Sciweavers

1518 search results - page 239 / 304
» Cryptographic Test Correction
Sort
View
SIAMSC
2008
118views more  SIAMSC 2008»
15 years 16 days ago
Splitting Methods Based on Algebraic Factorization for Fluid-Structure Interaction
We discuss in this paper the numerical approximation of fluid-structure interaction (FSI) problems dealing with strong added-mass effect. We propose new semi-implicit algorithms ba...
Santiago Badia, Annalisa Quaini, Alfio Quarteroni
96
Voted
SIAMSC
2008
129views more  SIAMSC 2008»
15 years 16 days ago
Iterative Solution of Piecewise Linear Systems
The correct formulation of numerical models for free-surface hydrodynamics often requires the solution of special linear systems whose coefficient matrix is a piecewise constant fu...
Luigi Brugnano, Vincenzo Casulli
77
Voted
SIGCSE
2008
ACM
138views Education» more  SIGCSE 2008»
15 years 16 days ago
Debugging: the good, the bad, and the quirky -- a qualitative analysis of novices' strategies
A qualitative analysis of debugging strategies of novice Java programmers is presented. The study involved 21 CS2 students from seven universities in the U.S. and U.K. Subjects &q...
Laurie Murphy, Gary Lewandowski, Renée McCa...
115
Voted
IVC
2007
102views more  IVC 2007»
15 years 15 days ago
Analysis of the rubberband algorithm
We consider simple cube-curves in the orthogonal 3D grid of cells. The union of all cells contained in such a curve (also called the tube of this curve) is a polyhedrally bounded s...
Fajie Li, Reinhard Klette
JCP
2007
100views more  JCP 2007»
15 years 15 days ago
Modelling Internet End-to-End Loss Behaviors: A Congestion Control Perspective
— This paper proposes a new approach to modelling and controlling Internet end-to-end loss behaviours. Rather than select the model structure from the loss observations as being ...
Vinh Bui, Weiping Zhu, Ruhul A. Sarker