Home | Amazing | Today | Tags | Publishers | Years | Account | Search
 Presentation of the main approaches developed for a posteriori error estimation in various problems. Recent decades have seen a very rapid success in developing numerical methods based on explicit control over approximation errors. It may be said that nowadays a new direction is forming in numerical analysis, the main goal of which is to develop methods ofreliable computations. In general, a reliable numerical method must solve two basic problems: (a) generate a sequence of approximations that converges to a solution and (b) verify the accuracy of these approximations. A computer code for such a method must consist of two respective blocks: solver and checker.In this book, we are chiefly concerned with the problem (b) and try to present the main approaches developed for a posteriori error estimation in various problems.The authors try to retain a rigorous mathematical style, however, proofs are constructive whenever possible and additional mathematical knowledge is presented when necessary. The book contains a number of new mathematical results and lists a posteriori error estimation methods that have been developed in the very recent time. · computable bounds of approximation errors· checking algorithms· iteration processes· finite element methods· elliptic type problems· nonlinear variational problems· variational inequalities
Blender Quick Start Guide: 3D Modeling, Animation, and Render with Eevee in Blender 2.8

Explore the new Blender 2.8 user interface and get up to speed with creating 3D models

Key Features

• Discover Blender 2.8’s new user interface and tools
• Create materials, apply textures and render scenes
• Use the new cutting-edge real-time render Eevee...
The Official Guide to 3D GameStudio
If you’re a video game enthusiast, then you’ve probably thought more than once about creating your own games. Now you can develop your own 3D games using 3D GameStudio! The Official Guide to 3D GameStudio will help you develop the skills you need to create a variety of games, including first-person shooter and fantasy role-playing....
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

 Pro Android 3 Computing continues to become more and more personalized and accessible. Handheld devices have largely transformed into computing platforms. Mobile phones are no longer just for talking—they have been capable of carrying data and video for some time. Be it a phone or a tablet, the mobile device is now so capable of general-purpose... Goddess of the Market: Ayn Rand and the American RightWorshipped by her fans, denounced by her enemies, and forever shadowed by controversy and scandal, the novelist and philosopher Ayn Rand was a powerful thinker whose views on government and markets shaped the conservative movement from its earliest days. Drawing on unprecedented access to Rand's private papers and the original, unedited... Webster's New World Telecom DictionaryWebster’s New World Telecom Dictionary, by Ray Horak, is a comprehensive telecommunications dictionary of more than 7,500 terms critical to understanding voice, data, video, and multimedia communications system and network technologies, applications, and regulation. Given the convergence of computing and communications, the book also...