NIST logo

Publications Portal

You searched on:
Topic Area: Math
Sorted by: title

Displaying records 211 to 220 of 237 records.
Resort by: Date / Title

211. The Radius of Attraction for Newton's Method and TV-Minimization Image Denoising
Topic: Math
Published: 12/1/2012
Authors: Luis A Melara, Anthony J Kearsley
Abstract: This paper presents an estimate of the radius of convergence for Newton‰s method applied to a regularized TV-minimization problem often employed to denoise images. Strong Fréchet differentiability of this iteration is established and an estimate of t ...

212. The Relegation Algorithm
Topic: Math
Published: 3/3/2001
Authors: A Deprit, E Deprit, Jesúus Palacián
Abstract: Given a perturbed Hamiltonian system, normalization yields a Lie transformation which converts the main part of the Hamiltonian into an integral of the transformed system. An extension of the normalization method--the relegation algorithm--does the s ...

213. The Role of Rendering in the Competence Project in Measurement Science for Optical Reflection and Scattering
Series: Journal of Research (NIST JRES)
Topic: Math
Published: 5/1/2002
Authors: H B Westlund, G W Meyer, Fern Y Hunt
Abstract: Rendering is the process of producing a synthetic image using a computer. The best known application is animation and simulation of scenes for the entertainment industry but recognition of its value as a tool for product design in other areas is incr ...

214. The Solidification of an Ideal Ternary Alloy in a Mushy Layer
Topic: Math
Published: 3/24/2010
Authors: Daniel M Anderson, Geoffrey B McFadden, Sam Ray Coriell, Bruce Murray
Abstract: We consider a model for the solidification of an ideal ternary alloy in a mushy layer that incorporates the effects thermal and solutal diffusion, convection and solidification. Our results reveal that although the temperature and solute fields are ...

215. The TriTon Transformation
Topic: Math
Published: 8/27/2012
Author: Daniel C Smith-Tone
Abstract: Many new systems have been proposed which hide an easily invertible multivariate quadratic map in a larger structure by adding more variables and introducing some mixing of a random component to the structured system. While many systems which have b ...

216. The contribution of lipid layer movement to tear film thinning and breakup
Topic: Math
Published: 6/15/2009
Authors: Geoffrey B McFadden, P. Ewan King-Smith, Barbara A. Fink, Jason J. Nichols, Richard J Braun
Abstract: The purpose of this study is to investigate the origin of the tear film thinning between blinks, which can lead to tear film breakup and ocular surface damage. Two mechanisms of thinning are considered: "tangential flow" of the tear film along the su ...

217. Theory of Curvature and Grooving Effects in DIGM - II: the Mathematics
Topic: Math
Published: Date unknown
Authors: O Penrose, John W. (John W.) Cahn
Abstract: We examine and solve the mathematical problems that arise when diffusion induced grain boundary motion is formulated as a free boundary problem, i.e. as a system of partial differential equations on a moving curved interface with surface grooving as ...

218. Tight Bounds for the Multiplicative Complexity of Symmetric Functions
Topic: Math
Published: 4/28/2008
Authors: Joan Boyar, Rene C Peralta
Abstract: The multiplicative complexity of a Boolean function f is defined as the minimum number of binary conjunction (AND) gates required to construct a circuit representing f , when only exclusive-or, conjunction and negation gates may be used. This article ...

219. Tool Length-Dependent Stability Surfaces
Topic: Math
Published: 4/20/2004
Authors: T L Schmitz, J C Ziegert, Timothy J Burns, Brian S. Dutterer, W R Winfough
Abstract: This paper describes the development of three-dimensional stability surfaces, or maps, that combine the traditional dependence of allowable (chatter-free) chip width on spindle speed with the inherent dependence on tool overhang length, due to the co ...

220. Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach
Topic: Math
Published: 5/25/2012
Authors: Assane Gueye, Vladimir V Marbukh, Jean C Walrand
Abstract: In this paper, we propose a quantification of the vulnerability of a communication network when links are subject to failures due to the actions of a strategic adversary. We model the adversarial nature of the problem as a 2-player game between an at ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series