Size: px
Start display at page:

Download ""

Transcription

1 Max-Planck-Institut fur Mathematik in den Naturwissenschaften Leipzig H 2 -matrix approximation of integral operators by interpolation by Wolfgang Hackbusch and Steen Borm Preprint no.:

2

3 H 2 -Matrix Approximation of Integral Operators by Interpolation Wolfgang Hackbusch and Steen Borm Max-Planck-Institut Mathematik in den Naturwissenschaften Inselstr. 22{26, D-0403 Leipzig, Germany Abstract Typical panel clustering methods for the fast evaluation of integral operators are based on the Taylor expansion of the kernel function and therefore usually require the user to implement the evaluation of the derivatives of this function up to an arbitrary degree. We propose an alternative approach that replaces the Taylor expansion by simple polynomial interpolation. By applying the interpolation idea to the approximating polynomials on dierent levels of the cluster tree, the matrix vector multiplication can be performed in only O(np d ) operations for a polynomial order of p and an n-dimensional trial space. The main advantage of our method, compared to other methods, is its simplicity: Only pointwise evaluations of the kernel and of simple polynomials have to be implemented. Introduction We consider an integral equation on a submanifold of R d for d 2 N, namely Find u (in a suitable space) satisfying for all x 2 u(x) + for a right hand side f, a parameter 2 R and kernel function k(x; y)u(y)dy = f(x) (.) k : R d R d! R that has the asymptotic smoothness (cf. (5.) ) typical for BEM kernels. We use a Galerkin approach for the discretisation of the equation (.), i.e., we choose a family ( i) i2i of suitable basis functions, set V h := spanf i : i 2 Ig and get the discrete problem Find u h 2 V h satisfying for all v h 2 V h. u h (x)v h (x)dx + k(x; y)u h (y)v h (x)dy dx = We introduce matrices M 2 R II ; K 2 R II and vectors ^u 2 R I ; ^f 2 R I by setting M ij = u h = i2i j(x) i(x)dx; ^fj = ^u i i and K ij = for all i; j 2 I, which allows us to rewrite (.2) in the form f(x) j(x)dx; k(x; y) j(y) i(x)dy dx f(x)v h (x)dx (.2) (M + K)^u = ^f: (.3)

4 In typical applications, the basis functions ( i) i2i have local support, so the matrix M is sparse, i.e., for n := jij, the construction of the matrix and its multiplication with a given vector can be accomplished in O(n) operations. Since the support of the integral kernel k(; ) is not local, the matrix K is not sparse, so a straightforward computation of its entries requires at least O(n 2 ) operations, and a multiplication of a vector with this matrix will require the same amount of work. There are dierent approaches for reducing the complexity: If the domain is very regular, the resulting matrix has a Toeplitz-type structure and can therefore be evaluated eciently by performing fast Fourier transformations. If the domain is smooth, it is possible to use Wavelet compression, and this approach can be extended to piecewise smooth domains []. In this article, we will consider a variant of the panel clustering method [8] and the mosaic skeleton matrix approach [0] by using the framework of H 2 -matrices introduced in [7]. The idea of our variant is to replace K by a suitable approximation and thereby to reduce the complexity to O(np d ), where p is a parameter corresponding to the \quality" of the approximation and d, as above, is the dimension of the space in which the manifold is embedded. We will approximate the kernel function k(; ) by an interpolant. Since k(; ) will usually not be smooth on the entire domain, we do not use a global interpolant, but choose subsets where k(; ) is smooth and interpolate on each of these subsets. If we organise the subsets in a hierarchical way, we end up with a multilevel block matrix where each block has a rank p d. The structure is that of an H-matrix described in [4, 5]. In this form, the approximating matrix requires only O(np d log n) units of storage, constructing it and multiplying it with vectors requires O(np d log n) operations. If we exploit the fact that the kernel is locally approximated by polynomials that depend only on and and have a xed degree, we nd that the structure resembles that of H 2 -matrices described in [7]. Using an algorithm similar to the Fast Fourier Transformation, but not as limited in scope, we can reduce the storage requirements and the number of operations to O(np d ). Since only quadrature and polynomial interpolation are needed in our algorithm, its implementation is very simple as compared to Wavelet compression techniques or panel clustering approaches based on Taylor expansion. In typical applications, the order p will be chosen to be proportional to log n, so the complexity will be O(n log d n), i.e., not optimal. In [2], the use of anisotropic interpolation on domains adapted to the boundary is suggested in order to reduce the complexity to O(n log d n). We propose a dierent approach, namely the variable order expansion along the lines of [9]. This is only a very minor modication of the original constant-order algorithm and allows us to attain optimal complexity. 2 Cluster Tree, Block Partitioning and Types of H-Matrices In order to keep the selection of the subsets mentioned above algorithmically manageable, we base them on a hierarchical splitting of the index set I corresponding to the basis functions: Let T (I) be a binary tree and let T (I) be the set of its nodes. T (I) is called a binary cluster tree if it satises the following conditions:. T (I) P(I), i.e., each node of T (I) is a subset of the index set I. 2. I is the root of T (I). 3. If 2 T (I) is a leaf, then jj Cp d, i.e., the leaves consist of a relatively small number of indices. 4. If 2 T (I) is not a leaf, then it has exactly two sons and is their disjoint union. For each 2 T (I), we denote the set of its sons by S() T (I). The support of a cluster 2 T (I) is given by the union of the supports of the basis functions corresponding to its elements, i.e., := [ i2 i ; where i := supp i for all i 2 I. 2

5 Next, we need an admissibility condition that allows us to select pairs (; ) 2 T (I) T (I) such that the kernel k(; ) is smooth enough on the domain associated with. We are going to dene our interpolants on axiparallel boxes B containing the set, so we need the kernel to be smooth on B B if we want a good approximation. This can be expressed in quantitative terms by the inequality maxfdiam(b ); diam(b )g 2 dist(b ; B ); (2.) where 2]0; [ is some parameter controlling the trade-o between the number of admissible blocks, i.e., the algorithmic complexity, and the speed of convergence, i.e., the quality of the approximation. The condition (2.) is especially suited for kernel functions with the property (5.). Figure contains a cluster splitting of the unit circle. For some clusters, the corresponding boxes B are highlighted in grey. Figure : Dyadic clustering of the unit circle. The index set I I corresponding to the matrix K 2 R II is partitioned into blocks by the algorithm shown in Table : procedure BuildPartitioning(,, var P ); begin if (; ) meets condition (2.) then P := P [ f g else if S() 6= ; and S() 6= ; then for 0 2 S(); 0 2 S() do BuildPartitioning( 0, 0, P ) else P := P [ f g end Table : BuildPartitioning algorithm Calling this procedure with = = I and P = ; creates a block partitioning of I I consisting of admissible blocks and non-admissible blocks corresponding to leaf clusters of T (I). An example of an admissible partitioning corresponding to the splitting outlined in Figure can be found in Figure 2. The complexity of algorithms for the creation of suitable cluster trees and block partitionings has been analysed in detail in [3]: For typical quasi-uniform grids, a \good" cluster tree can be created in O(n log n) operations, the computation of the block partitioning can be accomplished in O(n) operations. Based on the cluster tree and the block partitioning, we dene the following three types of data-sparse matrices: Denition 2. (H-matrices) Let A 2 R II be a matrix and P be a block partitioning of I I consisting of admissible blocks and leaf blocks.. Let k 2 N. A is called H-matrix of rank k, if rank(aj ) k (2.2) 3

6 Figure 2: Block partitioning for the unit circle with dyadic clustering. holds for each 2 P. 2. A family V = (V ) 2T (I) is called a cluster basis, if there is a k 2 N for each 2 T (I) such that V 2 R k. Let V c ; V r be cluster bases. A is called uniform H-matrix with respect to V c and V r, if for each 2 P there is a matrix S satisfying Aj = V c; S V T r; : (2.3) In this context, V c is called column basis of A, V r is called row basis of A. 3. A cluster basis V = (V ) 2T (I) is called nested, if there are transfer matrices B 0 ; 2 R k 0 ;k for all 2 T (I) with S() 6= ; and 0 2 S() satisfying V j 0 k = V 0B 0 ; : (2.4) A is called H 2 -matrix with respect to V c and V r, if it is a uniform H-matrix with respect to these cluster bases and if both bases are nested. 3 H 2 Construction 3. Approximation of the Kernel For each cluster 2 T (I), we x a family (x ) 2I of interpolation points (e.g. tensor products of the zeroes of Chebyshev polynomials) in B and the family (p ) 2I of corresponding Lagrange polynomials. On a given admissible block 2 P, we approximate the kernel function k(; ) by its interpolant 3.2 Approximation of the Discrete Operator The discrete Galerkin operator is given by ~k (x; y) := k(x ; y )p (x)p (y): (3.) 2I 2I K ij := i k(x; y) j(y) i(x)dy dx for nite element basis function i; j having their supports in i ;. 4

7 For i 2 and j 2, we can replace k(; ) with ~ k(; ) and nd ~K ij := i = 2I ~ k(x; y) i(x) j(y)dy dx 2I k(x ; y ) i p (x) i(x)dx Introducing matrices V 2 R I ; V 2 R I and S 2 R I I with we get V i := i.e., a representation as a uniform H-matrix. 3.3 Nested Bases i p (x) i(x)dx; V j := p (y) j(y)dy: p (y) j(y)dy; (3.2) S := k(x ; y ); (3.3) ~K ij = V S V T ij ; (3.4) Let Q p be the space of polynomials spanned by tensor products of polynomials of a degree up to p. The interpolation operator is a projection onto this space, so if we use Q p as the interpolation polynomials on all clusters, we can express polynomials corresponding to father clusters in terms of polynomials corresponding to son clusters without loss, i.e., for a cluster 2 T (I) with a son 0 2 T (I), we nd p (x) = p (x 0 )p 0 (x): (3.5) 2I 0 By introducing a matrix B 0 ; 2 R I 0 I by setting we get Vi = p i (x) i(x)dx = 2I 0 = 2I 0 B 0 ; := p (x 0 ); (3.6) p (x 0 ) i p 0 (x) i(x)dx B 0 ; V 0 i = (V 0 B 0 ; ) i (3.7) for all i 2 0, so the bases are nested in the way required for H 2 -matrices. 4 Algorithms and Complexity We require the block partitioning P to be sparse in the sense of [3], i.e., that there exists a constant C sp satisfying max jf 2 T (I) : 2 P gj C sp ; (4.) 2T (I) max jf 2 T (I) : 2 P gj C sp : (4.2) 2T (I) For standard situations with quasi-uniform meshes, this estimate has been established in [3]. We further assume that there is a constant C L satisfying S() = ; ) ji j jj C L ji j (4.3) for all 2 T (I), i.e., the size of a leaf cluster is comparable to the number of polynomials used in the interpolation on this cluster. Note that, due to the requirement of subsection 3.3, we have ji j = p d for all clusters 2 T (I). 5

8 procedure ForwardTransformation(); begin if S() = ; then x := V T xj else begin x := 0; for 0 2 S() do begin ForwardTransformation( 0 ); x := x + B 0 ; T x 0 end end end Table 2: ForwardTransformation algorithm 4. Matrix-Vector Multiplication We split the matrix-vector multiplication y := ~ Kx into three steps: First, the products of the input vector with the matrices V T are computed by recursively applying the equation (3.7). Then, the resulting coecients are multiplied by S. In the last step, the result is transformed back from the coecients of the cluster bases into the standard basis. 4.. Forward Transformation In this rst step, we want to compute x := V T xj for all 2 T (I). If is not a leaf, i.e., if S() 6= ;, we have V T xj = B 0 ; T V T 0 xj 0 = B 0 ; T x 0; 0 2S() 0 2S() so the algorithm shown in Table 2 can be used to compute all coecients. Now we want to analyse the complexity of this algorithm. For each 2 T (I), we have ji j = p d and nd that O(p 2d ) operations are required for the computation of x. Due to the lower bound in condition (4.3), there are no more than n=p d leaves in T (I), so there are less than 2n=p d nodes. Therefore, the full forward transformation takes O(np d ) operations to complete Multiplication In the second step, we want to compute for all 2 T (I), where y := 2P S x P := f 2 T (I) : 2 P g: Due to the sparsity condition (4.), we have jp j C sp, so the computation of y requires O(C sp p 2d ) operations. The cluster tree has at most 2n=p d nodes, so the second step takes O(np d ) operations Backward Transformation In the last step, we transform the result from the cluster bases into the standard basis. The procedure shown in Table 3 is the adjoint of the Forward Transformation. By the same arguments as in the case of the Forward Transformation, we nd that only O(np d ) operations are required for the Backward Transformation, so the complete matrix-vector multiplication can be completed in O(np d ) operations. 6

9 procedure BackwardTransformation(); begin if S() = ; then yj := V y else for 0 2 S() do begin y 0 := y 0 + B 0 ; y ; BackwardTransformation( 0 ) end end Table 3: BackwardTransformation algorithm 4.2 Discretisation 4.2. Basis Transformation Matrices We rst consider the computation of the matrices B 0 ;. We are using tensor product interpolation, so the polynomials p and the corresponding interpolation points x can be written in the form p (x ; : : : ; x d ) = p ; (x ) : : : p ;d d (x d ); x = (x ; ; : : : ; x ;d d ) for one-dimensional Lagrange polynomials (p ;i j ) and corresponding interpolation points (x;i j ) on the real line. The equation (3.6) takes the form so it has the tensor product structure with B 0 ; = p (x 0 ) = p ; (x 0 ; ) : : : p ;d B 0 ; = B 0 ;; : : : B 0 ;;d B 0 ;;i i; i = p ;i i (x 0 ;i i ): d (x 0 ;d The computation of one of these latter matrices requires O(p 3 ) operations, the computation of all of them requires O(dp 3 ). This means that, since there are n=p d leaves and each leaf requires O(dp 3 ) units of storage, the matrices B 0 ; can be stored in the form of tensor products in O(dnp 3d ) units of storage. Of course, we can also construct the full matrix B 0 ; from the tensor product form. This requires O(dp 3 + p 2d ) operations and leads to a total of O(dnp 3d + np d ) operations Leaf Basis Matrices The computation of the matrices V for leaves 2 T (I) corresponds to the computation of the integrals V i = i p (x) i(x)dx; where i is some nite element basis function, p a tensor product polynomial in Q p and where i 2 and 2 I. The computation of each of the O(p 2d ) entries using Gauss quadrature of order q requires O(p 2d q d ) operations, so all leaf basis matrices can be computed using O(np d q d ) operations and stored in O(np d ) units of memory Admissible Blocks According to (3.3), the coecient matrices S corresponding to admissible blocks are dened by S = k(x ; x ); so building one of these matrices requires O(p 2d ) operations. By the same arguments as before, we get a total of O(np d ) operations for the process of building the coecients for all admissible blocks. d ); 7

10 4.2.4 Non-admissible Blocks To compute the matrices S for non-admissible blocks, we have to approximate the integral S ij = i k(x; y) j(y) i(x)dy dx: As before, we use quadrature of order q and nd that we need O(np d q d ) operations and O(np d ) units of memory. 5 Error Analysis We assume that the kernel k(; ) is asymptotically smooth, i.e., that there are constants C as (n; m) satisfying j@ y k(x; y)j C as(jj; jj)kx yk jjjj jk(x; y)j (5.) for all multi-indices ; 2 N d 0 and all x; y 2 R d with x 6= y. Lemma 5. (Kernel approximation) Let 2 P be an admissible block and assume that (5.) holds for k(; ). Then the kernel ~ k (; ) from (3.) satises the estimate with the constant kk ~ k k ;B B C apx (p) p+ kkk ;B B (5.2) p 2d(Cas (0; p + ) + C as (p + ; 0)) (C log(p + )) 2d C apx (p) := : (5.3) (p + )! 2 p=2 The behaviour of this constant will be discussed in Remark 5.2. Proof. The interpolated kernel ~ k(; ) can be written in the form ~k = I p B B k by using the tensor product interpolation operator. Applying the error estimate of Lemma A., we nd kk kk ~ ;BB = kk I p B B kk ;B B 4p 2(p + )! (C log(p + ))2d diam(b B ) p+ By using the admissibility condition (2.), we nd p+ j diam(b B ) = maxfkp p 2 k 2 : p ; p 2 2 B B g = maxfk(x ; y ) (x 2 ; y 2 )k 2 : (x ; y ); (x 2 ; y 2 ) 2 B B g q k : ;B B = maxfk(x ; y ) (x 2 ; y 2 )k 2 2 : x ; x 2 2 B ; y ; y 2 2 B g q = maxfkx x 2 k ky y 2 k 2 2 : x ; x 2 2 B ; y ; y 2 2 B g p diam(b ) 2 + diam(b ) 2 p 2 maxfdiam(b ); diam(b )g 2 p 2 dist(b ; B ); and therefore p kk kk ~ 2 (C log(p + )) 2d ;BB p+ dist(b (p + )! 2 p=2 ; B ) p+ p+ j k : ;B B The partial derivatives can be estimated by using the asymptotic smoothness (5.) as follows: j@ p+ j k(x; y)j C as (p + ; 0)kx yk (p+) jk(x; y)j 8

11 C as (p + ; 0) dist(b ; B ) (p+) jk(x; y)j for j d and for j > d, so we can use p+ j k ;B B to get the desired result j@ p+ j k(x; y)j C as (0; p + ) dist(b ; B ) (p+) jk(x; y)j d(c as (p + ; 0) + C as (0; p + )) dist(b ; B ) (p+) kkk ;BB kk kk ~ ;BB p 2 (C log(p + )) 2d p+ dist(b (p + )! 2 p=2 ; B ) p+ p 2 (C log(p + )) d p+ dist(b ; B ) p+ (p + )! 2 p=2 dist(b ; B ) (p+) (d C as (0; p + ) + d C as (p + ; 0)) kkk BB C apx (p) p+ dist(b ; B ) p+ dist(b ; B ) p+ kkk B B C apx (p) p+ kkk BB : p+ j k ;B B Remark 5.2 (Convergence) For typical kernels, an estimate of the type holds, leading to C as (n; m) c c n+m 0 (n + m)! C apx (p) 2 p (C log(p + ))2d 2c d c p+ 2 p=2 0 : If c 0 <, the approximation ~ k(; ) will converge to k(; ) faster than (c 0 ) p+. If the continuous operator is W -elliptic for some Hilbert space W with W h := spanf i : i 2 Ig W, then we can proceed as in [6, Lemma 3] to prove the estimate ku ~u h k W c inf ku v h k W + C apx (p) p+ k KkWh ~!W kuk 0 h W : v h 2W h 6 Extensions Our construction can be extended to other integral operators and other discretisation techniques by simple modication of the denition of V : 6. Collocation If we want to discretise by the collocation method, we have an additional family ( i ) of collocation points and the discrete operator is given by K ij := Replacing once more k(; ) by ~ k(; ), we nd ~K ij := j ~ k(i ; y) j(y)dy = 2I k( i ; y) j(y)dy: 2I k(x ; y )p ( i ) 9 p (y) j(y);

12 so we can dene V ;coll 2 R I by setting and get ~K ij = V ;coll i := p ( i ) V ;coll S V T ij ; i.e., the same result as in (3.4) with only V replaced by V ;coll. As before, V ;coll can be expressed in terms of the matrices V 0 ;coll corresponding to the sons 0 of. 6.2 Double Layer Potential If we want to discretise the double layer potential (using the Galerkin approach again), we have to compute K ij y k(x; y) j(y) i(x)dy dx: Replacing k(; ) by its approximation k(; ~ ), we ~K ij := k(x; ~ y) y = 2I 2I k(x ; y ) i p (x) i(x)dx j(y) y p (y) j(y)dy; so by dening V ;DLP 2 R I as we once more get the V ;DLP i := (y) y ~K ij = V S V ;DLPT ; ij j(y)dy; similar to (3.4). This means that for the typical variants of the integral operator (single layer potential, double layer potential and its transposed, hypersingular operator) and for the typical discretisation methods (collocation and Galerkin) the matrices S and B 0 ; stay the same, only the matrices V corresponding to the leaves of the cluster tree have to be modied. The construction leads directly to H 2 -matrices, so if tensor products of polynomials of a degree up to p are used for a kernel function dened in R d, the rank will be k = p d and the complexity of the matrix-vector multiplication will be O(nk) = O(np d ). 6.3 Variable Order Approximation In [9], a variation of the H 2 -technique is investigated that varies the polynomial order corresponding to the size of the clusters: For small clusters, a lower order approximation is sucient, while larger clusters require a higher order. The same approach can be used in the context of our method: If the polynomial order corresponding to a son cluster 0 is lower than that of its father, the equation (3.5) yields only an approximation p (x) ~p (x) := p (x 0 )p 0 (x) 2I 0 of the possibly higher-order polynomial p by lower-order polynomials p 0. If the growth of the polynomial order is \slow enough", e.g., only polynomial with respect to the level of the clusters, then the storage requirements and the complexity of the discretisation and the matrix-vector multiplication can be reduced to O(n), i.e., to optimal complexity. 0

13 7 Numerical Experiments We applied our technique to a simple model problem: The discretisation of the single layer potential on the unit circle by a Galerkin approach using a regular grid of piecewise constant functions. The results are reported in Table 4. Table 4: Unit circle, single layer potential, = 0:8, p(`) = + (`max `). n Build=s MVM=s ka Ak2 ~ =kak 2 Memory per DoF 024 :05 0:02 0: :30 0:06 0: :97 0:4 0: :2 0:3 0: :0 0:62 0: :96 :22 0: :54 2: :79 5: :22 0: :67 20: We can see the linear growth of the time for the construction of the matrix and for the matrix vector multiplication. The relative approximation error appears to be proportional to the approximation error. The memory requirements per degree of freedom are bounded. A Multidimensional Interpolation Estimate We denote the Chebyshev points in the interval [; ] by ( i ) p i=0, i.e., we have 2i + i = cos 2p + 2 ; and the corresponding Lagrange polynomials by (p i ) p i=0. The one-dimensional interpolation operator is given by This operator satises the error estimate and the stability estimate ~I p : C[; ]! P p ; u 7! p i=0 u( i )p i : k~ I p u uk ;[;] 2p (p + )! ku(p+) k ;[;] (A.) k~ I p uk ;[;] C log(p + )kuk ;[;] : (A.2) We are interested in a result for the d-dimensional tensor product interpolation operator I p B B := dy [a j ; b j ]: on a box The interpolation error can be bounded as follows: Lemma A. (Tensor product interpolation) We have ki p B d u uk ;Bd

14 2p (p + )! d k= (C log(p + )) k bj a j 2 4p 2(p + )! (C log(p + ))d diam(b d ) p+ p+ j d u p+ j u ;Bd (A.3) for u 2 C p+ (B). Proof. We denote by the transformation from the unit interval to [a j ; b j ]. For each j 2 f; : : : ; dg, we introduce the operator I p j j : [; ]! [a j ; b j ]; t 7! 2 (( + t)b j + ( t)a j ) :C(B)! C(B); u 7! x 7! p i=0 u(x ; : : : ; x j ; j ( i ); x j+ ; : : : ; x d ) p i ( j (x j )) interpolating functions in the j-th coordinate direction only. The estimates (A.) and (A.2) can be applied to I p j and take the form! ki p j u uk ;B 2p (p + )! bj a j 2 ki p j uk ;B (C log(p + ))kuk ;B : The tensor product interpolation operator can be written as I p B = Ip : : : Ip d = dy Due to this product representation, we can derive the following estimate: ki p B u uk ;B = = = p+ k@ p+ j uk ;B ; (A.4) I p j : dy I p j u u ;B 0 dy d Y ky I p j u k I p j u I p j u A u k= ;B 0 d k k Y I p j u I p j u A d 0 k Y k= ;B 0 d Y (A.5) (A.4) k= d k (C log(p + )) A ki p k u uk ;B (C log(p + )) k 2 p (p + )! I p j A (I p k ;B u u) p+ bk a k k@ p+ k uk ;B : 2 (A.5) References [] W. Dahmen and R. Schneider: Wavelets on manifolds I: Construction and domain decomposition, SIAM J. of Math. Anal. 3 (999) 84{230. 2

15 [2] K. Giebermann: Multilevel approximation of boundary integral operators, Computing 67 (200) pp. 83{ 207. [3] L. Grasedyck: Theorie und Anwendungen Hierarchischer Matrizen, PhD thesis, Universitat Kiel, 200. [4] W. Hackbusch: A sparse matrix arithmetic based on H-Matrices. Part I: Introduction to H-Matrices, Computing 62 (999) 89{08. [5] W. Hackbusch and B. Khoromskij: A sparse matrix arithmetic based on H-Matrices. Part II: Application to multi-dimensional problems, Computing 64 (2000) 2{47. [6] W. Hackbusch and B. Khoromskij: A sparse H-matrix arithmetic: General complexity estimates, J. Comp. Appl. Math. 25 (2000) 479{50. [7] W. Hackbusch, B. Khoromskij, and S. Sauter: On H 2 -matrices. In Lectures on Applied Mathematics, H. Bungartz, R. Hoppe, and C. enger, eds., 2000, pp. 9{29. [8] W. Hackbusch and. P. Nowak: On the fast matrix multiplication in the boundary element method by panel clustering, Numerische Mathematik 54 (989) 463{49. [9] S. Sauter: Variable order panel clustering, Computing 64 (2000) 223{26. [0] E. Tyrtyshnikov: Mosaic-skeleton approximation, Calcolo 33 (996) 47{57. 3

H 2 -matrices with adaptive bases

H 2 -matrices with adaptive bases 1 H 2 -matrices with adaptive bases Steffen Börm MPI für Mathematik in den Naturwissenschaften Inselstraße 22 26, 04103 Leipzig http://www.mis.mpg.de/ Problem 2 Goal: Treat certain large dense matrices

More information

Hierarchical Matrices. Jon Cockayne April 18, 2017

Hierarchical Matrices. Jon Cockayne April 18, 2017 Hierarchical Matrices Jon Cockayne April 18, 2017 1 Sources Introduction to Hierarchical Matrices with Applications [Börm et al., 2003] 2 Sources Introduction to Hierarchical Matrices with Applications

More information

An Introduction to Hierachical (H ) Rank and TT Rank of Tensors with Examples

An Introduction to Hierachical (H ) Rank and TT Rank of Tensors with Examples An Introduction to Hierachical (H ) Rank and TT Rank of Tensors with Examples Lars Grasedyck and Wolfgang Hackbusch Bericht Nr. 329 August 2011 Key words: MSC: hierarchical Tucker tensor rank tensor approximation

More information

für Mathematik in den Naturwissenschaften Leipzig

für Mathematik in den Naturwissenschaften Leipzig Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Approximation of integral operators by H 2 -matrices with adaptive bases (revised version: December 2004) by Steffen Börm Preprint

More information

Tensor networks, TT (Matrix Product States) and Hierarchical Tucker decomposition

Tensor networks, TT (Matrix Product States) and Hierarchical Tucker decomposition Tensor networks, TT (Matrix Product States) and Hierarchical Tucker decomposition R. Schneider (TUB Matheon) John von Neumann Lecture TU Munich, 2012 Setting - Tensors V ν := R n, H d = H := d ν=1 V ν

More information

Fast evaluation of boundary integral operators arising from an eddy current problem. MPI MIS Leipzig

Fast evaluation of boundary integral operators arising from an eddy current problem. MPI MIS Leipzig 1 Fast evaluation of boundary integral operators arising from an eddy current problem Steffen Börm MPI MIS Leipzig Jörg Ostrowski ETH Zürich Induction heating 2 Induction heating: Time harmonic eddy current

More information

Hamburger Beiträge zur Angewandten Mathematik

Hamburger Beiträge zur Angewandten Mathematik Hamburger Beiträge zur Angewandten Mathematik Numerical analysis of a control and state constrained elliptic control problem with piecewise constant control approximations Klaus Deckelnick and Michael

More information

The Mortar Wavelet Method Silvia Bertoluzza Valerie Perrier y October 29, 1999 Abstract This paper deals with the construction of wavelet approximatio

The Mortar Wavelet Method Silvia Bertoluzza Valerie Perrier y October 29, 1999 Abstract This paper deals with the construction of wavelet approximatio The Mortar Wavelet Method Silvia Bertoluzza Valerie Perrier y October 9, 1999 Abstract This paper deals with the construction of wavelet approximation spaces, in the framework of the Mortar method. We

More information

A New Scheme for the Tensor Representation

A New Scheme for the Tensor Representation J Fourier Anal Appl (2009) 15: 706 722 DOI 10.1007/s00041-009-9094-9 A New Scheme for the Tensor Representation W. Hackbusch S. Kühn Received: 18 December 2008 / Revised: 29 June 2009 / Published online:

More information

für Mathematik in den Naturwissenschaften Leipzig

für Mathematik in den Naturwissenschaften Leipzig Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Introduction to Hierarchical Matrices with Applications by Steffen Börm, Lars Grasedyck, and Wolfgang Hackbusch Preprint no.: 18 2002

More information

Numerical Integration for Multivariable. October Abstract. We consider the numerical integration of functions with point singularities over

Numerical Integration for Multivariable. October Abstract. We consider the numerical integration of functions with point singularities over Numerical Integration for Multivariable Functions with Point Singularities Yaun Yang and Kendall E. Atkinson y October 199 Abstract We consider the numerical integration of functions with point singularities

More information

A MULTIGRID ALGORITHM FOR. Richard E. Ewing and Jian Shen. Institute for Scientic Computation. Texas A&M University. College Station, Texas SUMMARY

A MULTIGRID ALGORITHM FOR. Richard E. Ewing and Jian Shen. Institute for Scientic Computation. Texas A&M University. College Station, Texas SUMMARY A MULTIGRID ALGORITHM FOR THE CELL-CENTERED FINITE DIFFERENCE SCHEME Richard E. Ewing and Jian Shen Institute for Scientic Computation Texas A&M University College Station, Texas SUMMARY In this article,

More information

2 W. Hackbusch, W. Kress and S. Sauter 2 Formulation of the Problem We consider a scattering problem in an exterior domain. For this, let R 3 be an un

2 W. Hackbusch, W. Kress and S. Sauter 2 Formulation of the Problem We consider a scattering problem in an exterior domain. For this, let R 3 be an un Sparse Convolution Quadrature for Time Domain Boundary Integral Formulations of the Wave Equation by Cuto and Panel-Clustering W. Hackbusch 1, W. Kress 1 and S. Sauter 2 1 Max Planck Institute for Mathematics

More information

Fast matrix algebra for dense matrices with rank-deficient off-diagonal blocks

Fast matrix algebra for dense matrices with rank-deficient off-diagonal blocks CHAPTER 2 Fast matrix algebra for dense matrices with rank-deficient off-diagonal blocks Chapter summary: The chapter describes techniques for rapidly performing algebraic operations on dense matrices

More information

Numerical tensor methods and their applications

Numerical tensor methods and their applications Numerical tensor methods and their applications 8 May 2013 All lectures 4 lectures, 2 May, 08:00-10:00: Introduction: ideas, matrix results, history. 7 May, 08:00-10:00: Novel tensor formats (TT, HT, QTT).

More information

Lecture 1: Center for Uncertainty Quantification. Alexander Litvinenko. Computation of Karhunen-Loeve Expansion:

Lecture 1: Center for Uncertainty Quantification. Alexander Litvinenko. Computation of Karhunen-Loeve Expansion: tifica Lecture 1: Computation of Karhunen-Loeve Expansion: Alexander Litvinenko http://sri-uq.kaust.edu.sa/ Stochastic PDEs We consider div(κ(x, ω) u) = f (x, ω) in G, u = 0 on G, with stochastic coefficients

More information

Karhunen-Loève Approximation of Random Fields Using Hierarchical Matrix Techniques

Karhunen-Loève Approximation of Random Fields Using Hierarchical Matrix Techniques Institut für Numerische Mathematik und Optimierung Karhunen-Loève Approximation of Random Fields Using Hierarchical Matrix Techniques Oliver Ernst Computational Methods with Applications Harrachov, CR,

More information

4. Multi-linear algebra (MLA) with Kronecker-product data.

4. Multi-linear algebra (MLA) with Kronecker-product data. ect. 3. Tensor-product interpolation. Introduction to MLA. B. Khoromskij, Leipzig 2007(L3) 1 Contents of Lecture 3 1. Best polynomial approximation. 2. Error bound for tensor-product interpolants. - Polynomial

More information

Lecture 9 Approximations of Laplace s Equation, Finite Element Method. Mathématiques appliquées (MATH0504-1) B. Dewals, C.

Lecture 9 Approximations of Laplace s Equation, Finite Element Method. Mathématiques appliquées (MATH0504-1) B. Dewals, C. Lecture 9 Approximations of Laplace s Equation, Finite Element Method Mathématiques appliquées (MATH54-1) B. Dewals, C. Geuzaine V1.2 23/11/218 1 Learning objectives of this lecture Apply the finite difference

More information

A Finite Element Method for an Ill-Posed Problem. Martin-Luther-Universitat, Fachbereich Mathematik/Informatik,Postfach 8, D Halle, Abstract

A Finite Element Method for an Ill-Posed Problem. Martin-Luther-Universitat, Fachbereich Mathematik/Informatik,Postfach 8, D Halle, Abstract A Finite Element Method for an Ill-Posed Problem W. Lucht Martin-Luther-Universitat, Fachbereich Mathematik/Informatik,Postfach 8, D-699 Halle, Germany Abstract For an ill-posed problem which has its origin

More information

An H-LU Based Direct Finite Element Solver Accelerated by Nested Dissection for Large-scale Modeling of ICs and Packages

An H-LU Based Direct Finite Element Solver Accelerated by Nested Dissection for Large-scale Modeling of ICs and Packages PIERS ONLINE, VOL. 6, NO. 7, 2010 679 An H-LU Based Direct Finite Element Solver Accelerated by Nested Dissection for Large-scale Modeling of ICs and Packages Haixin Liu and Dan Jiao School of Electrical

More information

290 J.M. Carnicer, J.M. Pe~na basis (u 1 ; : : : ; u n ) consisting of minimally supported elements, yet also has a basis (v 1 ; : : : ; v n ) which f

290 J.M. Carnicer, J.M. Pe~na basis (u 1 ; : : : ; u n ) consisting of minimally supported elements, yet also has a basis (v 1 ; : : : ; v n ) which f Numer. Math. 67: 289{301 (1994) Numerische Mathematik c Springer-Verlag 1994 Electronic Edition Least supported bases and local linear independence J.M. Carnicer, J.M. Pe~na? Departamento de Matematica

More information

The WENO Method for Non-Equidistant Meshes

The WENO Method for Non-Equidistant Meshes The WENO Method for Non-Equidistant Meshes Philip Rupp September 11, 01, Berlin Contents 1 Introduction 1.1 Settings and Conditions...................... The WENO Schemes 4.1 The Interpolation Problem.....................

More information

On the Ecient Realization of Sparse Matrix. Techniques for Integral Equations with Focus. on Panel Clustering, Cubature and Software.

On the Ecient Realization of Sparse Matrix. Techniques for Integral Equations with Focus. on Panel Clustering, Cubature and Software. On the Ecient Realization of Sparse Matrix Techniques for Integral Equations with Focus on Panel Clustering, Cubature and Software Design Aspects W. Hackbusch, C. Lage, and S.A. Sauter Institut fur Informatik

More information

Matrix assembly by low rank tensor approximation

Matrix assembly by low rank tensor approximation Matrix assembly by low rank tensor approximation Felix Scholz 13.02.2017 References Angelos Mantzaflaris, Bert Juettler, Boris Khoromskij, and Ulrich Langer. Matrix generation in isogeometric analysis

More information

Polynomial functions over nite commutative rings

Polynomial functions over nite commutative rings Polynomial functions over nite commutative rings Balázs Bulyovszky a, Gábor Horváth a, a Institute of Mathematics, University of Debrecen, Pf. 400, Debrecen, 4002, Hungary Abstract We prove a necessary

More information

Transactions on Modelling and Simulation vol 19, 1998 WIT Press, ISSN X

Transactions on Modelling and Simulation vol 19, 1998 WIT Press,   ISSN X Cost estimation of the panel clustering method applied to 3-D elastostatics Ken Hayami* & Stefan A. Sauter^ * Department of Mathematical Engineering and Information Physics, Graduate School of Engineering,

More information

Mathematics Research Report No. MRR 003{96, HIGH RESOLUTION POTENTIAL FLOW METHODS IN OIL EXPLORATION Stephen Roberts 1 and Stephan Matthai 2 3rd Febr

Mathematics Research Report No. MRR 003{96, HIGH RESOLUTION POTENTIAL FLOW METHODS IN OIL EXPLORATION Stephen Roberts 1 and Stephan Matthai 2 3rd Febr HIGH RESOLUTION POTENTIAL FLOW METHODS IN OIL EXPLORATION Stephen Roberts and Stephan Matthai Mathematics Research Report No. MRR 003{96, Mathematics Research Report No. MRR 003{96, HIGH RESOLUTION POTENTIAL

More information

Math 671: Tensor Train decomposition methods

Math 671: Tensor Train decomposition methods Math 671: Eduardo Corona 1 1 University of Michigan at Ann Arbor December 8, 2016 Table of Contents 1 Preliminaries and goal 2 Unfolding matrices for tensorized arrays The Tensor Train decomposition 3

More information

Technische Universität Graz

Technische Universität Graz Technische Universität Graz A note on the stable coupling of finite and boundary elements O. Steinbach Berichte aus dem Institut für Numerische Mathematik Bericht 2009/4 Technische Universität Graz A

More information

A Fast N-Body Solver for the Poisson(-Boltzmann) Equation

A Fast N-Body Solver for the Poisson(-Boltzmann) Equation A Fast N-Body Solver for the Poisson(-Boltzmann) Equation Robert D. Skeel Departments of Computer Science (and Mathematics) Purdue University http://bionum.cs.purdue.edu/2008december.pdf 1 Thesis Poisson(-Boltzmann)

More information

Non-Conforming Finite Element Methods for Nonmatching Grids in Three Dimensions

Non-Conforming Finite Element Methods for Nonmatching Grids in Three Dimensions Non-Conforming Finite Element Methods for Nonmatching Grids in Three Dimensions Wayne McGee and Padmanabhan Seshaiyer Texas Tech University, Mathematics and Statistics (padhu@math.ttu.edu) Summary. In

More information

Convergence of The Multigrid Method With A Wavelet. Abstract. This new coarse grid operator is constructed using the wavelet

Convergence of The Multigrid Method With A Wavelet. Abstract. This new coarse grid operator is constructed using the wavelet Convergence of The Multigrid Method With A Wavelet Coarse Grid Operator Bjorn Engquist Erding Luo y Abstract The convergence of the two-level multigrid method with a new coarse grid operator is studied.

More information

Nets Hawk Katz Theorem. There existsaconstant C>so that for any number >, whenever E [ ] [ ] is a set which does not contain the vertices of any axis

Nets Hawk Katz Theorem. There existsaconstant C>so that for any number >, whenever E [ ] [ ] is a set which does not contain the vertices of any axis New York Journal of Mathematics New York J. Math. 5 999) {3. On the Self Crossing Six Sided Figure Problem Nets Hawk Katz Abstract. It was shown by Carbery, Christ, and Wright that any measurable set E

More information

524 Jan-Olov Stromberg practice, this imposes strong restrictions both on N and on d. The current state of approximation theory is essentially useless

524 Jan-Olov Stromberg practice, this imposes strong restrictions both on N and on d. The current state of approximation theory is essentially useless Doc. Math. J. DMV 523 Computation with Wavelets in Higher Dimensions Jan-Olov Stromberg 1 Abstract. In dimension d, a lattice grid of size N has N d points. The representation of a function by, for instance,

More information

/00 $ $.25 per page

/00 $ $.25 per page Contemporary Mathematics Volume 00, 0000 Domain Decomposition For Linear And Nonlinear Elliptic Problems Via Function Or Space Decomposition UE-CHENG TAI Abstract. In this article, we use a function decomposition

More information

Ecient computation of highly oscillatory integrals by using QTT tensor approximation

Ecient computation of highly oscillatory integrals by using QTT tensor approximation Ecient computation of highly oscillatory integrals by using QTT tensor approximation Boris Khoromskij Alexander Veit Abstract We propose a new method for the ecient approximation of a class of highly oscillatory

More information

Calculus and linear algebra for biomedical engineering Week 3: Matrices, linear systems of equations, and the Gauss algorithm

Calculus and linear algebra for biomedical engineering Week 3: Matrices, linear systems of equations, and the Gauss algorithm Calculus and linear algebra for biomedical engineering Week 3: Matrices, linear systems of equations, and the Gauss algorithm Hartmut Führ fuehr@matha.rwth-aachen.de Lehrstuhl A für Mathematik, RWTH Aachen

More information

QUADRATURES INVOLVING POLYNOMIALS AND DAUBECHIES' WAVELETS *

QUADRATURES INVOLVING POLYNOMIALS AND DAUBECHIES' WAVELETS * QUADRATURES INVOLVING POLYNOMIALS AND DAUBECHIES' WAVELETS * WEI-CHANG SHANN AND JANN-CHANG YAN Abstract. Scaling equations are used to derive formulae of quadratures involving polynomials and scaling/wavelet

More information

Coins with arbitrary weights. Abstract. Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to

Coins with arbitrary weights. Abstract. Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to Coins with arbitrary weights Noga Alon Dmitry N. Kozlov y Abstract Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to decide if all the m given coins have the

More information

APPROXIMATING GAUSSIAN PROCESSES

APPROXIMATING GAUSSIAN PROCESSES 1 / 23 APPROXIMATING GAUSSIAN PROCESSES WITH H 2 -MATRICES Steffen Börm 1 Jochen Garcke 2 1 Christian-Albrechts-Universität zu Kiel 2 Universität Bonn and Fraunhofer SCAI 2 / 23 OUTLINE 1 GAUSSIAN PROCESSES

More information

A Hybrid Method for the Wave Equation. beilina

A Hybrid Method for the Wave Equation.   beilina A Hybrid Method for the Wave Equation http://www.math.unibas.ch/ beilina 1 The mathematical model The model problem is the wave equation 2 u t 2 = (a 2 u) + f, x Ω R 3, t > 0, (1) u(x, 0) = 0, x Ω, (2)

More information

Fast Multipole BEM for Structural Acoustics Simulation

Fast Multipole BEM for Structural Acoustics Simulation Fast Boundary Element Methods in Industrial Applications Fast Multipole BEM for Structural Acoustics Simulation Matthias Fischer and Lothar Gaul Institut A für Mechanik, Universität Stuttgart, Germany

More information

Stability of implicit extrapolation methods. Abstract. Multilevel methods are generally based on a splitting of the solution

Stability of implicit extrapolation methods. Abstract. Multilevel methods are generally based on a splitting of the solution Contemporary Mathematics Volume 00, 0000 Stability of implicit extrapolation methods Abstract. Multilevel methods are generally based on a splitting of the solution space associated with a nested sequence

More information

SPECTRAL METHODS ON ARBITRARY GRIDS. Mark H. Carpenter. Research Scientist. Aerodynamic and Acoustic Methods Branch. NASA Langley Research Center

SPECTRAL METHODS ON ARBITRARY GRIDS. Mark H. Carpenter. Research Scientist. Aerodynamic and Acoustic Methods Branch. NASA Langley Research Center SPECTRAL METHODS ON ARBITRARY GRIDS Mark H. Carpenter Research Scientist Aerodynamic and Acoustic Methods Branch NASA Langley Research Center Hampton, VA 368- David Gottlieb Division of Applied Mathematics

More information

PROOF OF TWO MATRIX THEOREMS VIA TRIANGULAR FACTORIZATIONS ROY MATHIAS

PROOF OF TWO MATRIX THEOREMS VIA TRIANGULAR FACTORIZATIONS ROY MATHIAS PROOF OF TWO MATRIX THEOREMS VIA TRIANGULAR FACTORIZATIONS ROY MATHIAS Abstract. We present elementary proofs of the Cauchy-Binet Theorem on determinants and of the fact that the eigenvalues of a matrix

More information

The Best Circulant Preconditioners for Hermitian Toeplitz Systems II: The Multiple-Zero Case Raymond H. Chan Michael K. Ng y Andy M. Yip z Abstract In

The Best Circulant Preconditioners for Hermitian Toeplitz Systems II: The Multiple-Zero Case Raymond H. Chan Michael K. Ng y Andy M. Yip z Abstract In The Best Circulant Preconditioners for Hermitian Toeplitz Systems II: The Multiple-ero Case Raymond H. Chan Michael K. Ng y Andy M. Yip z Abstract In [0, 4], circulant-type preconditioners have been proposed

More information

2 W. LAWTON, S. L. LEE AND ZUOWEI SHEN is called the fundamental condition, and a sequence which satises the fundamental condition will be called a fu

2 W. LAWTON, S. L. LEE AND ZUOWEI SHEN is called the fundamental condition, and a sequence which satises the fundamental condition will be called a fu CONVERGENCE OF MULTIDIMENSIONAL CASCADE ALGORITHM W. LAWTON, S. L. LEE AND ZUOWEI SHEN Abstract. Necessary and sucient conditions on the spectrum of the restricted transition operators are given for the

More information

PIECEWISE LINEAR FINITE ELEMENT METHODS ARE NOT LOCALIZED

PIECEWISE LINEAR FINITE ELEMENT METHODS ARE NOT LOCALIZED PIECEWISE LINEAR FINITE ELEMENT METHODS ARE NOT LOCALIZED ALAN DEMLOW Abstract. Recent results of Schatz show that standard Galerkin finite element methods employing piecewise polynomial elements of degree

More information

An Adaptive Hierarchical Matrix on Point Iterative Poisson Solver

An Adaptive Hierarchical Matrix on Point Iterative Poisson Solver Malaysian Journal of Mathematical Sciences 10(3): 369 382 (2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES Journal homepage: http://einspem.upm.edu.my/journal An Adaptive Hierarchical Matrix on Point

More information

für Mathematik in den Naturwissenschaften Leipzig

für Mathematik in den Naturwissenschaften Leipzig Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig A Note on the Poincaré Inequality for Convex Domains by Mario Bebendorf Preprint no.: 24 23 ANoteonthePoincaré Inequality for Convex

More information

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition)

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition) Vector Space Basics (Remark: these notes are highly formal and may be a useful reference to some students however I am also posting Ray Heitmann's notes to Canvas for students interested in a direct computational

More information

An exploration of matrix equilibration

An exploration of matrix equilibration An exploration of matrix equilibration Paul Liu Abstract We review three algorithms that scale the innity-norm of each row and column in a matrix to. The rst algorithm applies to unsymmetric matrices,

More information

8 Singular Integral Operators and L p -Regularity Theory

8 Singular Integral Operators and L p -Regularity Theory 8 Singular Integral Operators and L p -Regularity Theory 8. Motivation See hand-written notes! 8.2 Mikhlin Multiplier Theorem Recall that the Fourier transformation F and the inverse Fourier transformation

More information

Ole Christensen 3. October 20, Abstract. We point out some connections between the existing theories for

Ole Christensen 3. October 20, Abstract. We point out some connections between the existing theories for Frames and pseudo-inverses. Ole Christensen 3 October 20, 1994 Abstract We point out some connections between the existing theories for frames and pseudo-inverses. In particular, using the pseudo-inverse

More information

then kaxk 1 = j a ij x j j ja ij jjx j j: Changing the order of summation, we can separate the summands, kaxk 1 ja ij jjx j j: let then c = max 1jn ja

then kaxk 1 = j a ij x j j ja ij jjx j j: Changing the order of summation, we can separate the summands, kaxk 1 ja ij jjx j j: let then c = max 1jn ja Homework Haimanot Kassa, Jeremy Morris & Isaac Ben Jeppsen October 7, 004 Exercise 1 : We can say that kxk = kx y + yk And likewise So we get kxk kx yk + kyk kxk kyk kx yk kyk = ky x + xk kyk ky xk + kxk

More information

Iterative procedure for multidimesional Euler equations Abstracts A numerical iterative scheme is suggested to solve the Euler equations in two and th

Iterative procedure for multidimesional Euler equations Abstracts A numerical iterative scheme is suggested to solve the Euler equations in two and th Iterative procedure for multidimensional Euler equations W. Dreyer, M. Kunik, K. Sabelfeld, N. Simonov, and K. Wilmanski Weierstra Institute for Applied Analysis and Stochastics Mohrenstra e 39, 07 Berlin,

More information

COMPARED to other computational electromagnetic

COMPARED to other computational electromagnetic IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 58, NO. 12, DECEMBER 2010 3697 Existence of -Matrix Representations of the Inverse Finite-Element Matrix of Electrodynamic Problems and -Based

More information

A Recursive Trust-Region Method for Non-Convex Constrained Minimization

A Recursive Trust-Region Method for Non-Convex Constrained Minimization A Recursive Trust-Region Method for Non-Convex Constrained Minimization Christian Groß 1 and Rolf Krause 1 Institute for Numerical Simulation, University of Bonn. {gross,krause}@ins.uni-bonn.de 1 Introduction

More information

ETNA Kent State University

ETNA Kent State University Electronic Transactions on Numerical Analysis. Volume 37, pp. 166-172, 2010. Copyright 2010,. ISSN 1068-9613. ETNA A GRADIENT RECOVERY OPERATOR BASED ON AN OBLIQUE PROJECTION BISHNU P. LAMICHHANE Abstract.

More information

October 7, :8 WSPC/WS-IJWMIP paper. Polynomial functions are renable

October 7, :8 WSPC/WS-IJWMIP paper. Polynomial functions are renable International Journal of Wavelets, Multiresolution and Information Processing c World Scientic Publishing Company Polynomial functions are renable Henning Thielemann Institut für Informatik Martin-Luther-Universität

More information

A Block Red-Black SOR Method. for a Two-Dimensional Parabolic. Equation Using Hermite. Collocation. Stephen H. Brill 1 and George F.

A Block Red-Black SOR Method. for a Two-Dimensional Parabolic. Equation Using Hermite. Collocation. Stephen H. Brill 1 and George F. 1 A lock ed-lack SO Method for a Two-Dimensional Parabolic Equation Using Hermite Collocation Stephen H. rill 1 and George F. Pinder 1 Department of Mathematics and Statistics University ofvermont urlington,

More information

Hierarchical Matrices in Computations of Electron Dynamics

Hierarchical Matrices in Computations of Electron Dynamics Hierarchical Matrices in Computations of Electron Dynamics Othmar Koch Christopher Ede Gerald Jordan Armin Scrinzi July 20, 2009 Abstract We discuss the approximation of the meanfield terms appearing in

More information

Functional Analysis: Assignment Set # 11 Spring 2009 Professor: Fengbo Hang April 29, 2009

Functional Analysis: Assignment Set # 11 Spring 2009 Professor: Fengbo Hang April 29, 2009 Eduardo Corona Functional Analysis: Assignment Set # Spring 2009 Professor: Fengbo Hang April 29, 2009 29. (i) Every convolution operator commutes with translation: ( c u)(x) = u(x + c) (ii) Any two convolution

More information

Approximation of High-Dimensional Rank One Tensors

Approximation of High-Dimensional Rank One Tensors Approximation of High-Dimensional Rank One Tensors Markus Bachmayr, Wolfgang Dahmen, Ronald DeVore, and Lars Grasedyck March 14, 2013 Abstract Many real world problems are high-dimensional in that their

More information

Structural Grobner Basis. Bernd Sturmfels and Markus Wiegelmann TR May Department of Mathematics, UC Berkeley.

Structural Grobner Basis. Bernd Sturmfels and Markus Wiegelmann TR May Department of Mathematics, UC Berkeley. I 1947 Center St. Suite 600 Berkeley, California 94704-1198 (510) 643-9153 FAX (510) 643-7684 INTERNATIONAL COMPUTER SCIENCE INSTITUTE Structural Grobner Basis Detection Bernd Sturmfels and Markus Wiegelmann

More information

A direct solver for elliptic PDEs in three dimensions based on hierarchical merging of Poincaré-Steklov operators

A direct solver for elliptic PDEs in three dimensions based on hierarchical merging of Poincaré-Steklov operators (1) A direct solver for elliptic PDEs in three dimensions based on hierarchical merging of Poincaré-Steklov operators S. Hao 1, P.G. Martinsson 2 Abstract: A numerical method for variable coefficient elliptic

More information

Priority Program 1253

Priority Program 1253 Deutsche Forschungsgemeinschaft Priority Program 1253 Optimization with Partial Differential Equations Klaus Deckelnick and Michael Hinze A note on the approximation of elliptic control problems with bang-bang

More information

G METHOD IN ACTION: FROM EXACT SAMPLING TO APPROXIMATE ONE

G METHOD IN ACTION: FROM EXACT SAMPLING TO APPROXIMATE ONE G METHOD IN ACTION: FROM EXACT SAMPLING TO APPROXIMATE ONE UDREA PÄUN Communicated by Marius Iosifescu The main contribution of this work is the unication, by G method using Markov chains, therefore, a

More information

B-Spline Interpolation on Lattices

B-Spline Interpolation on Lattices B-Spline Interpolation on Lattices David Eberly, Geometric Tools, Redmond WA 98052 https://www.geometrictools.com/ This work is licensed under the Creative Commons Attribution 4.0 International License.

More information

Viewed From Cubic Splines. further clarication and improvement. This can be described by applying the

Viewed From Cubic Splines. further clarication and improvement. This can be described by applying the Radial Basis Functions Viewed From Cubic Splines Robert Schaback Abstract. In the context of radial basis function interpolation, the construction of native spaces and the techniques for proving error

More information

Introduction to the Tensor Train Decomposition and Its Applications in Machine Learning

Introduction to the Tensor Train Decomposition and Its Applications in Machine Learning Introduction to the Tensor Train Decomposition and Its Applications in Machine Learning Anton Rodomanov Higher School of Economics, Russia Bayesian methods research group (http://bayesgroup.ru) 14 March

More information

Max-Planck-Institut fur Mathematik in den Naturwissenschaften Leipzig Uniformly distributed measures in Euclidean spaces by Bernd Kirchheim and David Preiss Preprint-Nr.: 37 1998 Uniformly Distributed

More information

Mathematical Institute, University of Utrecht. The problem of estimating the mean of an observed Gaussian innite-dimensional vector

Mathematical Institute, University of Utrecht. The problem of estimating the mean of an observed Gaussian innite-dimensional vector On Minimax Filtering over Ellipsoids Eduard N. Belitser and Boris Y. Levit Mathematical Institute, University of Utrecht Budapestlaan 6, 3584 CD Utrecht, The Netherlands The problem of estimating the mean

More information

Moment Computation in Shift Invariant Spaces. Abstract. An algorithm is given for the computation of moments of f 2 S, where S is either

Moment Computation in Shift Invariant Spaces. Abstract. An algorithm is given for the computation of moments of f 2 S, where S is either Moment Computation in Shift Invariant Spaces David A. Eubanks Patrick J.Van Fleet y Jianzhong Wang ẓ Abstract An algorithm is given for the computation of moments of f 2 S, where S is either a principal

More information

460 HOLGER DETTE AND WILLIAM J STUDDEN order to examine how a given design behaves in the model g` with respect to the D-optimality criterion one uses

460 HOLGER DETTE AND WILLIAM J STUDDEN order to examine how a given design behaves in the model g` with respect to the D-optimality criterion one uses Statistica Sinica 5(1995), 459-473 OPTIMAL DESIGNS FOR POLYNOMIAL REGRESSION WHEN THE DEGREE IS NOT KNOWN Holger Dette and William J Studden Technische Universitat Dresden and Purdue University Abstract:

More information

ON TRIVIAL GRADIENT YOUNG MEASURES BAISHENG YAN Abstract. We give a condition on a closed set K of real nm matrices which ensures that any W 1 p -grad

ON TRIVIAL GRADIENT YOUNG MEASURES BAISHENG YAN Abstract. We give a condition on a closed set K of real nm matrices which ensures that any W 1 p -grad ON TRIVIAL GRAIENT YOUNG MEASURES BAISHENG YAN Abstract. We give a condition on a closed set K of real nm matrices which ensures that any W 1 p -gradient Young measure supported on K must be trivial the

More information

DIRECT ERROR BOUNDS FOR SYMMETRIC RBF COLLOCATION

DIRECT ERROR BOUNDS FOR SYMMETRIC RBF COLLOCATION Meshless Methods in Science and Engineering - An International Conference Porto, 22 DIRECT ERROR BOUNDS FOR SYMMETRIC RBF COLLOCATION Robert Schaback Institut für Numerische und Angewandte Mathematik (NAM)

More information

Recurrence Relations and Fast Algorithms

Recurrence Relations and Fast Algorithms Recurrence Relations and Fast Algorithms Mark Tygert Research Report YALEU/DCS/RR-343 December 29, 2005 Abstract We construct fast algorithms for decomposing into and reconstructing from linear combinations

More information

A gradient recovery method based on an oblique projection and boundary modification

A gradient recovery method based on an oblique projection and boundary modification ANZIAM J. 58 (CTAC2016) pp.c34 C45, 2017 C34 A gradient recovery method based on an oblique projection and boundary modification M. Ilyas 1 B. P. Lamichhane 2 M. H. Meylan 3 (Received 24 January 2017;

More information

WEAKLY SINGULAR INTEGRAL EQUATIONS

WEAKLY SINGULAR INTEGRAL EQUATIONS WEAKLY SINGULAR INTEGRAL EQUATIONS LECTURE NOTES BY GENNADI VAINIKKO (HUT 6, UNIVERSITY OF TARTU 7) Contents 1. Introduction. Requisites.1. Spaces.. Linear operators.3. Inverse operator.4. Linear compact

More information

STABILITY OF INVARIANT SUBSPACES OF COMMUTING MATRICES We obtain some further results for pairs of commuting matrices. We show that a pair of commutin

STABILITY OF INVARIANT SUBSPACES OF COMMUTING MATRICES We obtain some further results for pairs of commuting matrices. We show that a pair of commutin On the stability of invariant subspaces of commuting matrices Tomaz Kosir and Bor Plestenjak September 18, 001 Abstract We study the stability of (joint) invariant subspaces of a nite set of commuting

More information

1 Solutions to selected problems

1 Solutions to selected problems Solutions to selected problems Section., #a,c,d. a. p x = n for i = n : 0 p x = xp x + i end b. z = x, y = x for i = : n y = y + x i z = zy end c. y = (t x ), p t = a for i = : n y = y(t x i ) p t = p

More information

LECTURE 16 GAUSS QUADRATURE In general for Newton-Cotes (equispaced interpolation points/ data points/ integration points/ nodes).

LECTURE 16 GAUSS QUADRATURE In general for Newton-Cotes (equispaced interpolation points/ data points/ integration points/ nodes). CE 025 - Lecture 6 LECTURE 6 GAUSS QUADRATURE In general for ewton-cotes (equispaced interpolation points/ data points/ integration points/ nodes). x E x S fx dx hw' o f o + w' f + + w' f + E 84 f 0 f

More information

Decomposition of Riesz frames and wavelets into a finite union of linearly independent sets

Decomposition of Riesz frames and wavelets into a finite union of linearly independent sets Decomposition of Riesz frames and wavelets into a finite union of linearly independent sets Ole Christensen, Alexander M. Lindner Abstract We characterize Riesz frames and prove that every Riesz frame

More information

Overlapping Schwarz preconditioners for Fekete spectral elements

Overlapping Schwarz preconditioners for Fekete spectral elements Overlapping Schwarz preconditioners for Fekete spectral elements R. Pasquetti 1, L. F. Pavarino 2, F. Rapetti 1, and E. Zampieri 2 1 Laboratoire J.-A. Dieudonné, CNRS & Université de Nice et Sophia-Antipolis,

More information

Tensor-Product Representation of Operators and Functions (7 introductory lectures) Boris N. Khoromskij

Tensor-Product Representation of Operators and Functions (7 introductory lectures) Boris N. Khoromskij 1 Everything should be made as simple as possible, but not simpler. A. Einstein (1879-1955) Tensor-Product Representation of Operators and Functions (7 introductory lectures) Boris N. Khoromskij University

More information

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko Approximation Algorithms for Maximum Coverage and Max Cut with Given Sizes of Parts? A. A. Ageev and M. I. Sviridenko Sobolev Institute of Mathematics pr. Koptyuga 4, 630090, Novosibirsk, Russia fageev,svirg@math.nsc.ru

More information

satisfying ( i ; j ) = ij Here ij = if i = j and 0 otherwise The idea to use lattices is the following Suppose we are given a lattice L and a point ~x

satisfying ( i ; j ) = ij Here ij = if i = j and 0 otherwise The idea to use lattices is the following Suppose we are given a lattice L and a point ~x Dual Vectors and Lower Bounds for the Nearest Lattice Point Problem Johan Hastad* MIT Abstract: We prove that given a point ~z outside a given lattice L then there is a dual vector which gives a fairly

More information

Rearrangements and polar factorisation of countably degenerate functions G.R. Burton, School of Mathematical Sciences, University of Bath, Claverton D

Rearrangements and polar factorisation of countably degenerate functions G.R. Burton, School of Mathematical Sciences, University of Bath, Claverton D Rearrangements and polar factorisation of countably degenerate functions G.R. Burton, School of Mathematical Sciences, University of Bath, Claverton Down, Bath BA2 7AY, U.K. R.J. Douglas, Isaac Newton

More information

TENSOR APPROXIMATION TOOLS FREE OF THE CURSE OF DIMENSIONALITY

TENSOR APPROXIMATION TOOLS FREE OF THE CURSE OF DIMENSIONALITY TENSOR APPROXIMATION TOOLS FREE OF THE CURSE OF DIMENSIONALITY Eugene Tyrtyshnikov Institute of Numerical Mathematics Russian Academy of Sciences (joint work with Ivan Oseledets) WHAT ARE TENSORS? Tensors

More information

Algorithms to solve block Toeplitz systems and. least-squares problems by transforming to Cauchy-like. matrices

Algorithms to solve block Toeplitz systems and. least-squares problems by transforming to Cauchy-like. matrices Algorithms to solve block Toeplitz systems and least-squares problems by transforming to Cauchy-like matrices K. Gallivan S. Thirumalai P. Van Dooren 1 Introduction Fast algorithms to factor Toeplitz matrices

More information

Discrete Projection Methods for Integral Equations

Discrete Projection Methods for Integral Equations SUB Gttttingen 7 208 427 244 98 A 5141 Discrete Projection Methods for Integral Equations M.A. Golberg & C.S. Chen TM Computational Mechanics Publications Southampton UK and Boston USA Contents Sources

More information

Transactions on Modelling and Simulation vol 18, 1997 WIT Press, ISSN X

Transactions on Modelling and Simulation vol 18, 1997 WIT Press,   ISSN X Application of the panel clustering method to the three-dimensional elastostatic problem K. Hayami* and S. A. Sauter** ^Department of Mathematical Engineering and Information Physics, School ofengineering,

More information

2 EBERHARD BECKER ET AL. has a real root. Thus our problem can be reduced to the problem of deciding whether or not a polynomial in one more variable

2 EBERHARD BECKER ET AL. has a real root. Thus our problem can be reduced to the problem of deciding whether or not a polynomial in one more variable Deciding positivity of real polynomials Eberhard Becker, Victoria Powers, and Thorsten Wormann Abstract. We describe an algorithm for deciding whether or not a real polynomial is positive semidenite. The

More information

2 Section 2 However, in order to apply the above idea, we will need to allow non standard intervals ('; ) in the proof. More precisely, ' and may gene

2 Section 2 However, in order to apply the above idea, we will need to allow non standard intervals ('; ) in the proof. More precisely, ' and may gene Introduction 1 A dierential intermediate value theorem by Joris van der Hoeven D pt. de Math matiques (B t. 425) Universit Paris-Sud 91405 Orsay Cedex France June 2000 Abstract Let T be the eld of grid-based

More information

2 Multidimensional Hyperbolic Problemss where A(u) =f u (u) B(u) =g u (u): (7.1.1c) Multidimensional nite dierence schemes can be simple extensions of

2 Multidimensional Hyperbolic Problemss where A(u) =f u (u) B(u) =g u (u): (7.1.1c) Multidimensional nite dierence schemes can be simple extensions of Chapter 7 Multidimensional Hyperbolic Problems 7.1 Split and Unsplit Dierence Methods Our study of multidimensional parabolic problems in Chapter 5 has laid most of the groundwork for our present task

More information

A fast method for solving the Heat equation by Layer Potentials

A fast method for solving the Heat equation by Layer Potentials A fast method for solving the Heat equation by Layer Potentials Johannes Tausch Abstract Boundary integral formulations of the heat equation involve time convolutions in addition to surface potentials.

More information

MATH 590: Meshfree Methods

MATH 590: Meshfree Methods MATH 590: Meshfree Methods Chapter 34: Improving the Condition Number of the Interpolation Matrix Greg Fasshauer Department of Applied Mathematics Illinois Institute of Technology Fall 2010 fasshauer@iit.edu

More information

Lecture 1: Introduction to low-rank tensor representation/approximation. Center for Uncertainty Quantification. Alexander Litvinenko

Lecture 1: Introduction to low-rank tensor representation/approximation. Center for Uncertainty Quantification. Alexander Litvinenko tifica Lecture 1: Introduction to low-rank tensor representation/approximation Alexander Litvinenko http://sri-uq.kaust.edu.sa/ KAUST Figure : KAUST campus, 5 years old, approx. 7000 people (include 1400

More information