Adaptive Boundary Element Methods Part 1: Newest Vertex Bisection. Dirk Praetorius
|
|
- Jonah Maxwell
- 5 years ago
- Views:
Transcription
1 CENTRAL School on Analysis and Numerics for PDEs November 09-12, 2015 Part 1: Newest Vertex Bisection Dirk Praetorius TU Wien Institute for Analysis and Scientific Computing
2 Outline 1 Regular Triangulations 2 Newest Vertex Bisection 3 Overlay Estimate 4 Closure Estimate praetorius/central01 praetorius.pdf Dirk Praetorius (TU Wien) 1 / 47
3 Regular Triangulations Dirk Praetorius (TU Wien)
4 Regular Triangulations Triangulation of Ω R 2 Dirk Praetorius (TU Wien) 2 / 47
5 Regular Triangulations Triangulation of Ω R 2 T is triangulation of Ω R 2, if T is finite set of compact triangles T with T > 0 T covers Ω, i.e., Ω = T T T. for all T,T T with T T holds T T = 0 i.e., the overlap of two elements is trivial Dirk Praetorius (TU Wien) 3 / 47
6 Regular Triangulations Regular triangulation Triangulation T is regular or conforming, if for all T,T T with T T, the intersection T T is either empty or a joint node T T = {z} or a joint edge T T = E regular not regular, hanging node Dirk Praetorius (TU Wien) 4 / 47
7 Regular Triangulations Shape regularity Triangulation T is γ-shape regular or (locally) γ-quasi uniform max T T diam(t) 2 T γ < geometrically: minimal angles of all T T are bounded from below analytically: enters inverse estimates and approximation estimates e.g., U L 2 (T) C(γ,q)diam(T) 1 U L 2 (T) for all U P q (T) sloppy formulation in papers:... where the constants depend on the shape of the elements. If the triangulation is (locally) quasi uniform, it holds... better:... where the constants depend on γ. Dirk Praetorius (TU Wien) 5 / 47
8 Regular Triangulations Axioms on mesh-refinement given initial mesh T 0 given mesh-refinement strategy refine( ) Axioms of Adaptivity require 1 all constants in (A1) (A4) are bounded γ-shape regularity 2 refined elements are split in 2 and n many sons 3 overlay estimate 4 closure estimate aim of talk: all is satisfied for Newest Vertex Bisection (NVB) Dirk Praetorius (TU Wien) 6 / 47
9 Newest Vertex Bisection Dirk Praetorius (TU Wien)
10 Newest Vertex Bisection Newest Vertex Bisection (NVB) each element has reference edge refinement by bisection T son of T = T = T /2 new reference edges are opposite to newest vertex for T T, obtain unique binary tree with possible successors T with T T Dirk Praetorius (TU Wien) 7 / 47
11 Newest Vertex Bisection NVB guarantees finitely many shapes NVB leads to only finitely many similarity classes of triangles depends only on T and its reference edge in particular, uniform shape regularity diam(t ) 2 T γ(t) < for all NVB successors T of T Dirk Praetorius (TU Wien) 8 / 47
12 Newest Vertex Bisection Element level function suppose initial triangulation T 0 with fixed reference edges each NVB successor T of some T 0 T 0 has refinement level: lev(t) := 0 if T = T 0 lev(t) := lev( T)+1 if T son of T note that diam(t) 2 T = T 0 2 lev(t) Lemma T,T T 0 T 0 with lev(t) = lev(t ) = T = T or T T = 0 proof by induction on lev(t) Dirk Praetorius (TU Wien) 9 / 47
13 Newest Vertex Bisection T = nvb(t,m) initialization for all marked elements T T M, mark its reference edge recursion if element s edge is marked, mark at least its reference edge terminates, since each triangulation has only finitely many edges refinement according to scheme note that each case is iterated NVB each refined element has 2, 3, or 4 sons Dirk Praetorius (TU Wien) 10 / 47
14 Newest Vertex Bisection Example given reference edges Dirk Praetorius (TU Wien) 11 / 47
15 Newest Vertex Bisection Example given reference edges marked elements M l T l Dirk Praetorius (TU Wien) 11 / 47
16 Newest Vertex Bisection Example given reference edges marked elements M l T l mark reference edges Dirk Praetorius (TU Wien) 11 / 47
17 Newest Vertex Bisection Example given reference edges marked elements M l T l mark reference edges proceed recursively Dirk Praetorius (TU Wien) 11 / 47
18 Newest Vertex Bisection Example given reference edges marked elements M l T l mark reference edges proceed recursively mesh refinement Dirk Praetorius (TU Wien) 11 / 47
19 Newest Vertex Bisection NVB preserves regularity recall refinement scheme T regular = T = nvb(t,m) regular since new nodes are always edge midpoints marked edge E = T T is refined for both elements i.e., refinement creates no new hanging nodes nvb(t,m) is coarsest conforming refinement of T s.t. all T M are bisected by NVB Dirk Praetorius (TU Wien) 12 / 47
20 Newest Vertex Bisection Order of refinement does not matter order of refinement does not matter T 1,T 2 T = nvb(nvb(t,{t 1 }),{T 2 })) = nvb(nvb(t,{t 2 }),{T 1 })) since only one refinement rule T = nvb(t,m) can also be realized through single refinements T := T for each T M T := nvb(t,{t}) end recall that nvb(t,{t}) usually refines more than 1 element Dirk Praetorius (TU Wien) 13 / 47
21 Newest Vertex Bisection Iterated NVB refinement T given regular triangulation fixed reference edge for all T T write T nvb(t ) if T is obtained by finitely many steps, i.e., exists n N 0, exists T 0,T 1,...,T n with T 0 = T and T n = T, exists M j T j, such that: T j = nvb(t j 1,M j 1 ) for all j = 1,...,n. initial triangulation T 0 fixes possible T T := nvb(t 0 ) Dirk Praetorius (TU Wien) 14 / 47
22 Overlay Estimate Dirk Praetorius (TU Wien)
23 Overlay Estimate Example T (blue) Dirk Praetorius (TU Wien) 15 / 47
24 Overlay Estimate Example T (red) Dirk Praetorius (TU Wien) 15 / 47
25 Overlay Estimate Example T (blue) T (red) T T Dirk Praetorius (TU Wien) 15 / 47
26 Overlay Estimate Lemma Local compatibility For all NVB successors T,T T 0 T 0 with T T > 0, it holds lev(t ) > lev(t) = T T lev(t ) = lev(t) = T = T (already proved) Proof. for all k lev(t) exist unique NVB successors T k,t k of T 0 s.t. lev(t k ) = k = lev(t k ) T T k and T T k T k T k T T > 0 implies T k = T k for all k lev(t) and T = T k for k = lev(t) i.e., T T k = T k = T for k = lev(t) T T k for lev(t ) > k Dirk Praetorius (TU Wien) 16 / 47
27 Overlay Estimate Overlay 1/2 Proposition (Overlay of NVB meshes) T,T nvb(t 0 ) T T := { T T : T T, T T, T T > 0 } = T T nvb(t ) nvb(t ) Proof. for x Ω, choose sequence T k of NVB triangles s.t. x T k lev(t k ) = k T k T k+1 = ex. i,j N s.t. T i T, T j T and x T i T j T T T = T T T T = T = T or T = T (local compatibility) = T T is triangulation remains to show: T T is regular Dirk Praetorius (TU Wien) 17 / 47
28 Overlay Estimate Overlay 2/2 recall: T T := { T T : T T, T T, T T > 0 } let T,T T T let z be node of T with z T goal: z is also node of T (i.e., there are no hanging nodes) w.l.o.g. T T w.l.o.g. T T (otherwise claim follows from regularity of T ) by definition of T T, there exists T T with T T thus, z T T regularity of T = z is node of T = z is node of T T is NVB successor of T with z T nodes stay nodes under NVB refinement Dirk Praetorius (TU Wien) 18 / 47
29 Overlay Estimate Overlay estimate Proposition (Overlay estimate) Let T,T T = nvb(t 0 ) = exists T T nvb(t ) nvb(t ) s.t. #(T T ) #T +#T #T 0 Proof. recall: T T := { T T : T T, T T, T T > 0 } shown: T T consists of elements of T and elements of T too rough estimate: #(T T ) #T +#T but: can locally subtract the number of coarser elements e.g., T = T T T T with T T, T T = do not count T for #(T T ) for each T 0 T 0, at least one such element in T T can be omitted = #(T T ) #T +#T #T 0 Dirk Praetorius (TU Wien) 19 / 47
30 Overlay Estimate Remarks T T := { T T : T T, T T, T T > 0 } is coarsest common refinement of T and T i.e., #(T T ) = min { # T : T nvb(t ) nvb(t ) } same proof works for NVB in R d instead of 2D overlay estimate can be proved for simple refinement strategies e.g., red refinement with hanging nodes overlay estimate fails for 2D red-green-blue refinement Stevenson: Found. Comp. Math. (2007) NVB in R 2 Cascón, Kreuzer, Nochetto, Siebert: SINUM (2008) Bonito, Nochetto: SINUM (2010) NVB in R d red refinement with hanging nodes Pavlicek: Bakk thesis (TU Wien 2011) RGB in R 2 Dirk Praetorius (TU Wien) 20 / 47
31 Closure Estimate Dirk Praetorius (TU Wien)
32 Closure Estimate Example M l T l T l+1 = nvb(t l,m l ) Dirk Praetorius (TU Wien) 21 / 47
33 Closure Estimate Example M l T l T l+1 = nvb(t l,m l ) clearly: #M l #R l Dirk Praetorius (TU Wien) 21 / 47
34 Closure Estimate Example M l T l T l+1 = nvb(t l,m l ) clearly: #M l #R l #R l C#M l cannot hold #M l = 1 #R l l Dirk Praetorius (TU Wien) 21 / 47
35 Closure Estimate Admissibility Initial triangulation T 0 is admissible, if for all T,T T 0, it holds E := T T is reference edge of T E is reference edge of T Dirk Praetorius (TU Wien) 22 / 47
36 Closure Estimate Closure estimate Theorem (Binev, Dahmen, DeVore 04, Stevenson 08) T 0 admissible T j = nvb(t j 1,M j 1 ) with M j 1 T j 1 for all j = 1,2,3,... l 1 = #T l #T 0 C(T 0 ) #M j j=0 recall: #T l #T l 1 C(T 0 )M l by counter example remainder of talk: proof of theorem Dirk Praetorius (TU Wien) 23 / 47
37 Closure Estimate Uniform refinements are admissible Lemma T 0 admissible T k := nvb(t k 1,T k 1 ) uniform refinement for k = 1,2,3,... = T k admissible and lev(t) = k for all T T k Proof by induction on k. start: k = 0 hypothesis: claim OK for k goal: claim for k+1 T k is admissible = only reference edges are refined no recursive marking needed all non-reference edges become reference edges of T k+1 Dirk Praetorius (TU Wien) 24 / 47
38 Closure Estimate Neighbors differ by level 1 Lemma T nvb(t 0 ) with T 0 admissible T,N T with E := T N edge = lev(t) lev(n) 1 Proof. w.l.o.g.: lev(t) = lev(n)+n with n 1 consider uniform refinement of T 0 with lev(t) = n levels of bisection provide successor N of N s.t. lev(n ) = lev(n)+n = lev(t) E = T N, since uniform refinement is regular = n 1, since 2 levels of bisection half all edges Dirk Praetorius (TU Wien) 25 / 47
39 Closure Estimate Configurations of reference edge 1/5 Lemma T nvb(t 0 ) with T 0 admissible T,N T with E := T N reference edge of T = Then, either lev(t) = lev(n) and E is also reference edge of N or lev(t) = lev(n)+1 and E is reference edge of son of N Proof by consideration of three cases. since lev(t) lev(n) 1: 1 lev(t) = lev(n) 2 lev(t) = lev(n)+1 3 lev(t)+1 = lev(n) Dirk Praetorius (TU Wien) 26 / 47
40 Closure Estimate Configurations of reference edge 2/5 1 Case. lev(t) = lev(n) goal: E is reference edge of T and N bisect T into T,T and N into N,N = lev(t ) = lev(t ) = lev(n ) = lev(n ) = {T,T,N,N } regular triangulation of T N E is split, since E is reference edge of T = E is also reference edge of N Dirk Praetorius (TU Wien) 27 / 47
41 Closure Estimate Configurations of reference edge 3/5 2 Case. lev(t) = lev(n)+1 goal: E is reference edge of T and son of N bisect N into N,N = lev(t) = lev(n ) = lev(n ) = {T,N,N } regular triangulation of T N E is not split, since E is reference edge of T = E is not reference edge of N = E is reference edge of one son of N Dirk Praetorius (TU Wien) 28 / 47
42 Closure Estimate Configurations of reference edge 4/5 3 Case. lev(t)+1 = lev(n) goal: this case is never met! bisect T into T,T = lev(t ) = lev(t ) = lev(n) = {T,T,N} regular triangulation of T N E is split, since E is reference edge of T = contradicts regularity Dirk Praetorius (TU Wien) 29 / 47
43 Closure Estimate Configurations of reference edge 5/5 Lemma T nvb(t 0 ) with T 0 admissible T,N T with E := T N reference edge of T = Then, either lev(t) = lev(n) and E also reference edge of N or lev(t) = lev(n)+1 and E is reference edge of son of N k k k k k +1 k +1 Dirk Praetorius (TU Wien) 30 / 47
44 Closure Estimate Lemma T nvb(t 0 ) with T 0 admissible Recursive refinement 1/6 T,N T with E := T N reference edge of T = ( T nvb(t,{n}) E also reference edge of N ) Proof of = (since = is clear). ex. minimal n and T 1,...,T n+1 T s.t. T 1 = N, T n+1 = T E j := T j T j+1 is reference edge of T j for all j = 1,...,n Case 1. n = 1, i.e., T 2 = T = E also reference edge of N = T 1 Case 2. n > 1, i.e., E j not reference edge of T j+1 for all j = 1,...,n = lev(t j ) = lev(t j+1 )+1 = lev(n) = lev(t 1 ) = = lev(t n+1 )+n = lev(t)+n = n 1 = contradicts n > 1 Dirk Praetorius (TU Wien) 31 / 47
45 Closure Estimate Recursive refinement 2/6 Lemma (Level of generated elements) T T nvb(t 0 ) with T 0 admissible T nvb(t,{t})\t = lev(t ) lev(t)+1 Proof by induction on lev(t). start: k = 0 is clear, since T 0 is admissible hypothesis: claim OK for all T with lev(t) k suppose lev(t) = k+1 w.l.o.g.: #(nvb(t,{t})\t ) > 2, i.e., more than T is refined let N T s.t. E := N T is reference edge of T Case 1. lev(t) = lev(n) k + 1 k + 1 Dirk Praetorius (TU Wien) 32 / 47
46 Closure Estimate Recursive refinement 3/6 Case 2. lev(t) = lev(n)+1 T nvb(t,{t})\t N T with E := T N is reference edge of T lev(t) = k+1 = lev(n) = k, i.e., hypothesis applies to N nvb(t,{t}) = nvb(t,{t}) with T := nvb(t,{n}) T T \T = lev(t ) lev(n)+1 = lev(t) T nvb(t,{t})\t is either son of T, i.e., lev(t ) = lev(t)+1 or grandson of N, i.e., lev(t ) = lev(n)+2 = lev(t)+1. k k + 1 k + 1 Dirk Praetorius (TU Wien) 33 / 47
47 Closure Estimate Recursive refinement 4/6 recall diam(t) 2 T = T 0 2 lev(t) with T T 0 T 0 = Ex. d,d > 0 s.t. d2 lev(t) T diam(t) 2 D 2 2 lev(t) Lemma (Distance of generated elements) T T nvb(t 0 ) with T 0 admissible T nvb(t,{t})\t lev(t) = dl(t,t ) := min x x 2D 2 j/2 x T x T j=lev(t ) Proof. Step 1. T T son of T = dl(t,t ) = 0 Step 2. E := T N is reference edge of T,N T = T and N are bisected once = dl(t,t ) = 0 Dirk Praetorius (TU Wien) 34 / 47
48 Closure Estimate Recursive refinement 5/6 Step 3. Proceed by induction on k = lev(t) start: k = 0 follows from Step 1 2, since T 0 is admissible hypothesis: estimate is true up to level k. suppose lev(t ) = k+1 and T T (covered by Step 1) N T with E := T N reference edge of T, but not of N (Step 2) = lev(t) = lev(n)+1 and T nvb(t,{n})\t = lev(n) = k and dl(n,t ) 2D lev(n) j=lev(t ) 2 j/2 triangle inequality = dl(t,t ) diam(n)+dl(n,t ) lev(t) = lev(n)+1 = diam(n) D2 lev(n)/2 = 2D2 lev(t)/2 = dl(t,t ) 2D lev(t) j=lev(t ) 2 j/2 Dirk Praetorius (TU Wien) 35 / 47
49 Closure Estimate Recursive refinement 6/6 Proposition (Control of generated elements) T T nvb(t 0 ) with T 0 admissible T nvb(t,{t})\t = lev(t ) lev(t)+1 and dl(t,t ) B(T 0 )2 lev(t )/2 Proof. dl(t,t ) 2D lev(t) j=lev(t ) 2 j/2 = 2 (lev(t )+k)/2 2 lev(t )/2 1 k=0 = B = lev(t) lev(t ) k= /2 2 (lev(t )+k)/2 2D 1 2 1/2 and B = B(T 0 ). Dirk Praetorius (TU Wien) 36 / 47
50 Closure Estimate Closure estimate Theorem (Binev, Dahmen, DeVore 04, Stevenson 08) T 0 admissible T j = nvb(t j 1,M j 1 ) with M j 1 T j 1 for all j = 1,2,3,... l 1 = #T l #T 0 C(T 0 ) #M j j=0 use these assumptions in the following! Dirk Praetorius (TU Wien) 37 / 47
51 Closure Estimate Proof of closure estimate 1/9 A = A(T 0 ) := (D +B) p=0 (p+2)3 2 p/2 < Lemma M M := l 1 j=0 M j 0 k lev(m)+1 U k (M) := { T T l : lev(t) = k and dl(t,m) A2 k/2} = #U k (M) Ã(T 0) < Proof. diam(m) D2 lev(m)/2 D2 (k 1)/2 2D2 k/2 x T U k (M), y M = x y diam(t)+dl(t,m)+diam(m) 2 k/2 = U k (M) 2 k T 2 k for T U k (M) = #U k (M) 1. Dirk Praetorius (TU Wien) 38 / 47
52 Closure Estimate Proof of closure estimate 2/9 for T T and M M := l 1 j=0 M j define (lev(m) lev(t)+2) 2 if dl(t,m) A2 lev(t)/2 λ(t,m) := and lev(t) lev(m)+1 0 otherwise Lemma (upper bound) M M = T T l λ(t,m) π2 6 Ã(T 0) Proof. recall: U k (M) := { T T l : lev(t) = k and dl(t,m) A2 k/2} lev(m)+1 λ(t,m) = λ(t,m) T T l k=0 T U k (M) observe: λ(t,m) = (lev(m) k +2) 2. Dirk Praetorius (TU Wien) 39 / 47
53 Closure Estimate Lemma (upper bound) Proof of closure estimate 3/9 M M := l 1 j=0 M j = T T l λ(t,m) π2 6 Ã(T 0) Proof (cont d). lev(m)+1 λ(t,m) = λ(t,m) T T l k=0 T U k (M) observe: λ(t,m) = (lev(m) k +2) 2. = T T l λ(t,m) Ã(T 0) lev(m)+1 k=0 (lev(m) k+2) 2 lev(m)+1 k=0 p=1 (lev(m) k+2) 2 1 p 2 = π2 6 Dirk Praetorius (TU Wien) 40 / 47
54 Closure Estimate Proof of closure estimate 4/9 M M := l 1 j=0 M j = T T l λ(t,m) π2 6 Ã(T 0) Lemma (lower bound) T T l \T 0 = λ(t,m) 1 M M Lemmas imply closure estimate. #T l #T 0 #(T l \T 0 ) T T l \T 0 M M λ(t, M) (lower bound) λ(t,m) π2 6 Ã(T 0) #M (upper bound) M MT T l \T 0 = #T l #T 0 π2 6 Ã(T 0)#M = π2 6 Ã(T l 1 0) #M j Dirk Praetorius (TU Wien) 41 / 47 j=0
55 Closure Estimate Lemma (lower bound) T T l \T 0 = Proof of closure estimate 5/9 M M λ(t,m) 1, where M := l 1 j=0 M j Proof. ex. M 1,...,M n M and l 1 l 2 l n = 0 s.t. with M 0 := T M j nvb(t lj,{m j+1 })\T lj = lev(m j ) lev(m j+1 )+1, i.e., level decrease at most 1 = and dl(m j+1,m j ) B2 lev(m j)/2 clearly, lev(t) 1 = ex. minimal index t {1,...,n} s.t. lev(m t ) = lev(t) 1 = in particular, lev(t) lev(m j )+1 for all 1 j t j 1 next aim: dl(t,m j ) (D +B) k=0 2 lev(m k)/2 Dirk Praetorius (TU Wien) 42 / 47
56 Closure Estimate Proof of closure estimate 6/9 M 0 := T, M 1,...,M t M chosen s.t. lev(t) lev(m j )+1 lev(m j 1 ) lev(m j )+1 dl(m j,m j 1 ) B2 lev(mj 1)/2 triangle ineq. = dl(t,m j ) dl(t,m 1 )+diam(m 1 )+dl(m 1,M j ) j 1 inductively = dl(t,m j ) diam(m k )+ = dl(t,m j ) (D +B) k=1 j 1 2 lev(m k)/2 k=0 j dl(m k 1,M k ) k=1 define m(p,j) := # { k = 1,...,j 1 : lev(m k ) = lev(t)+p } = dl(t,m j ) (D +B) m(p,j)2 p/2 2 lev(t)/2 p=0 Dirk Praetorius (TU Wien) 43 / 47
57 Closure Estimate Proof of closure estimate 7/9 shown: dl(t,m j ) (D +B) m(p,j)2 p/2 2 lev(t)/2 for j = 1,...,t p=0 Case 1. m(p,t) (p+2) 3 for all p = 0,1,2,... = dl(t,m t ) (D +B) (p+2) 3 2 p/2 2 lev(t)/2 =: A2 lev(t)/2 p=0 recall: lev(m t ) = lev(t) 1 (lev(m) lev(t)+2) 2 if dl(t,m) A2 lev(t)/2 λ(t,m) := and lev(t) lev(m)+1 0 otherwise = λ(t,m t ) = 1 = λ(t,m) λ(t,m t ) = 1 M M Dirk Praetorius (TU Wien) 44 / 47
58 Closure Estimate Proof of closure estimate 8/9 recall: m(p,j) = # { k = 1,...,j 1 : lev(m k ) = lev(t)+p } Case 2. m(p,t) > (p+2) 3 for some p = 0,1,2,... for all those p, choose minimal t p = 2,...,t s.t. m(p,t p ) > (p+2) 3 choose p with minimal t := t p = m(p,k) (p+2) 3 for all p and all k = 1,...,t 1 as in Case 1 = dl(t,m k ) A2 lev(t)/2 recall: lev(t) lev(m k )+1 = λ(t,m k ) = (lev(m k ) lev(t)+2) 2 Dirk Praetorius (TU Wien) 45 / 47
59 Closure Estimate Proof of closure estimate 9/9 M 1,...,M t 1 M chosen s.t. λ(t,m k ) = (lev(m k ) lev(t)+2) 2 t = 2,...,t minimal s.t. m(p,t ) > (p +2) 3 recall: m(p,j) = # { k = 1,...,j 1 : lev(m k ) = lev(t)+p } = m(p,t ) 1 m(p,t 1) (p +2) 3 < m(p,t ) inequality in N = m(p,t 1) = (p +2) 3 = M M = M M λ(t,m) t 1 λ(t,m k ) = k=0 lev(m k )=lev(t)+p λ(t,m) (p +2) 2 in both cases = M M λ(t,m) 1 m(p,t 1) (p +2) 2 Dirk Praetorius (TU Wien) 46 / 47
60 Closure Estimate References Binev, Dahmen, DeVore: Numer. Math. (2004) NVB in R 2 with admissible T 0 Stevenson: Math. Comp. (2008) NVB in R d with admissible T 0 Bonito, Nochetto: SINUM (2010) red refinement in R d with hanging nodes Karkulik, Pavlicek, Praetorius: Constr. Approx. (2013) NVB in R d with arbitrary T 0 Aurada, Feischl, Führer, Karkulik, Praetorius: CMAM (2013) 1D bisection with bounded local mesh ratio Morgenstern, Peterseim: Comput. Aided Geom. Design (2015) T-spline meshes Dirk Praetorius (TU Wien) 47 / 47
61 Thanks for listening! Dirk Praetorius TU Wien Institute for Analysis and Scientific Computing praetorius Dirk Praetorius (TU Wien)
Axioms of Adaptivity (AoA) in Lecture 1 (sufficient for optimal convergence rates)
Axioms of Adaptivity (AoA) in Lecture 1 (sufficient for optimal convergence rates) Carsten Carstensen Humboldt-Universität zu Berlin 2018 International Graduate Summer School on Frontiers of Applied and
More informationAdaptive Boundary Element Methods Part 2: ABEM. Dirk Praetorius
CENTRAL School on Analysis and Numerics for PDEs November 09-12, 2015 Adaptive Boundary Element Methods Part 2: ABEM Dirk Praetorius TU Wien Institute for Analysis and Scientific Computing Outline 1 Boundary
More informationRate optimal adaptive FEM with inexact solver for strongly monotone operators
ASC Report No. 19/2016 Rate optimal adaptive FEM with inexact solver for strongly monotone operators G. Gantner, A. Haberl, D. Praetorius, B. Stiftner Institute for Analysis and Scientific Computing Vienna
More informationAxioms of Adaptivity
Axioms of Adaptivity Carsten Carstensen Humboldt-Universität zu Berlin Open-Access Reference: C-Feischl-Page-Praetorius: Axioms of Adaptivity. Computer & Mathematics with Applications 67 (2014) 1195 1253
More informationConvergence and optimality of an adaptive FEM for controlling L 2 errors
Convergence and optimality of an adaptive FEM for controlling L 2 errors Alan Demlow (University of Kentucky) joint work with Rob Stevenson (University of Amsterdam) Partially supported by NSF DMS-0713770.
More informationAxioms of Adaptivity (AoA) in Lecture 3 (sufficient for optimal convergence rates)
Axioms of Adaptivity (AoA) in Lecture 3 (sufficient for optimal convergence rates) Carsten Carstensen Humboldt-Universität zu Berlin 2018 International Graduate Summer School on Frontiers of Applied and
More informationAn optimal adaptive finite element method. Rob Stevenson Korteweg-de Vries Institute for Mathematics Faculty of Science University of Amsterdam
An optimal adaptive finite element method Rob Stevenson Korteweg-de Vries Institute for Mathematics Faculty of Science University of Amsterdam Contents model problem + (A)FEM newest vertex bisection convergence
More informationAxioms of adaptivity. ASC Report No. 38/2013. C. Carstensen, M. Feischl, M. Page, D. Praetorius
ASC Report No. 38/2013 Axioms of adaptivity C. Carstensen, M. Feischl, M. Page, D. Praetorius Institute for Analysis and Scientific Computing Vienna University of Technology TU Wien www.asc.tuwien.ac.at
More informationAxioms of Adaptivity (AoA) in Lecture 2 (sufficient for optimal convergence rates)
Axioms of Adaptivity (AoA) in Lecture 2 (sufficient for optimal convergence rates) Carsten Carstensen Humboldt-Universität zu Berlin 2018 International Graduate Summer School on Frontiers of Applied and
More informationMultigrid Methods for Elliptic Obstacle Problems on 2D Bisection Grids
Multigrid Methods for Elliptic Obstacle Problems on 2D Bisection Grids Long Chen 1, Ricardo H. Nochetto 2, and Chen-Song Zhang 3 1 Department of Mathematics, University of California at Irvine. chenlong@math.uci.edu
More informationNumerische Mathematik
Numer. Math. (2004) 97: 193 217 Digital Object Identifier (DOI) 10.1007/s00211-003-0493-6 Numerische Mathematik Fast computation in adaptive tree approximation Peter Binev, Ronald DeVore Department of
More informationAdaptive Finite Element Methods Lecture 1: A Posteriori Error Estimation
Adaptive Finite Element Methods Lecture 1: A Posteriori Error Estimation Department of Mathematics and Institute for Physical Science and Technology University of Maryland, USA www.math.umd.edu/ rhn 7th
More informationIn case (1) 1 = 0. Then using and from Friday,
Math 316, Intro to Analysis The order of the real numbers. The field axioms are not enough to give R, as an extra credit problem will show. Definition 1. An ordered field F is a field together with a nonempty
More informationAdaptive tree approximation with finite elements
Adaptive tree approximation with finite elements Andreas Veeser Università degli Studi di Milano (Italy) July 2015 / Cimpa School / Mumbai Outline 1 Basic notions in constructive approximation 2 Tree approximation
More informationM17 MAT25-21 HOMEWORK 6
M17 MAT25-21 HOMEWORK 6 DUE 10:00AM WEDNESDAY SEPTEMBER 13TH 1. To Hand In Double Series. The exercises in this section will guide you to complete the proof of the following theorem: Theorem 1: Absolute
More informationDefinability in the Enumeration Degrees
Definability in the Enumeration Degrees Theodore A. Slaman W. Hugh Woodin Abstract We prove that every countable relation on the enumeration degrees, E, is uniformly definable from parameters in E. Consequently,
More informationNumerische Mathematik
Numer. Math. (2017) 136:1097 1115 DOI 10.1007/s00211-017-0866-x Numerische Mathematik Convergence of natural adaptive least squares finite element methods Carsten Carstensen 1 Eun-Jae Park 2 Philipp Bringmann
More informationIn case (1) 1 = 0. Then using and from the previous lecture,
Math 316, Intro to Analysis The order of the real numbers. The field axioms are not enough to give R, as an extra credit problem will show. Definition 1. An ordered field F is a field together with a nonempty
More informationAdaptive approximation of eigenproblems: multiple eigenvalues and clusters
Adaptive approximation of eigenproblems: multiple eigenvalues and clusters Francesca Gardini Dipartimento di Matematica F. Casorati, Università di Pavia http://www-dimat.unipv.it/gardini Banff, July 1-6,
More informationShortest paths with negative lengths
Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no
More informationCographs; chordal graphs and tree decompositions
Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs
More informationWe are going to discuss what it means for a sequence to converge in three stages: First, we define what it means for a sequence to converge to zero
Chapter Limits of Sequences Calculus Student: lim s n = 0 means the s n are getting closer and closer to zero but never gets there. Instructor: ARGHHHHH! Exercise. Think of a better response for the instructor.
More informationR T (u H )v + (2.1) J S (u H )v v V, T (2.2) (2.3) H S J S (u H ) 2 L 2 (S). S T
2 R.H. NOCHETTO 2. Lecture 2. Adaptivity I: Design and Convergence of AFEM tarting with a conforming mesh T H, the adaptive procedure AFEM consists of loops of the form OLVE ETIMATE MARK REFINE to produce
More informationn n P} is a bounded subset Proof. Let A be a nonempty subset of Z, bounded above. Define the set
1 Mathematical Induction We assume that the set Z of integers are well defined, and we are familiar with the addition, subtraction, multiplication, and division. In particular, we assume the following
More informationBasic Combinatorics. Math 40210, Section 01 Fall Homework 8 Solutions
Basic Combinatorics Math 4010, Section 01 Fall 01 Homework 8 Solutions 1.8.1 1: K n has ( n edges, each one of which can be given one of two colors; so Kn has (n -edge-colorings. 1.8.1 3: Let χ : E(K k
More informationConvergence Rates for AFEM: PDE on Parametric Surfaces
Department of Mathematics and Institute for Physical Science and Technology University of Maryland Joint work with A. Bonito and R. DeVore (Texas a&m) J.M. Cascón (Salamanca, Spain) K. Mekchay (Chulalongkorn,
More informationCSCE 222 Discrete Structures for Computing. Review for Exam 2. Dr. Hyunyoung Lee !!!
CSCE 222 Discrete Structures for Computing Review for Exam 2 Dr. Hyunyoung Lee 1 Strategy for Exam Preparation - Start studying now (unless have already started) - Study class notes (lecture slides and
More informationQuasi-optimal convergence rates for adaptive boundary element methods with data approximation, Part II: Hyper-singular integral equation
ASC Report No. 30/2013 Quasi-optimal convergence rates for adaptive boundary element methods with data approximation, Part II: Hyper-singular integral equation M. Feischl, T. Führer, M. Karkulik, J.M.
More informationMath 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction
Math 4 Summer 01 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If
More informationFinite Elements. Colin Cotter. January 18, Colin Cotter FEM
Finite Elements January 18, 2019 The finite element Given a triangulation T of a domain Ω, finite element spaces are defined according to 1. the form the functions take (usually polynomial) when restricted
More informationPropositional and Predicate Logic - V
Propositional and Predicate Logic - V Petr Gregor KTIML MFF UK WS 2016/2017 Petr Gregor (KTIML MFF UK) Propositional and Predicate Logic - V WS 2016/2017 1 / 21 Formal proof systems Hilbert s calculus
More informationRobust Knowledge and Rationality
Robust Knowledge and Rationality Sergei Artemov The CUNY Graduate Center 365 Fifth Avenue, 4319 New York City, NY 10016, USA sartemov@gc.cuny.edu November 22, 2010 Abstract In 1995, Aumann proved that
More informationHomework #2 Solutions Due: September 5, for all n N n 3 = n2 (n + 1) 2 4
Do the following exercises from the text: Chapter (Section 3):, 1, 17(a)-(b), 3 Prove that 1 3 + 3 + + n 3 n (n + 1) for all n N Proof The proof is by induction on n For n N, let S(n) be the statement
More informationMAT 3271: Selected solutions to problem set 7
MT 3271: Selected solutions to problem set 7 Chapter 3, Exercises: 16. Consider the Real ffine Plane (that is what the text means by the usual Euclidean model ), which is a model of incidence geometry.
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationAN EXPLORATION OF THE METRIZABILITY OF TOPOLOGICAL SPACES
AN EXPLORATION OF THE METRIZABILITY OF TOPOLOGICAL SPACES DUSTIN HEDMARK Abstract. A study of the conditions under which a topological space is metrizable, concluding with a proof of the Nagata Smirnov
More informationStochastic Shortest Path Problems
Chapter 8 Stochastic Shortest Path Problems 1 In this chapter, we study a stochastic version of the shortest path problem of chapter 2, where only probabilities of transitions along different arcs can
More informationTHE N-VALUE GAME OVER Z AND R
THE N-VALUE GAME OVER Z AND R YIDA GAO, MATT REDMOND, ZACH STEWARD Abstract. The n-value game is an easily described mathematical diversion with deep underpinnings in dynamical systems analysis. We examine
More informationAnalytic Number Theory Solutions
Analytic Number Theory Solutions Sean Li Cornell University sxl6@cornell.edu Jan. 03 Introduction This document is a work-in-progress solution manual for Tom Apostol s Introduction to Analytic Number Theory.
More informationDEGREE SEQUENCES OF INFINITE GRAPHS
DEGREE SEQUENCES OF INFINITE GRAPHS ANDREAS BLASS AND FRANK HARARY ABSTRACT The degree sequences of finite graphs, finite connected graphs, finite trees and finite forests have all been characterized.
More informationINTRODUCTION TO FINITE ELEMENT METHODS
INTRODUCTION TO FINITE ELEMENT METHODS LONG CHEN Finite element methods are based on the variational formulation of partial differential equations which only need to compute the gradient of a function.
More informationQUASI-OPTIMAL CONVERGENCE RATE OF AN ADAPTIVE DISCONTINUOUS GALERKIN METHOD
QUASI-OPIMAL CONVERGENCE RAE OF AN ADAPIVE DISCONINUOUS GALERKIN MEHOD ANDREA BONIO AND RICARDO H. NOCHEO Abstract. We analyze an adaptive discontinuous finite element method (ADFEM) for symmetric second
More informationmeans is a subset of. So we say A B for sets A and B if x A we have x B holds. BY CONTRAST, a S means that a is a member of S.
1 Notation For those unfamiliar, we have := means equal by definition, N := {0, 1,... } or {1, 2,... } depending on context. (i.e. N is the set or collection of counting numbers.) In addition, means for
More informationCompact subsets of the Baire space
Compact subsets of the Baire space Arnold W. Miller Nov 2012 Results in this note were obtained in 1994 and reported on at a meeting on Real Analysis in Lodz, Poland, July 1994. Let ω ω be the Baire space,
More informationShort Introduction to Admissible Recursion Theory
Short Introduction to Admissible Recursion Theory Rachael Alvir November 2016 1 Axioms of KP and Admissible Sets An admissible set is a transitive set A satisfying the axioms of Kripke-Platek Set Theory
More informationMathematical Induction
Mathematical Induction MAT231 Transition to Higher Mathematics Fall 2014 MAT231 (Transition to Higher Math) Mathematical Induction Fall 2014 1 / 21 Outline 1 Mathematical Induction 2 Strong Mathematical
More informationIsogeometric mortaring
Isogeometric mortaring E. Brivadis, A. Buffa, B. Wohlmuth, L. Wunderlich IMATI E. Magenes - Pavia Technical University of Munich A. Buffa (IMATI-CNR Italy) IGA mortaring 1 / 29 1 Introduction Splines Approximation
More informationReconstructibility of trees from subtree size frequencies
Stud. Univ. Babeş-Bolyai Math. 59(2014), No. 4, 435 442 Reconstructibility of trees from subtree size frequencies Dénes Bartha and Péter Burcsi Abstract. Let T be a tree on n vertices. The subtree frequency
More informationWe want to show P (n) is true for all integers
Generalized Induction Proof: Let P (n) be the proposition 1 + 2 + 2 2 + + 2 n = 2 n+1 1. We want to show P (n) is true for all integers n 0. Generalized Induction Example: Use generalized induction to
More informationMATH 324 Summer 2011 Elementary Number Theory. Notes on Mathematical Induction. Recall the following axiom for the set of integers.
MATH 4 Summer 011 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If
More informationAdaptive Uzawa algorithm for the Stokes equation
ASC Report No. 34/2018 Adaptive Uzawa algorithm for the Stokes equation G. Di Fratta. T. Fu hrer, G. Gantner, and D. Praetorius Institute for Analysis and Scientific Computing Vienna University of Technology
More informationCSE 1400 Applied Discrete Mathematics Proofs
CSE 1400 Applied Discrete Mathematics Proofs Department of Computer Sciences College of Engineering Florida Tech Fall 2011 Axioms 1 Logical Axioms 2 Models 2 Number Theory 3 Graph Theory 4 Set Theory 4
More informationDiscrete Geometry. Problem 1. Austin Mohr. April 26, 2012
Discrete Geometry Austin Mohr April 26, 2012 Problem 1 Theorem 1 (Linear Programming Duality). Suppose x, y, b, c R n and A R n n, Ax b, x 0, A T y c, and y 0. If x maximizes c T x and y minimizes b T
More informationSums of Squares. Bianca Homberg and Minna Liu
Sums of Squares Bianca Homberg and Minna Liu June 24, 2010 Abstract For our exploration topic, we researched the sums of squares. Certain properties of numbers that can be written as the sum of two squares
More informationHomework 4, 5, 6 Solutions. > 0, and so a n 0 = n + 1 n = ( n+1 n)( n+1+ n) 1 if n is odd 1/n if n is even diverges.
2..2(a) lim a n = 0. Homework 4, 5, 6 Solutions Proof. Let ɛ > 0. Then for n n = 2+ 2ɛ we have 2n 3 4+ ɛ 3 > ɛ > 0, so 0 < 2n 3 < ɛ, and thus a n 0 = 2n 3 < ɛ. 2..2(g) lim ( n + n) = 0. Proof. Let ɛ >
More informationNonlinear Programming
Nonlinear Programming Kees Roos e-mail: C.Roos@ewi.tudelft.nl URL: http://www.isa.ewi.tudelft.nl/ roos LNMB Course De Uithof, Utrecht February 6 - May 8, A.D. 2006 Optimization Group 1 Outline for week
More informationUNIONS OF LINES IN F n
UNIONS OF LINES IN F n RICHARD OBERLIN Abstract. We show that if a collection of lines in a vector space over a finite field has dimension at least 2(d 1)+β, then its union has dimension at least d + β.
More information1 Topology Definition of a topology Basis (Base) of a topology The subspace topology & the product topology on X Y 3
Index Page 1 Topology 2 1.1 Definition of a topology 2 1.2 Basis (Base) of a topology 2 1.3 The subspace topology & the product topology on X Y 3 1.4 Basic topology concepts: limit points, closed sets,
More informationTREE-LIKE CONTINUA THAT ADMIT POSITIVE ENTROPY HOMEOMORPHISMS ARE NON-SUSLINEAN
TREE-LIKE CONTINUA THAT ADMIT POSITIVE ENTROPY HOMEOMORPHISMS ARE NON-SUSLINEAN CHRISTOPHER MOURON Abstract. t is shown that if X is a tree-like continuum and h : X X is a homeomorphism such that the topological
More informationCauchy s Theorem (rigorous) In this lecture, we will study a rigorous proof of Cauchy s Theorem. We start by considering the case of a triangle.
Cauchy s Theorem (rigorous) In this lecture, we will study a rigorous proof of Cauchy s Theorem. We start by considering the case of a triangle. Given a certain complex-valued analytic function f(z), for
More informationOPTIMAL MULTILEVEL METHODS FOR GRADED BISECTION GRIDS
OPTIMAL MULTILEVEL METHODS FOR GRADED BISECTION GRIDS LONG CHEN, RICARDO H. NOCHETTO, AND JINCHAO XU Abstract. We design and analyze optimal additive and multiplicative multilevel methods for solving H
More informationOptimal adaptivity for the SUPG finite element method
ASC Report No. 7/208 Optimal adaptivity for the SUPG finite element method C. Erath and D. Praetorius Institute for Analysis and Scientific Computing Vienna University of Technology TU Wien www.asc.tuwien.ac.at
More informationUC Berkeley Department of Electrical Engineering and Computer Science Department of Statistics. EECS 281A / STAT 241A Statistical Learning Theory
UC Berkeley Department of Electrical Engineering and Computer Science Department of Statistics EECS 281A / STAT 241A Statistical Learning Theory Solutions to Problem Set 2 Fall 2011 Issued: Wednesday,
More informationOn Sequent Calculi for Intuitionistic Propositional Logic
On Sequent Calculi for Intuitionistic Propositional Logic Vítězslav Švejdar Jan 29, 2005 The original publication is available at CMUC. Abstract The well-known Dyckoff s 1992 calculus/procedure for intuitionistic
More informationA sharp upper bound on the approximation order of smooth bivariate pp functions C. de Boor and R.Q. Jia
A sharp upper bound on the approximation order of smooth bivariate pp functions C. de Boor and R.Q. Jia Introduction It is the purpose of this note to show that the approximation order from the space Π
More informationA BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS
Séminaire Lotharingien de Combinatoire 63 (0), Article B63e A BJECTON BETWEEN WELL-LABELLED POSTVE PATHS AND MATCHNGS OLVER BERNARD, BERTRAND DUPLANTER, AND PHLPPE NADEAU Abstract. A well-labelled positive
More information1 Maximum Budgeted Allocation
CS 369P: Polyhedral techniques in combinatorial optimization Instructor: Jan Vondrák Lecture date: November 4, 2010 Scribe: David Tobin 1 Maximum Budgeted Allocation Agents Items Given: n agents and m
More informationBasing Decisions on Sentences in Decision Diagrams
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence Basing Decisions on Sentences in Decision Diagrams Yexiang Xue Department of Computer Science Cornell University yexiang@cs.cornell.edu
More informationThe minimum G c cut problem
The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected
More informationVector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition)
Vector Space Basics (Remark: these notes are highly formal and may be a useful reference to some students however I am also posting Ray Heitmann's notes to Canvas for students interested in a direct computational
More informationAnalysis of Algorithms. Outline. Single Source Shortest Path. Andres Mendez-Vazquez. November 9, Notes. Notes
Analysis of Algorithms Single Source Shortest Path Andres Mendez-Vazquez November 9, 01 1 / 108 Outline 1 Introduction Introduction and Similar Problems General Results Optimal Substructure Properties
More informationOn the Exponent of the All Pairs Shortest Path Problem
On the Exponent of the All Pairs Shortest Path Problem Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Zvi Galil Department of Computer Science Sackler Faculty
More information20 Ordinals. Definition A set α is an ordinal iff: (i) α is transitive; and. (ii) α is linearly ordered by. Example 20.2.
20 Definition 20.1. A set α is an ordinal iff: (i) α is transitive; and (ii) α is linearly ordered by. Example 20.2. (a) Each natural number n is an ordinal. (b) ω is an ordinal. (a) ω {ω} is an ordinal.
More informationATOMLESS r-maximal SETS
ATOMLESS r-maximal SETS PETER A. CHOLAK AND ANDRÉ NIES Abstract. We focus on L(A), the filter of supersets of A in the structure of the computably enumerable sets under the inclusion relation, where A
More informationChapter 1 The Real Numbers
Chapter 1 The Real Numbers In a beginning course in calculus, the emphasis is on introducing the techniques of the subject;i.e., differentiation and integration and their applications. An advanced calculus
More information2. Two binary operations (addition, denoted + and multiplication, denoted
Chapter 2 The Structure of R The purpose of this chapter is to explain to the reader why the set of real numbers is so special. By the end of this chapter, the reader should understand the difference between
More informationI. The space C(K) Let K be a compact metric space, with metric d K. Let B(K) be the space of real valued bounded functions on K with the sup-norm
I. The space C(K) Let K be a compact metric space, with metric d K. Let B(K) be the space of real valued bounded functions on K with the sup-norm Proposition : B(K) is complete. f = sup f(x) x K Proof.
More informationRecursion: Introduction and Correctness
Recursion: Introduction and Correctness CSE21 Winter 2017, Day 7 (B00), Day 4-5 (A00) January 25, 2017 http://vlsicad.ucsd.edu/courses/cse21-w17 Today s Plan From last time: intersecting sorted lists and
More informationNotes on the Dual Ramsey Theorem
Notes on the Dual Ramsey Theorem Reed Solomon July 29, 2010 1 Partitions and infinite variable words The goal of these notes is to give a proof of the Dual Ramsey Theorem. This theorem was first proved
More informationTrees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic).
Trees A tree is a graph which is (a) Connected and (b) has no cycles (acyclic). 1 Lemma 1 Let the components of G be C 1, C 2,..., C r, Suppose e = (u, v) / E, u C i, v C j. (a) i = j ω(g + e) = ω(g).
More informationDynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.
Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains
More informationδ-hyperbolic SPACES SIDDHARTHA GADGIL
δ-hyperbolic SPACES SIDDHARTHA GADGIL Abstract. These are notes for the Chennai TMGT conference on δ-hyperbolic spaces corresponding to chapter III.H in the book of Bridson and Haefliger. When viewed from
More informationGraph Transformations T1 and T2
Graph Transformations T1 and T2 We now introduce two graph transformations T1 and T2. Reducibility by successive application of these two transformations is equivalent to reducibility by intervals. The
More informationarxiv: v1 [cs.ds] 20 Nov 2016
Algorithmic and Hardness Results for the Hub Labeling Problem Haris Angelidakis 1, Yury Makarychev 1 and Vsevolod Oparin 2 1 Toyota Technological Institute at Chicago 2 Saint Petersburg Academic University
More informationNotes on induction proofs and recursive definitions
Notes on induction proofs and recursive definitions James Aspnes December 13, 2010 1 Simple induction Most of the proof techniques we ve talked about so far are only really useful for proving a property
More informationNonlinear Analysis 71 (2009) Contents lists available at ScienceDirect. Nonlinear Analysis. journal homepage:
Nonlinear Analysis 71 2009 2744 2752 Contents lists available at ScienceDirect Nonlinear Analysis journal homepage: www.elsevier.com/locate/na A nonlinear inequality and applications N.S. Hoang A.G. Ramm
More informationFootnotes to Linear Algebra (MA 540 fall 2013), T. Goodwillie, Bases
Footnotes to Linear Algebra (MA 540 fall 2013), T. Goodwillie, Bases November 18, 2013 1 Spanning and linear independence I will outline a slightly different approach to the material in Chapter 2 of Axler
More informationSKETCHY NOTES FOR WEEKS 7 AND 8
SKETCHY NOTES FOR WEEKS 7 AND 8 We are now ready to start work on the proof of the Completeness Theorem for first order logic. Before we start a couple of remarks are in order (1) When we studied propositional
More informationChapter 2 Metric Spaces
Chapter 2 Metric Spaces The purpose of this chapter is to present a summary of some basic properties of metric and topological spaces that play an important role in the main body of the book. 2.1 Metrics
More informationA Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover
A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover Grant Schoenebeck Luca Trevisan Madhur Tulsiani Abstract We study semidefinite programming relaxations of Vertex Cover arising
More informationChapter 5 The Witness Reduction Technique
Outline Chapter 5 The Technique Luke Dalessandro Rahul Krishna December 6, 2006 Outline Part I: Background Material Part II: Chapter 5 Outline of Part I 1 Notes On Our NP Computation Model NP Machines
More informationDesign and Analysis of Algorithms
CSE 101, Winter 2018 Design and Analysis of Algorithms Lecture 5: Divide and Conquer (Part 2) Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ A Lower Bound on Convex Hull Lecture 4 Task: sort the
More informationarxiv: v2 [math.ag] 24 Jun 2015
TRIANGULATIONS OF MONOTONE FAMILIES I: TWO-DIMENSIONAL FAMILIES arxiv:1402.0460v2 [math.ag] 24 Jun 2015 SAUGATA BASU, ANDREI GABRIELOV, AND NICOLAI VOROBJOV Abstract. Let K R n be a compact definable set
More informationChapter 1. Sets and Numbers
Chapter 1. Sets and Numbers 1. Sets A set is considered to be a collection of objects (elements). If A is a set and x is an element of the set A, we say x is a member of A or x belongs to A, and we write
More informationOn the number of cycles in a graph with restricted cycle lengths
On the number of cycles in a graph with restricted cycle lengths Dániel Gerbner, Balázs Keszegh, Cory Palmer, Balázs Patkós arxiv:1610.03476v1 [math.co] 11 Oct 2016 October 12, 2016 Abstract Let L be a
More informationWell Ordered Sets (continued)
Well Ordered Sets (continued) Theorem 8 Given any two well-ordered sets, either they are isomorphic, or one is isomorphic to an initial segment of the other. Proof Let a,< and b, be well-ordered sets.
More informationCourse 212: Academic Year Section 1: Metric Spaces
Course 212: Academic Year 1991-2 Section 1: Metric Spaces D. R. Wilkins Contents 1 Metric Spaces 3 1.1 Distance Functions and Metric Spaces............. 3 1.2 Convergence and Continuity in Metric Spaces.........
More informationCS1800: Mathematical Induction. Professor Kevin Gold
CS1800: Mathematical Induction Professor Kevin Gold Induction: Used to Prove Patterns Just Keep Going For an algorithm, we may want to prove that it just keeps working, no matter how big the input size
More information1) If AB is congruent to AC, then B is congruent to C.
233 1) If is congruent to, then is congruent to. Proof of 1). 1) ssume ". (We must prove that ".) 2) ", because the identity is a rigid motion that moves to. 3) Therefore, Δ " Δ by the xiom. (The correspondence
More informationTree-width and algorithms
Tree-width and algorithms Zdeněk Dvořák September 14, 2015 1 Algorithmic applications of tree-width Many problems that are hard in general become easy on trees. For example, consider the problem of finding
More information