scispace - formally typeset
BookDOI

Numerische Mathematik 1

Josef Stoer
Reads0
Chats0
About
The article was published on 1989-01-01. It has received 2186 citations till now.

read more

Citations
More filters
Proceedings ArticleDOI

Approximations to optimal feedback control using a successive wavelet collocation algorithm

TL;DR: A successive wavelet collocation algorithm that uses interpolating wavelets in a collocation scheme to iteratively solve the generalized-Hamilton-Jacobi-Bellman (GHJB) equation and the corresponding optimal control law is proposed.
Dissertation

Effective and Efficient Methodologies for Social Network Analysis

Long Pan
TL;DR: An anytime-anywhere methodology based on a parallel/distributed computational framework to effectively and efficiently analyze large and dynamic social networks and implements its methodology for a set of SNA metrics which are significant for SNA applications and cover a wide range of difficulties.

Automated assessment of English-learner writing

TL;DR: This thesis argues that an approach which does not rely on task-dependent components or data, and directly assesses learner English, can produce results as good as promptspecific models, and presents a user interface that visualises and uncovers the ‘marking criteria’ represented in AA models.
Book ChapterDOI

On the efficient realization of sparse matrix techniques for integral equations with focus on panel clustering, cubature and software design aspects

TL;DR: The boundary element method (BEM) is an elegant tool for solving elliptic boundary value problems numerically by transforming the PDE on a domain Ω into an integral equation defined on the boundary of Ω, where the dimension of the stiffness matrix is much smaller as for the corresponding FE-discretization.
Book ChapterDOI

Web user profiling on proxy logs and its evaluation in personalization

TL;DR: A hierarchical URL dictionary generated from Yahoo! Directory and a cross-hierarchical matching method that provides the function of automatic abstraction are developed that are used to analyze web access actions that are monitored through a web proxy.