Sciweavers

1518 search results - page 239 / 304
» Cryptographic Test Correction
Sort
View
SIAMSC
2008
118views more  SIAMSC 2008»
15 years 3 months ago
Splitting Methods Based on Algebraic Factorization for Fluid-Structure Interaction
We discuss in this paper the numerical approximation of fluid-structure interaction (FSI) problems dealing with strong added-mass effect. We propose new semi-implicit algorithms ba...
Santiago Badia, Annalisa Quaini, Alfio Quarteroni
119
Voted
SIAMSC
2008
129views more  SIAMSC 2008»
15 years 3 months ago
Iterative Solution of Piecewise Linear Systems
The correct formulation of numerical models for free-surface hydrodynamics often requires the solution of special linear systems whose coefficient matrix is a piecewise constant fu...
Luigi Brugnano, Vincenzo Casulli
111
Voted
SIGCSE
2008
ACM
138views Education» more  SIGCSE 2008»
15 years 3 months ago
Debugging: the good, the bad, and the quirky -- a qualitative analysis of novices' strategies
A qualitative analysis of debugging strategies of novice Java programmers is presented. The study involved 21 CS2 students from seven universities in the U.S. and U.K. Subjects &q...
Laurie Murphy, Gary Lewandowski, Renée McCa...
137
Voted
IVC
2007
102views more  IVC 2007»
15 years 3 months ago
Analysis of the rubberband algorithm
We consider simple cube-curves in the orthogonal 3D grid of cells. The union of all cells contained in such a curve (also called the tube of this curve) is a polyhedrally bounded s...
Fajie Li, Reinhard Klette
115
Voted
JCP
2007
100views more  JCP 2007»
15 years 3 months ago
Modelling Internet End-to-End Loss Behaviors: A Congestion Control Perspective
— This paper proposes a new approach to modelling and controlling Internet end-to-end loss behaviours. Rather than select the model structure from the loss observations as being ...
Vinh Bui, Weiping Zhu, Ruhul A. Sarker