نتایج جستجو برای: full newton steps

تعداد نتایج: 439527  

1997
PAUL TSENG

We study an infeasible interior path-following method for complemen-tarity problems. The method uses a wide neighborhood and takes one or two Newton steps per iteration. We show that the method attains global convergence, assuming the iterates are deened and bounded (which occurs when the function is a P 0-R 0-function or when the function is monotone and a suuciently positive solution exists)....

2012
Qinian Jin

By making use of duality mappings, we formulate an inexact Newton– Landweber iteration method for solving nonlinear inverse problems in Banach spaces. The method consists of two components: an outer Newton iteration and an inner scheme providing the increments by applying the Landweber iteration in Banach spaces to the local linearized equations. It has the advantage of reducing computational w...

2000
Bernd Kummer

Solutions of several problems can be modelled as solutions of nonsmooth equations. Then, Newton-type methods for solving such equations induce particular iteration steps (actions) and regularity requirements in the original problems. We study these actions and requirements for nonlinear complementarity problems (NCP’s) and Karush–Kuhn–Tucker systems (KKT) of optimization models. We demonstrate ...

2016
Aymen Laadhari Gábor Székely

This paper is concerned with the development of a fully implicit and purely Eulerian fluid-structure interaction method tailored for the modeling of the large deformations of elastic membranes in a surrounding Newtonian fluid. We consider a simplified model for the mechanical properties of the membrane, in which the surface strain energy depends on the membrane stretching. The fully Eulerian de...

Journal: :JSW 2013
Haodong Yu

We propose a semismooth active-set Newton algorithm for solving the nonlinear complementarity problems with degenerate solutions. This method introduces the active-set technique to identify the degenerate set. At each iteration, the search direction is obtained by two reduced linear systems. Instead of employing gradient steps as adjustments to guarantee the sufficient reduction of the merit fu...

Journal: :J. Computational Applied Mathematics 2014
Valentina De Simone Daniela di Serafino

We propose a procedure for building symmetric positive definite band preconditioners for large-scale symmetric, possibly indefinite, linear systems, when the coefficient matrix is not explicitly available, but matrix-vector products involving it can be computed. We focus on linear systems arising in Newton-type iterations within matrix-free versions of projected methods for bound-constrained no...

1998
PAUL TSENG

Recently Chen and Mangasarian proposed a class of smoothing functions for linear/nonlinear programs and complementarity problems that uniies many previous proposals. Here we study a non-interior continuation method based on these functions in which, like interior path-following methods, the iterates are maintained to lie in a neighborhood of some path and, at each iteration, one or two Newton-t...

2005
H. Tschofenig D. Kroeselberg

This threats document provides a detailed analysis of the security threats relevant to the Next Steps in Signaling (NSIS) protocol suite. It calls attention to, and helps with the understanding of, various security considerations in the NSIS Requirements, Framework, and Protocol proposals. This document does not describe vulnerabilities of specific parts of the NSIS protocol suite.

Journal: :Journal of autism and developmental disorders 2009
Kathleen Koenig Andres De Los Reyes Domenic Cicchetti Lawrence Scahill Ami Klin

A consistent result in the evaluation of group-delivered intervention to promote social reciprocity in children with PDDs is that outcome data are inconclusive. Lack of robust evidence of efficacy confounds understanding of these interventions and their value to the field. It is conceivable that the construct of impaired social reciprocity in PDD presents unique circumstances that require speci...

2002
C. Kappler H. Tschofenig

RSVP version 1 has been designed for optimally support multicast. However, in reality multicast is being used much less frequently than anticipated. Still, even for unicast (one sender, one receiver) communication, full−fledged multicast−enabled RSVP signaling must be used. As pointed out in the NSIS requirement draft, multicast would not be necessarily required for an NSIS signaling protocol. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید