The Complexity of Multivariate Elliptic Problems with Analytic Data

نویسنده

  • Arthur G. Werschulz
چکیده

Let F be a class of functions deened on a d-dimensional domain. Our task is to compute H m-norm "-approximations to solutions of 2mth-order elliptic boundary-value problems Lu = f for a xed L and for f 2 F. We assume that the only information we can compute about f 2 F is the value of a nite number of continuous linear functionals of f, each evaluation having cost c(d). Previous work has assumed that F was the unit ball of a Sobolev space H r of xed smoothness r, and it was found that the complexity of computing an "-approximation was comp("; d) = (c(d)(1=") d=(r+m)). Since the exponent of 1=" depends on d, we see that the problem is intractable in 1=" for any such F of xed smoothness r. In this paper, we ask whether we can break intractability by letting F be the unit ball of a space of innnite smoothness. To be speciic, we let F be the unit ball of a Hardy space of analytic functions deened over a complex d-dimensional ball of radius greater than one. We then show that the problem is tractable in 1=". More precisely, we prove that comp("; d) = (c(d)(ln 1=") d), where the-constant depends on d. Since for any p > 0, there is a function K() such that comp("; d) c(d)K(d)(1=") p for suuciently small ", we see that the problem is tractable, with (minimal) exponent 0. Furthermore, we show how to construct a nite element p-method (in the sense of Babu ska) that can compute an "-approximation with cost (c(d)(ln 1=") d). Hence this nite element method is a nearly optimal complexity algorithm for d-dimensional elliptic problems with analytic data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analytic solutions for the Stephen's inverse problem with local boundary conditions including Elliptic and hyperbolic equations

In this paper, two inverse problems of Stephen kind with local (Dirichlet) boundary conditions are investigated. In the first problem only a part of boundary is unknown and in the second problem, the whole of boundary is unknown. For the both of problems, at first, analytic expressions for unknown boundary are presented, then by using these analytic expressions for unknown boundaries and bounda...

متن کامل

Analytic Solution for Hypersonic Flow Past a Slender Elliptic Cone Using Second-Order Perturbation Approximations

An approximate analytical solution is obtained for hypersonic flow past a slender elliptic cone using second-order perturbation techniques in spherical coordinate systems. The analysis is based on perturbations of hypersonic flow past a circular cone aligned with the free stream, the perturbations stemming from the small cross-section eccentricity. By means of hypersonic approximations for the ...

متن کامل

Renormalized Solutions for Strongly Nonlinear Elliptic Problems with Lower Order Terms and Measure Data in Orlicz-Sobolev Spaces

The purpose of this paper is to prove the existence of a renormalized solution of perturbed elliptic problems$ -operatorname{div}Big(a(x,u,nabla u)+Phi(u) Big)+ g(x,u,nabla u) = mumbox{ in }Omega,  $ in the framework of Orlicz-Sobolev spaces without any restriction on the $M$ N-function of the Orlicz spaces, where $-operatorname{div}Big(a(x,u,nabla u)Big)$ is a Leray-Lions operator defined f...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Complexity

دوره 11  شماره 

صفحات  -

تاریخ انتشار 1995