journal ArticleDOI
TL;DR: In this article, a parametric study on the long-term deformations of monopile foundations for offshore wind turbines is presented, where finite element calculations of a monopile in fine sand were performed with a high-cycle accumulation (HCA) model.

33 citations

Book ChapterDOI
07 Dec 2008
TL;DR: In this paper, the application of slide attacks to hash functions was studied and the first cryptanalytic result on Grindahl-256 and Grindahl -512 hash functions were presented.
Abstract: This paper studies the application of slide attacks to hash functions. Slide attacks have mostly been used for block cipher cryptanalysis. But, as shown in the current paper, they also form a potential threat for hash functions, namely for sponge-function like structures. As it turns out, certain constructions for hash-function-based MACs can be vulnerable to forgery and even to key recovery attacks. In other cases, we can at least distinguish a given hash function from a random oracle. To illustrate our results, we describe attacks against the Grindahl -256 and Grindahl -512 hash functions. To the best of our knowledge, this is the first cryptanalytic result on Grindahl -512. Furthermore, we point out a slide-based distinguisher attack on a slightly modified version of RadioGatun . We finally discuss simple countermeasures as a defense against slide attacks.

33 citations


Authors

Showing all 1443 results

NameH-indexPapersCitations
Timon Rabczuk9972735893
Adri C. T. van Duin7948926911
Paolo Rosso5654112757
Xiaoying Zhuang5427110082
Benno Stein533409880
Jin-Wu Jiang521757661
Gordon Wetzstein512589793
Goangseup Zi451538411
Bohayra Mortazavi441625802
Thorsten Hennig-Thurau4412317542
Jörg Hoffmann402007785
Martin Potthast401906563
Pedro M. A. Areias381075908
Amir Mosavi384326209
Guido De Roeck382748063
Network Information
Related Institutions (5)
Delft University of Technology
94.4K papers, 2.7M citations

83% related

Georgia Institute of Technology
119K papers, 4.6M citations

83% related

Carnegie Mellon University
104.3K papers, 5.9M citations

83% related

Eindhoven University of Technology
52.9K papers, 1.5M citations

82% related

Microsoft
86.9K papers, 4.1M citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202321
202260
2021224
2020249
2019247
2018273