Mobile ad-hoc networks are prone to a number of security threats. The fact that mobile ad-hoc networks lack fixed infrastructure and use wireless link for communication makes them very susceptible toâ€¦ (More)

We present an a-posteriori method for computing rigorous upper and lower bounds for the Jâˆ’integral in two dimensional linear elasticity. The Jâˆ’integral, which is typically expressed as a contourâ€¦ (More)

! Department of Computer Science, Tianjin University of Technology and Education, Tianjin 300222, China. Â§ Institute of Mathematics, Helsinki University of Technology, P.O. Box 1100, FI-02015 TKK,â€¦ (More)

Microelectrode structures in alternating current (AC) electrokinetics can generate high electric field strength to manipulate, characterize and separate particles in suspending medium. It has beenâ€¦ (More)

Let U(n) be the unitary group of rank n, SO(m) the special orthogonal group of rank m, and Sp(n), the symplectic group of rank n. Fix, once and for all, a maximal torus Tn âŠ‚ U(n), T [m2 ] âŠ‚ SO(m), Tnâ€¦ (More)

2011 Fourth International Symposium on Parallelâ€¦

2011

A parallel computing procedure for computing the bounds on the {\it J}-integral in functionally graded materials is presented based on a Neumann element a-posteriori error bound. The finite elementâ€¦ (More)

We present an a-posteriori method for computing rigorous upper and lower bounds of the J-integral in two dimensional linear elasticity. The J-integral, which is typically expressed as a contourâ€¦ (More)