Amrouche et al., 2000 - Google Patents
Pointwise decay of solutions and of higher derivatives to Navier--Stokes equationsAmrouche et al., 2000
View PDF- Document ID
- 3603662570562135902
- Author
- Amrouche C
- Girault V
- Schonbek M
- Schonbek T
- Publication year
- Publication venue
- SIAM Journal on Mathematical Analysis
External Links
Snippet
In this paper we study the space-time asymptotic behavior of the solutions, and their derivatives, to the incompressible Navier--Stokes equations in dimension 2≤n≤5. Using moment estimates we obtain that strong solutions to the Navier--Stokes equations which …
- 230000001939 inductive effect 0 description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/726—Inversion; Reciprocal calculation; Division of elements of a finite field
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
- G06F7/48—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/11—Complex mathematical operations for solving equations, e.g. nonlinear equations, general mathematical optimization problems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/14—Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/38—Indexing scheme relating to groups G06F7/38 - G06F7/575
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Amrouche et al. | Pointwise decay of solutions and of higher derivatives to Navier--Stokes equations | |
| Taniguchi et al. | Existence, uniqueness, and asymptotic behavior of mild solutions to stochastic functional differential equations in Hilbert spaces | |
| Fowler et al. | Ramanujan sums as supercharacters | |
| Schonbek et al. | Asymptotic behavior to dissipative quasi-geostrophic flows | |
| Debussche et al. | Weak backward error analysis for SDEs | |
| JPWO2005015526A1 (en) | Elliptic curve encryption device, elliptic curve encryption method, and elliptic curve encryption program | |
| JPWO2004055756A1 (en) | Tamper resistant elliptic curve cryptography using secret key | |
| El-Danaf et al. | The use of adomian decomposition method for solving the regularized long-wave equation | |
| JP2002528771A (en) | Power Signature Attack Cryptography | |
| Bae et al. | Decay rate for the incompressible flows in half spaces | |
| Nane et al. | Stability of the solution of stochastic differential equation driven by time-changed Lévy noise | |
| SADIGH | The use of iterative methods for solving Black-Scholes equation | |
| Jafari et al. | Symmetry group analysis and conservation laws of the potential modified KdV equation using the scaling method | |
| Oliveira et al. | Fast point multiplication algorithms for binary elliptic curves with and without precomputation | |
| Huang et al. | Stability and convergence analysis of a fully discrete semi-implicit scheme for stochastic Allen-Cahn equations with multiplicative noise | |
| US20170026178A1 (en) | Computational method, computational device andcomputer software product for montgomery domain | |
| Hu et al. | Pathwise solutions for stochastic hydrostatic Euler equations and hydrostatic Navier-Stokes equations under the local Rayleigh condition | |
| Rößler et al. | Method of lines for stochastic boundary-value problems with additive noise | |
| Mizuguchi et al. | A method of verified computations for solutions to semilinear parabolic equations using semigroup theory | |
| KR20080086476A (en) | Password processing apparatus, and password processing method, and computer program | |
| Ghergu | Steady-state solutions for Gierer-Meinhardt type systems with Dirichlet boundary condition | |
| JP2004530919A5 (en) | ||
| Keliris et al. | Investigating large integer arithmetic on Intel Xeon Phi SIMD extensions | |
| Nazir et al. | Comparative study of mathematical model of ebola virus disease via using differential transform method and variation of iteration method | |
| Chen | Analysis of expanded mixed methods for fourth‐order elliptic problems |