LIBRARY OF THE
UNIVERSITY OF ILLINOIS
AT URBANA-CHAMPAIGN
5I0.84
y^o.8l-90
"PsiNEEm^
AUG 51976
I'he person charging this material is re-
sponsible for its return to the hbrary from
which it was withdrawn on or before the
Latest Date stamped below.
Theft, mutilation, and underlining of books
are reasons for disciplinary action and may
result in dismissal from the University.
UNIVERSITY OF ILLINOIS LIBRARY AT URBAfclA-CHAMPAIGN
lllli
•iwa^isil^S'
i^yy^ii
L161 — O-1096
Digitized by the Internet Archive
in 2012 with funding from
University of Illinois Urbana-Champaign
http://archive.org/details/computationalmat90belf
510.81;
U63c
no. 90
EnKin.
FERENCE ROOM
ENGWSERING UBRARy
mmRsljy OF ILLINOIS
ed Computa
UNlVERSlW OF ItLINOrS At URBANA-CHAMPAIGN
URBANA. ILLINOIS 61801
BIBLIOGRAPHIC DATA
SHEET
1. Report No.
UIUC-CAC-DN-T3-90
3. Recipient's Accession No.
4. Title and Subtitle
COMPUTATIONAL MATHEMATICS ABSTRACTS
7. Author(s) Edited Dy: (ieneva Bej.rora, jonatnan Lermit,
George Purdy, and Ahmed Sameh
5. Report Date
October 1973
8. Performing Organization Rept.
No. CAC-90
9. Performing Organization Name and Address
Center for Advanced Computation
University of Illinois at Urbana-Champaign
Urbana, 111. 618OI
10. Project/Task/Work Unit No.
11. Contract/Grant No.
DAHCOU-72-C-OOOI
12. Sponsoring Organization Name and Address
U.S. Army Research Office
Duke Station
Durham, North Carolina
13. Type of Report & Period
Covered
Re search- interim
14.
15. Supplementary Notes
16. Abstracts
None
17. Key Words and Document Analysis. 17a. Descriptors
Numerical Analysis
Graph Theory
Mathematical Programming
17b. Identifiers/Open-Ended Terms
17c. COSATI Field/Group
18. Availability Statement ^^ restriction On distribution
ft-vailable from the National Technical Information
Service.
FORM NTIS-3S (REV. 3-72)
19. Security Class (This
Report)
VNCLASSIFIED
20. Security Class (This
Page
UNCLASSIFIED
21. No. of Paees
^
22. Price
USCOMM-DC 14952-P72
CAC DocTjment No. 90
Computat lonal
Matheinatics Abstracts
Edited by
Geneva Belford
Jonathan Lermit
George Purdy
Ahmed Sameh
Applied Mathematics Group
Center for Advanced Computation
University of Illinois at Urban a- Champaign
Urbana, Illinois 618OI
October 1973
This work was supported in part by the Advanced Research Projects
Agency of the Department of Defense and was monitored by the U.S.
Array Research Office-Durham under Contract No. DAHC0U-T2-C-0001.
!^iii^^^^
TABLE OF CONTENTS
Page
ERROR ANALYSIS 1
FUNCTION EVALUATION AND COMPLEXITY THEORY k
APPROXIMATION 6
LINEAR ALGEBRA. 10
NONLINEAR EQUATIONS , 15
QUADRATURE - l6
ORDINARY DIFFERENTIAL EQUATIONS l8
PARTIAL DIFFERENTIAL EQUATIONS 21
FUNCTIONAL EQUATIONS 22
OPTIMIZATION 22
ROOT FINDING , 25
GRAPH ALGORITHMS. 26
MISCELLANEOUS 27
KEY TO REPORT SOURCES 29
ERROR MALYSIS
An Error Analysis of a Method for Solving Matrix Equations
by C. C. Paige
Let B = [L 0]Q be a decomposition of the m by n matrix B
of rank m such that L is lower triangular and Q is orthonormal. It
is possible to solve Bx, = b using L but not Q in the following manner:
solve Ly = b , solve L'^w = y , and form x = B w. It is shown that the
numerical stability of this method is comparable to that of the method
which uses Q. This is important for some methods used in mathematical
programming where B is very large and sparse and Q is discarded to save
storage.
STAN-CS-T2-29T June 1972
Rundungsfehleranalyse einiger Verfahren zur Summation endlicher Summen
by Arnold Neumaier
Der bei einer Summation auftretende Rundungsfehler kann als Mag
fur die Gute des verwendeten Verfahrens gelten. Im folgenden werden fllr
mehrere Suiranierungs verfahren, unter anderem fur das "ubliche" und das
Kahan-Babuska-Verfahren, a-priori-Schranken fur diese Rundungsfehler
S'^gegeben und miteinander verglichen.
PRAK 73/1 1973 28 pages
Fehlerabschatzung bei nichtlinearen Gleichungssystemen
by Rudolf Krawczyk
Fiir eine Losimg x* eines nichtlinearen Gleichungssystems f(x) = 0
wird eine Fehlerabschatzung bezuglich einer Halbordn\mg angegeben.
Gleichzeitig kann auch eine Aussage uber die Eindeutigkeit der Losung
gemacht werden. Die Ergebnisse werden auf Differenzengleichxmgen und auf ein
algebraisches Eigenwert problem angewandt .
PRAK 73/3 1973 ik pages
Komplexe Kreisarithmetik
by Norbert Krier
In dieser Arbeit werden Kreise der Gau3schen Zahlenebene als kom-
plexe Fehlerschrankenzahlen betrachtet. Da aus arithmetischen Verkniipfungen
solcher Kreise Mengen hervorgehen, die im allgemeinen keine Kreise sind,
werden diese Verkniipfungsmengen diirch Kreise abgeschatzt. Es wird eine
opt imal-abs chat zende Kreisarithmetik entwickelt sowie eine auf dem
Permanenzprinzip aufbauende, zentrierte Kreisarithmetik angegeben.
Um auch mit Mengen reeller oder imaginarer Zahlen rechnen zu
kbnnen, wird die Menge der komplexen Kreise eiveitert, indem Intervalle
der reellen sowie der imaginaren Achse als spezielle Kreiszahlen
aufgefasst werden. Dadiorch kann ausserdem eine fiir achsenparallele
Rechtecke der komplexen Ebene erklarte Intervallrechnung mit Kreiszahlen
nachvollzogen werden.
PEAK 73/2 1973 117 pages
Approximation durch Intervallfunktionen
by R. Krawczyk
Die bekannte Appro ximat ions aufgabe, eine gegebene Funktion f(x)
mit Hilfe eines Fimktionensystems zu approximleren, wird erweitert. Es
wird eine Intervall funktion (Funktion mit Intervallkoeffizienten) derart
bestimmt, dass die zu appro ximierende Funktion in dem diirch die
Intervall funktion definierten Streifen liegt. Diese Methode wird
anschliessend auf den diskreten Fall der Ausgleichung von n gegebenen
F-unktionswerten angewandt, und zwar 1. mit Hilfe eines Intervallpolynoms ,
2. durch eine trigonometrische Intervall funktion. Insbesondere wird fur
den Spezialfall der Interpolation die Fehlerabhangigkeit \intersucht . Ftir
eine Anzahl von Beispielen wird derjenige Grad der Ausgleichs funktion
ermittelt, fur welchen der entsprechende Streifen am schmalsten ist .
KARL 69/7 1969 12 pages
On the Computation of Rigorous Boirnds for the Solutions of Linear Integral
Equations with the Aid of Interval Arithmetic
by C. W. Cryer
A method is given for approximately solving linear Fredholm
integral equations of the second kind with non-negative kernels. The basis
of the method is the construction of piecewise-polynomial degenerate kernels
which bound the given kernel. The method is a generalization of a method
suggested by Gerberich. When implemented on a computer, interval arithmetic
is used so that rigorous bounds for the solution of the integral equations
are obtained.
The method is applied to two problems: the equation considered
by Gerberich; and the equation of Love which arises in connection with the
problem of determining the capacity of a circular plate condenser.
WIS 70 1969 ^0 pages
Iterationsverfahren in halbgeordneten Raumen
by R. Krawczyk
In der vorliegenden Arbeit werden Iterationsverfahren zur
Berechnung einer Folge von Intervallen in halbgeordneten linearen Raumen
"behandelt. Es verden atstrakte Satze ziir Einschliessung xind Existenz einer
Losung einer Operatorgleich-ung imd zur Konvergenz der Intervallfolgen
formuliert. Im zvelten Tell dieser Arbeit warden diese Satze aui* eine
Anzahl von Beispielen: Losung einer Gleichimg, N-ullstellenbestiimnung einer
analytischen F-unktion, Eigenvert- und Eigenvektorbestimmung von Matrizen,
Integralgleichung angewandt.
KARL 70/2 April 1970 30 pages
Bibliography on Proving the Correctness of Computer Programs — Addition No. 1
by Ralph L. London
The continued research activity in proving the correctness of
computer programs and the widespread interest in my previous program proving
bibliography (London 1970a) encourage me to compile these additional updating
citations. The selection criteria remain essentially unchanged; only the
form of the citation is trivially changed. As before, I wo"uld be most
interested in learning of corrections and additional citations to update
matters.
WIS-10i| December 1970 8 pages
FUNCTION EVALUATION AND COMPLEXITY THEORY
Computational Complexity of One-Point and Multipoint Iteration
by H. T. Kung and J. F. Traub
Let (|) "be an iteration for ^proximating the solution of a problem
f. We define a new efficiency measure e((|), f). For a given problem f,
we define the optimal efficiency E(f) and establish lower and upper boimds
for E(f) with respect to different families of iterations. We conjecture
an upper bound on E(f) for any iteration without memory.
CMU No # April 1973
Fast Evaluation and Interpolation
by H. T. Kung
A method for dividing a polynomial of degree (2n - l) by a pre-
computed nth degree polynomial in 0(n log n) arithmetic operations is given,
This is used to prove that the evaluation of an nth degree polynomial at
n+1 arbitrary points can be done in 0(n log n) arithmetic operations, and
consequently, its dual problem, interpolation of an nth degree polynomial
from n+1 arbitrary points can be performed in 0(n log n) arithmetic
operations. The best previously known algorithms required 0(n log n)
arithmetic operations.
CMU Wo # January 1973
Optimal Order of One-Point and Multipoint Iteration
by H. T. Kung and J. F. Traub
The problem is to calculate a simple zero of a non-linear function
f by iteration. We exhibit a family of iterations of order 2 which use
n evaluations of f and no derivative evaluations, as well as a second family
of iterations of order 2 based on n - 1 evaluations of f and one of f.
In particular, with four evaluations we construct an iteration of eighth
order. The best previous result for four evaluations was fifth order.
We prove that the optimal order of one general class of multipoint
iterations is 2 and that an upper bound on the order of a multipoint
iteration based on n evaluations of f (no derivatives) is 2 .
CONJECTURE. A multipoint iteration without memory based on n
evaluations has optimal order 2
CMU No # February 1973
The Computational Complexity of Algebraic Numbers
by H. T. Kung
Let {x.} be a sequence approximating an algebraic n-umber a of
degree r, and let x. ,^ = tf)(x.,x. ^,...,x. -,.,), for some rational fimction 4
" 1+1 1 1-1 i-d+1 ^
with integral coefficients. Let M denote the number of miiltipli cat ions or
divisions needed to compute (^ and let M denote the number of multiplications
or divisions, except by constants, needed to compute <^. Define the multipli-
loggP loggP
cation efficiency measure of {x. } as E({x })= — — — or as E({x. }) = — - — ,
1 1 ' M 1 M
where p is the order of convergence of {x.}. Kung [l] showed that
E({x. }) <_ 1 or equivalently, M >_ log p. In this paper we show that
(i) M >_ log2[r([pl-l) + 1] - 1; (ii) if E({x.}) = 1 then a is a rational
number; (iii) if E({x.}) = 1 then a is a rational or quadratic irrational
niimber. This settles the question of when the multiplication efficiency
E({x.}) or E({x.}) achieves its optimal value of unity.
CMU No # March 1973
Diagonal Theorems for Random Access Machines
by Stephen A. Cook and Robert A. Reckhow
Turing Machines have often been criticized for not being good models
for real computing machines. In this report we describe the RAM, an abstract
model of a (fixed-program) random access computer. A unique featvire of the
RAM is that the execution time of an instruction depends on the size of the
numbers being manipulated. We then describe- RAM-ALGOL, an ALGOL 60-like
programming language for RAM's. This language helps to clarify constructive
proofs of theorems involving RAM's. Using RAM-ALGOL programs we show that
the computing speeds of fixed-program and stored-program random access machines
and Turing Machines are not too widely divergent.
Our main result states that if T2(n) is a function such that there is
a RAM that computers T2(n) in time 0(T2(n) j, and if T-]_(n) is any function
inf ^1^^)
such that 7;r-7 — r = 0 , then there is a set S that can be recognized by
n-x» T2(n) ' ?= j'
some RAM in time 0(T2(n)) but no RAM recognizes S in time 0(T-j_(n)). This is
a sharper diagonal res\ilt than has been obtained for Tioring Machines.
TOR-1+2 J-une 1972 ll^l
pages
APPROXIMATION
Korovkin Sets (Sets of Convergence)
by G. G. Lorentz
This report treats sets of convergence of positive operators,
and of contractions, on the space of continuoTis fiinctions, and on other
Banach function spaces. Chapter 3 of the report is entirely new, while the
other two chapters present the existing theory in a new and more general
setting.
CNA-59 September 1972
An Application of the Theory of Approximation by Families with a Fixed Point
by G. G. Belford
Recently developed theorems characterizing best uniform
approximations from a family with a fixed point are shown to be useful in
the estimation of errors in computational techniques for solving linear
algebraic equations. Specifically, a gap in the proof of a published
theorem is filled in.
CAC TM No. 11 May 1973 6 pages
Simultaneous Fitting of Exponential Decay Curves
by G. G. Belford
This paper deals with characterization of best approximations to
vector-valued functions. The approximations are themselves vector-valued
functions with components depending nonlinearly on the approximation para-
meters. The constraint is imposed that certain of the parameters should be
identical for all components. An application to exponential approximation
is discussed in some detail.
CAC No. 6l April 1, 1973 30 pages
The Cholesky Factorization for Derivative-Free Nonlinear Least Squares
by Richard H. Bartels
In a previous technical report the author presented an algorithm
for minimizing sums of squares of nonlinear functions in several variables
without the use of derivatives. A subsection of this algorithm required that
the least-squares solution to an overdetermined linear system be found. The
implementation which was presented in the report accomplished this via the
QR factorization of the system's matrix. However, if the number of functions
in a nonlinear least-squares problem greatly exceeds the number of variables
involved, the matrix Q of the factorization requires a disproportionate
amount of storage space. To overcome this we present an alternate imple-
mentation In which the linear least-squares subproblem is solved via the
Cholesky factorization of the normal equation. A FORTRAN program -with test
results is included.
CM-6i| March 1973 Program Incl.
Constructive Aspects of Discrete Polynomial Spline Functions
by L. L. Schumaker
Discrete polynomial splines are vectors consisting of pieces of
polynomials tied together on knot intervals. They arise in optimal siammation
formulae and are expected to have applications to approximate solution of
discrete operator equations. Here ve obtain representations and local
Support bases (with recursions for them), discuss the total posit ivity of a
fundamental Green's function, and give certain basic interpolation resiilts.
CNA-62 January 1973 I8 pages
On the Convergence of Cubic Interpolating Splines
by Tom Lyche and L. L. Schumaker
Given a sequence of partitions A = (O = x <x^<...<x = l) and a
n o 1 n
corresponding sequence of cubic spline projections P , we find properties of
A which guarantee that f - P f -K) as n->°° for arbitrary continuous
n ' ' n ' '
functions on [O, l]. Results are obtained for cubic natural and cubic Type-I
spline interpolation.
CNA-61 September 1972
Computation of g-Splines Via a Factorization Method
by Harold D. Eidson and L. L. Schumaker
Fortran subroutines are presented for the purpose of computing and
evaluating g-splines interpolating Hermit e-Birkhoff data. The subroutines
are based on a factorization method for computing g-splines discussed by
Munteanu and Schumaker (CNA 25, Center for Numerical Analysis, UT Austin, 1971)
CNA-60 September 1972 Program Incl.
Uber A-usgleichs-Splines
by Klaus Bohmer
Combining the intrinsic properties of splines and the method of
least squares we discuss an extremal problem. We-show the existence -of a
solution and give the conditions for the uniqueness. For g -^ 0 resp. g ->-
we receive the usual interpolation spline resp. a solution of a problem
minimizing a sum of squares. We conclude in characterizing the solutions
for EHB- Interpolation problems.
KARL 71/5 September 1971 11 pages
On Best Simultaneoiis Approximation in Normed Linear Spaces
by D. S. Goel, A.S.B. Holland, C. Nasim, and B. N. Sahney
Let S be a non-empty family of real valued continuous functions on
[a, 3]. Diaz and McLaughlin [l], [2], and Dunham [3] have considered the
problem of simultaneously approximating two continuous functions f and f
by elements of S. If | | • | | denotes the supremum norm, then the problem is
to find an element s* e S, if it exists, for which
max ( I I f - s* I I , I I f - s* I I ) = inf max ( | | f - s | | , | | f - s | | ) .
s e S
The above problem is studied in general normed linear spaces.
CAL-186 March 1973 7 pages
Best Approximation by a Saturation Class of Polynomial Operators
by D. S. Goel, A.S.B. Holland, C. Nasim and B. N. Sahney
In this paper we prove that a method of summation involving Norlund
operators is saturated with the order Pn and related resiolts.
Pn
CAL-191 June 1973 10 pages
Characterisation of an Element of Best 1 -Simultaneous Approximation
by D. S. Goel, A.S.B. Holland, C Nasim, and B. N. Sahney
Let X be a normed linear space and K a subset of X. In CAL-186
we have considered the problem of best simiiltaneous approximation of two
elements xi,X2 e X from the elements of K.
The object of the present paper is to give a characterisation of
an element of best simultaneous approximation under a more general definition
of simultaneous approximation.
CAL-188 May 1973 6 pages
Splines with Non-Negative B-Spline Coefficients
"by C. de Boor and James W. Daniel
We consider the question of the approximation of non-negative
functions by non-negative splines of order k (degree < k) compared with
approximation by that subclass of non-negative splines of order k consisting
of all those whose B-spline coefficients are non-negative; while approximation
by the former gives errors of order h-^, the latter may yield only h^. These
results are related to certain facts about quasi-interpolants.
CNA-65 March 1973 5 pages
The Continuity of Metric Projections as Functions of the Data
by James W. Daniel
Let X be a Hilbert space, and consider the point xq minimizing,
for a given f in X, the distance | |x - f | | as x ranges over a polyhedral set
C defined by a finite niomber of real -valued equalities and inequalities. We
w^sh to see how xq varies when f and C vary. It is easy to see that xq is
Holder continuous with exponent 1/2 in its dependence on these parameters;
this estimate is in general sharp. We show, however, that in certain cases
XQ is actually Lipschitz continuoiis in its dependence on the parameters which
are used to define the set C.
CNA-68 April 1973 9 pages
LINEAR ALGEBRA.
A Fast Method for Solving a Class of Tri-Diagonal Linear Systems
"by Michael A. Malcolm and John Palmer
The solution of linear systems having real, symmetric, diagonally
dominant, tri diagonal coefficient matrices vith constant diagonals is
considered. It is proved that the diagonals of the LU decomposition of
the coefficient matrix rapidly converge to full floating-point precision.
It is also proved that the computed LU decomposition converges when floating-
point arithmetic is used and that the limits of the LU diagonals using
floating point are roughly within machine precision of the limits using real
arithmetic. This fact is exploited to reduce the niimber of floating-point
operations required to solve a linear system from 8n-7 to 5n+2k-3, where k
is much less than n, the order of the matrix. If the elements of the sub-
and super diagonals are 1, then only i+n+2k-3 operations are needed. The
entire LU decomposition takes k words of storage, and considerable savings
in array subscripting are achieved. Upper and lower boxinds on k are obtained
in terms of the ratio of the coefficient matrix diagonal constants and para-
meters of the floating-point number system.
Various generalization of these results are discussed.
STAU-CS-T2-323 November 1972 l6 pages
Iterative Solution of Tridi agonal Systems on Parallel or Vector Computers
by J. F. Traub
We study the iterative solution of a tridiagonal linear system of
size m on a parallel or vector computer. Such systems arise commonly in
the numerical solution of partial differential equations.
The Gauss algorithm takes time linear in m. We introduce a
Parallel Gauss iteration and show it can be used to solve a tridiagonal
system in time independent of m. Furthermore, the error norm is reduced at
each iteration step. A Parallel LP decomposition is also defined.
Parallel Gauss is based on "multiplicative splitting". We intro-
duce parallel algorithms based on "additive splitting". These are Jacobi,
JOR, Parallel Gauss-Seidel, and Parallel SOR.
We compare these parallel algorithms on a model problem and
conclude that JOR, Gauss-Seidel, and SOR are not competitive. Jacobi is best
if there is a "large amount" of diagonal dominance while Parallel Gauss is
best if there is only "limited" diagonal dominance.
CMU No # January 1973 ^2 pages
10
Methods for Modifying Matrix Factorizations
ty P. E. Gill, G. H. Golub, ¥. Murray, and M. A. Saunders
In recent years several algorithms have appeared for modifying
the factors of a matrix following a rank-one change. These methods have
always been given in the context of specific applications and this has
probably inhibited their use over a wider field. In this report several
methods are described for modifying Cholesky factors. Some of these have
been published previously while others appear for the first time. In addition,
a new algorithm is presented for modifying the complete orthogonal factor-
ization of a general matrix, from which the conventional QR factors are
obtained as a special case. A uniform notation has been used and emphasis
has been placed on illustrating the similarity between different methods.
STAN-CS-72-322 November 1972
Modifying Pivot Elements in Gaussian Elimination
by G. ¥. Stewart
The rounding-error analysis of Gaussian elimination shows that the
method is stable only when the elements of the matrix do not grow excessively
in the course of the reduction. Usually such growth is prevented by inter-
changing rows and columns of the matrix so that the pivot element is
acceptably large. In this paper the alternative of simply altering the pivot
element is examined. The alteration, which amounts to a rank one modification
of the matrix, is undone at a later stage by means of the well-known formula
for the inverse of a modified matrix. The technique should prove useful in
applications in which the pivoting strategy has been fixed, say to preserve
Spars eness in the reduction.
CMU No # March 1973
The SAC-1 Polynomial Linear Algebra System
by G. E. Collins and M. T. McClellan
This system is the tenth in a series of subsystems comprising
the SAC-1 System for Symbolic and Algebraic Calculation. The present sub-
system consists of programs implementing modular algorithms for linear
equations solution, matrix inversion, determinant calculation, null space
basis generation, and matrix miiltipli cation, all for matrices with integer
or polynomial entries. For each program in the system is given a fimctional
specification, an algorithm description, an analytical computing time, and a
Fortran program listing. Empirically observed computing times for some of
the key programs are presented. Also, a test program is supplied as an aid
in implementing the system and to illustrate its use.
WIS-15^ April 1972 Program Incl .
11
A Determinant Theorem with Application to Parallel Algorithms
"by Don Heller
We state and pix)ve an expansion theorem for the determinant of any
Hessenherg matrix. The expansion is expressed as a vector-matrix-vector
product which can he efficiently evaluated on a parallel machine. We con-
sider the computation of the first N terms of a sequence defined by a general
linear recurrence. On a sequential machine this problem is 0(N'^), with N
processors it is 0(N), and with 0(N ) processors it is O(log^N) using our
expansion. Other applications include locating roots of analytic functions
and proving doubling formulas for linear reciorrences with constant coefficients.
CMU No # March 1973
On a Characterization of the Best I Scaling of a Matrix
by G. H. Golub and J. M. Varah
This paper is concerned with best two-sided scaling of a general
square matrix, and in particular with a certain characterization of that best
scaling: namely that the first and last singular vectors (on left and right)
of the scaled matrix have components of equal modulus. Necessity, sufficiency,
and its relation with other characterizations are discussed. Then the problem
of best scaling for rectangular matrices is introduced and a conjecture made
regarding a possible best scaling. The conjectiore is verified for some
special cases.
STAN-CS-T2-319 October 1972
The LU-Factorization of Totally Positive Matrices
by Colin W. Cryer
An n X n real matrix A is an STP (strictly totally positive) matrix
if all its minors are strictly positive. An n x n real triangular matrix A
is a ASTP matrix if all its non-trivial minors are strictly positive. It is
proved that A is an STP matrix iff A = LU where L is a lower triangular matrix,
U is an upper triangiolar matrix, and both L and U are ASTP matrices. Several
related results are proved. These results lead to simple proofs of many of
the determinantal properties of STP matrices.
WIS-131 December 1971 23 pages
Convergent Generalized Monotone Splitting of Matrices
by 0. L. Mangasarian
Let B and T be n x n real matrices and r an n-vector and consider
the system u = BTu + r. A new sufficient condition is given for the existence
12
of a solution and convergence of a monotone process to a solution. The mono-
tone process is a generalization of the Collatz-Schroder procedure.
WIS-105
December 1970
11 pages
Monotone Splitting of Matrices
hy 0.- L. Mangasarian
Given the iterative scheme x = BT x + r where B, T are fixed
n X n real matrices, r a fixed real n-vector and x a real n-vector we
investigate the convergence and monotonicity of schemes of the type
V
i+1
w
i+1
•^
B
0
0
B
-\
— • — <
r ~]
^11
-^12
1
V
+
r
^21
S22_
i
w
r
where S. , are n x n real matrices related to T. The n-vector iterates v ,w
bracket in a certain sense solutions x of x = BTx+r. We also give necessary
and sufficient conditions for the monotonicity of the original iterative
scheme itself x = BTx + r. This leads to monotonicity results for
classicial Iterative schemes such as the Jacobi, Gauss-Seidel and successive
overrelaxation methods.
WIS-106
December 1970
19 pages
Zeros of X-Matrices, A Survey
by Jon Rokne
We present a survey of results for computing zeros of X-matrices
and matrix polynomials. Most of the results are not new, except for the
results in section 3. The results that are collected here do not seem to
"be known to a large audience, however.
CAL-181
March 1973
17 pages
13
Characterizations of Real Matrices of Monotone Kind
by 0. L. Mangasarian
An m by n real matrix A is said to be of monotone kind if
(l) Ax ^ 0 ■ ■> x^O .
Collatz treats square matrices of monotone kind and shows that for such
matrices the above implication is equivalent to: A exists and A~l >_ 0.
It is the piorpose of this note to generalize Collatz 's result to
rectangular matrices, and also to show that, for the general rectangular
case, a matrix of monotone kind can be further characterized as one for
which the convex conical hull of the rows contains the nonnegative orthant.
WIS-15 February 1968 8 pages
A Linear Programming Implementation
by Jonathan Lermit
This document discusses the implementation of a recently developed
version of the simplex method for linear programming using Cholesky
factorization (where the basis is expressed as a product of a lower tri-
angular and an orthogonal matrix) rather than the more usual product form of
the inverse. Storage schemes for the resulting lower triangular matrix
suitable for an array processor (the orthogonal matrix is not retained) and
necessaiy adaptations to the algorithm when the constraint matrix is
expressed as a linear operator are also discussed.
CAC No. h6 May 7, 1973 30 pages
Fehlerabs chat z long reeller Eigenwerte und Eigenvektoren von Matrizen
by R. Krawczyk
Reelle einfache Eigenwerte und die dazugehorigen reellen Eigen-
vektoren einer quadratischen Matrix werden mit Hilfe einer Intervallarithmetik
\anter Berucksichtigung aller Run dungs fehler abgeschatzt. Fur diese Fehler-
abschatzTing benbtigt man als Daten die Nah e rungs we rte eines Eigenwertes und
des entsprechenden Eigenvektors , welche man sich nach irgendeinem numerischen
Verfahren verschafft hat. Als ergebnis erhalt man ein Intervall und einen
Intervallvektor, welche den exakten Eigenwert bzw. den exakten Eigenvektor,
enthalten. Gleichzeitig ergibt sich daraus auch die Existenz eines reellen
Eigenwertes .
KARL 68/5 March 1968 15 pages
Verbesserung von Schranken fur Eigenwerte und Eigenvektoren von Matrizen
by R. Krawczyk
Es wird ein Verfahren beschrieben, wie man die Fehlerschranken
eines Eigenwertes und des zugeordneten Eigenvektors einer Matrix mit Hilfe
lU
elner Intervallarithmetik verbessern kann. Dabei wird dem komplexen Eigen-
wertproblem n-ter Ordnung ein reelles nichtlineares Gleichungssystem der
OrdnTong n+2 zugeordnet, so dass nur ein geringer Mehraufwand an Rechenarbeit
im Vergleich zur Einschliessung reeller Eigenwerte erforderlich ist. Die
Konvergenz der Iterationsfolge hangt im wesentllchen von den Anfangs-Schranken
des Eigenwertes imd nicht von den Schranken des Eigenvektors ab.
KARL 69/5 April I969 8 pages
Einschrankung von Eigenwerten reellsymmetrischer Matrizen
by Oswald Kreg
Im folgenden wird ein Algorithmus angegeben, der ausgehend von
einem Einschliegungssatz von Collatz die Einschliegung von Eigenwerten einer
reellsymmetrischen Matrix A leistet.
Ntunerische Schwierigkeiten , die auftreten konnen, wenn die vorge-
gebene Waherung z fur einen Eigenvektor Komponenten enthalt , die Null oder
sehr klein sind, werden durch eine Ahnlichkeitstransformation beseitigt.
KARL 70/10 August 19T0 2U pages
NONLINEAR EQUATIONS
The Convergence of Multipoint Iterations to Multiple Zeros
"by G. W. Stewart
This paper fills a gap in the theory of multipoint iteration func-
tion exemplified by the question: how does the secant method converge to a
mioltiple zero. A general theory of the linear convergence of multipoint
iterations is developed, and it is shown that two broad classes of iterative
methods fit this theory- The results of numerical investigations based on
the theoiy suggest that Muller's method applied to a multiple zero will
inevitably produce complex iterates.
CMU No.# Januaiy 1973
Some Iterations for Factoring a Polynomial II. A Generalization of the
Secant Method
by G. ¥. Stewart
This paper describes an iterative method for factoring a polynomial
that bears the same relation to Bairstow's method as the secant method in a
15
single variable bears to Newton's method. Like the secant method, the
generalized secant method requires only one function evaluation for each
iteration, and like the secant method it converges to a simple factor with
order (l+/5")/2.
CMU No. # February 1973
A Quadratically Convergent Lagrangian Algorithm for Nonlinear Constraints
by J. B. Rosen and J. L. Kreuser
An algorithm for the nonlinearly constrained optimization problem
is presented. The algorithm consists of a sequence of major iterations
generated by linearizing each nonlinear constraint about the current point,
and adding to the objective function a linear penalty for each nonlinear
constraint. The resulting fimction is essentially the Lagrangian. A
Kantorovich-type theorem is given, showing quadratic convergence in terms of
major iterations. This theorem insures quadratic convergence if the starting
point (or any subsequent point) satisfies a condition which can be tested
using computable bounds on the objective and constraint functions.
WIS-166 November 1972 33 pages
QUADRATURE
Computing Integrals Involving B-Splines by Means of Specialized Gaussian
Quadrature R-uLes
by J. L. Phillips and R. J. Hanson
In this paper a technique and algorithm are given to efficiently
compute integrals involving products of splines and general functions.
Using the B-Splines as weighting functions, we show how to gener-
ate Gaussian quadrature rules for approximating the integrals.
Tables of abscissas and weights, together with procedures for
their use, are given for the important special case in which the interval
breakpoints of the B-Splines are equally spaced.
WSU-73001 1973
16
On Weight Functions for Chebyshev Quadrature
by K. Salkauskas
The Chebyshev quadrature problem is to determine real k and real,
distinct t^ ,...,t in [0, l] such that
l,n n,n
(1.1) / w(t)f(t)dt = k I f(t. ^), V f e P^, n = 1,2,... .
0 1=1 '
1
I
0
Here w is a given weight function that is normally taken to be non-negative
on [0, l]. It is well known that if w = 1, the problem cajinot be solved with
real {t }^ when n = 8 or n > 9. On the other hand, for (l.l) transfomied
l,n 1=1
to the Interval [-1, l], Ullman [5] has found a one-parameter family of weight
functions of the form
f^\ 1 1 + 2at 111
w(t) = 2"Y72 ' 2 ' 1^' -h •>
with the property that the problem has solutions for all n. When a = 0,
one recovers the classical Chebyshev weight function, for which the Gauss
and Chebyshev quadrature formulas coincide.
The purpose of this paper is to show that weight functions for
which the Chebyshev problem is solvable are scarce in a probabilistic sense.
CAL-1T5 January 1973 9 pages
IT
ORDINARY DIFFERENTIAL EQUATIONS
Necessary and Sufficient Criteria for A-Statility of Linear Mijlti-Step
Integration Formulae
by Colin W. Cryer
k . k
Let p(^) = 2 o' . S and a(5) = I 3 . C "be the characteristic
j=0 ^ j=0 J
polynomials of a linear multi-step method for the n-umerical solution of an
initial value problem for ordinary differential equations. It is shown
that the method is A-stable iff all the following conditions hold:
(i) & ^ 0; (il) Re[p(C)a(?)J >_ 0 for |c| =1; (iii) P and a satisfy the
root condition, that is, their zeros lie inside or on the unit circle and
any zeros on the unit circle are simple. For the case when p and a have
integer coefficients, a program has been developed which uses the SAC-1
system (system for Symbolic and Algebraic Calculations, version (l))
determine whether the multi-step method (p,a) is A-stable.
WIS-IUT March 1972 36 pages
18
A Proof of the Instability of Backward-Difference Multistep Methods for
the Numerical Integration of Ordinary Differential Equations
by Colin ¥. Cryer
It is shown that the backward difference m\iltistep method
I i V"^ y = hf
m=l ^ P P
for the numerical integration of y'(x) = f(x,y) is stable in the sense of
Dahlquist iff 1 <_ q <_ 6.
WIS-llT May 1971 52 pages
A Note on the Non-Exist ence of Mult lvalue
A-Stable Methods of Order Greater than Two
by C. ¥. Gear
It is shown that the Dahlquist result limiting the order of
A-stable multistep methods also applies to multivalue methods.
UIUC-R-73-569 March 1973 7 pages
The Effect of Variable Mesh Size on the Stability of Multistep Methods
by C. W. Gear and K. W. Tu
The effects of two different techniques for implementing variable
mesh sizes in multistep formiiLas are investigated. It is proved that one
is more stable than the other for some cases, but that both are stable when
the step changes are small. The practical implications of these results
are discussed.
UIUC-R- 73-570 April 1973 35 pages
Stability and Convergence of Variable Order Multistep Methods
by C. W. Gear and D. S. Watanabe
The variable step Adam's method is shown to be stable for any
order changing scheme. The Nordsieck form of Adam's method, however, is
shown to be stable only if the step size and order are fixed for p steps
following a change to an r-step method, where p is r or r+1 depending on
the algorithm used to interpolate the necessary high derivatives. Finally,
general consistent and strongly stable multistep and multivalue methods are
shown to be stable if the method is fixed for a certain number of steps
following each method change and step size changes are small. This number
is independent of the differential equation and the step sizes.
UIUC-R-73-571 May 1973 31 pages
19
Solutions of a Differential Equation Arising in Chemical Reactor Processes
"by Seymour V. Parter
Consider the boundaiy value problem y" + — y' + Bf(y) = 0,
y'(0) = 0, y( x) = T where B >_ 0, t >_ 0. The function f(y) satisfies certain
properties which generalize the properties of '^^(j) = exp (- -i — r) . We are
concerned with the number of solutions in various regions of the t, 3 plane.
WIS-162 January 1973 5^ pages
Zxir numerischen Losimg von gewohnlichen Differentialgleichungen zweiter Ordnung
"by Manfred Heidt
In dieser Arbeit wird ein Verfahren zur numerischen Berechnving
einer Faherungslosving zusammen mit einer Fehlerabschatzung fiir das
An f an gswert problem
y"(x) = f(x,y(x),y'(x)), y(x^) = y^ , y'(x^) = y '^
einer gewohnlichen expliziten Differentialgleichung zweiter Ordnung
angegeben. Es handelt sich hierbei um ein Einschritt verfahren. Die
Differentialgleichung wird bei jedem Integrationsschritt lokal linearisiert ,
die linearisierte Differentialgleichung analytisch gelost , diese Losung mit
einem Storansatz abgespalten und nur noch eine relativ "harmlose" Rest-
differentialgleich-ung numerisch gelost. Mit Hilfe einer Defektabschatzung
werden anschliessend Fehlerschranken dieser Naherung berechnet.
Das Verfahren liefert fur eine KLasse linearer Differential-
gleichungen die exakte Losung. Das Phanomen der numerischen Instabilitat ,
wie es bei den meisten Faheriingsverfahren selbst bei stabilen Anfangswert-
problemen zu beobachten ist, tritt hierbei kaum mehr auf.
KARL 71/6 1971 122 pages
Investigation of One-Step Methods for Integro -Differential Equations
t»y Geneva G. Belford and Surender Kumar Kenue
One-step methods for solving integro-differential equations are
studied from the point of view of desiring that the method give good
accuracy when the true solution asymptotically goes to zero. A test equation
is proposed and absolute stability is investigated.
CAC No. 75 May 1973 11 pages
20
High Order Finite Difference Solution of Differential Equations
by Victor Pereyra
These seminar notes give a detailed treatment of finite difference
approximations to smooth nonlinear tvo-point "boiindary value problems for
second order differential equations. Consistency, stability, convergence,
and asymptotic expansions are discussed. Most results are stated in such a
way as to indicate extensions to more general problems. Successive extrapolations
and deferred corrections are described and their implementations are explored
thoroughly. A very general deferred correction generator is developed and it
is employed in the implementation of a variable order, variable (uniform) step
method. Complete FORTRAN programs and extensive numerical experiments and
comparisons are included together with a set of U8 references.
STAN-CS-T3-3^8 April 1973 86 pages Program Incl.
PARTIAL DIFFERENTIAL EQUATIONS
A Conjugate Gradient Approach to Nonlinear Elliptic Boundary Value Problems
in Irreg-ular Regions
by Richard Bart els and James W. Daniel
A version of the conjugate gradient method is proposed for solving
'discrete approximations to nonlinear elliptic boundary value problems over
irregular regions. The convergence rate is usually independent of the
discretization, but each step requires the solution of a Poisson equation on
the region; thus a fast Poisson solver yields a fast method for the general
problem. Details are given for the standard 5-point approximation to the
differential equation, with the Poisson equations being solved by the
Buneman algorithm after some preprocessing; numerical examples are given.
CNA-63
Niomerical Studies of Discrete Vibrating Strings
by A. B. Schubert and D. Greenspan
Discrete string vibrations are studied by means of a new two
dimensional model. Linear and nonlinear wave motions are constructed with
equal ease. Conditions and problem in which horizontal motion is
particularly noticeable are emphasized. A large variety of computer examples
are given.
WIS-158 November 1972 76 pages
21
FIMC TIONAL EQUATIONS
The Nimierical Solution of Boundary Value Problems for Second Order Functional
Differential Equations by Finite Differences
by Colin W. Cryer
In the present paper we consider numerical methods for computing
the solution of the boundaiy value problem
x(t) = g(t,x(t)) + (Fx)(t), 0 < t < 1,
x(0) = x(l) = 0,
where, F:C[0, l] ^ C[0, l], and g:R ^ R .
WIS-127 June 1971 57 pages Program Incl.
OPTIMIZATION
Least Squares Computations with Two Algorithms for the Two-Multiply,
Two-Add Givens Rotation
by R. J. Hanson
Two numerically stable algorithms for the implementation of the
two-multiply, two-add Givens transformation are discussed. An application
of the use of these algorithms is given for the problem of accumulating and
deleting rows of data from a least squares problem in a stable manner.
The construction of either transformation requires essentially
the same amount of work. The first method (which is not due to the author)
requires no square roots but may require rescaling to avoid underflow and
overflow. The second method requires one square root per transformation
but will need rescaling less than half as often as the first method.
WSU-73002 1973
Second and Higher Order Duality in Nonlinear Programming
by 0. L. Mangasarian
A d-ual problem associated with a primal nonlinear programming
problem is presented that involves second derivatives of the functions con-
stituting the primal problem. Duality results are derived for this pair
of problems. More general dual problems are also presented, and duality
results for these problems are also given.
WIS-159 October 1972 20 pages
22
Einschliepung des Minimalpunktes einer streng konvexen F-unktion auf elnem
n- dimensional en Quader
by Rainer Dussel
Gegeben sei eine Funktion <^: R -> R. Sie sei streng konvex in R
und es gelte (f)eC2(R^). Weiterhin sei ein n-dimensionaler achsenparalleler
Quader QOR^ gegeben durch Q := ( [a_ ,sr ], . . . , [a ,a" ]).
Gesucht ist derjenige Punkt xeQ, fur den gilt
(j)(x) = Min (t)(x) .
xeQ
Man nennt xeQ den Minimalpunkt von (f) bezuglich Q. Existenz und
Eindeutigkeit eines solchen Minimalpunktes sind unter den getroffenen
Voraussetzimgen trivial (siehe dazu Satz 3).
Anzugeben ist ein Verfahren zur numerischen Bestimmung von x und
damit von (j)(x). Da ein solches Verfahren in der Praxis nach endlich vielen
Schritten abgebrochen verden mu3 und da i. a. die Komponenten von x und die
Zaiil ^(x) in einem Computer nicht exakt darstellbar sind, stellt sich
■weiterhin die Frage nach Fehlerschranken fur eine mit diesem Verfahren
bestimmte Naheriing x zu x. Man kann damit das oben genannte Problem
umformulieren zu:
Gesucht ist ein numerischer Algorithmus zur Angabe eines "mog-
lichst kleinen" Quaders
[x] e I^(R) mit [x]CQ und xe:[x]
und eines "moglichst kleinen" Intervalls
$el(R) mit (|)(x)e$ .
KARL 72/2 July 1972 69 pages
Stability of the Solution of Definite Quadratic Programs
by James W. Daniel
This paper studies how the solution of the problem of minimizing
Q(x) = jx^Kx - k^x subject to Gx £ g and Dx = d behaves when K, k, G,^g, D,
and d are perturbed, say by terms~of size e, assioming that K is positive
definite. It is shown that in general the solution moves by roughly e if
G, g, D, and d are not perturbed; when G, g, D, and d are in fact perturbed,
23
much stronger hypotheses allow one to show that the solution moves "by
roughly e. Many of these results can be extended to more general, non-
quadratic, functionals.
CNA-58 September 1972
The Quadratic Assignment Problem
by George B. Purdy
In this report we discuss some seemingly reasonable approaches to
the quadratic assignment problem, and we give some evidence from automata
theoiy that the problem is insoluble.
CAC No. 71 February 1973 1^+ pages
Die Anwendung der Methode "Branch and Bound" auf ein verallgemeinertes
Knaps ackpr obi em
by Rudolf Krawczyk
Fur ein verallgemeinertes Knaps ackproblem mit gegebener Zielfunktion
und Restriktionen, dessen Lbsung durch boolesche Variable dargestellt werden
kann, wird eine Losungsmethode nach dem "Branch and Bound" — Prinzip angegeben.
Diese Methode wird mit Hilfe eines LSsungsbaumes veranschaulicht und an einem
Beispiel ausprobiert. Augerdem wird ein Algorithmus zu diesem Verfahren be-
schrieben und in der algorithmischen Sprache ALGOL programmiert .
KARL 71/1 January 1971 21 pages Program Incl.
21+
ROOT FINDING
Fehlerschranken zu Naherixngswerten von Polynomwurzeln
by Karl Nickel
Gegeben seien ein Polynom n-ten Grades und n komplexe Nahe-
runsverte zu den (unbekannten) Polynomwurzeln. Es vlrd ein Algorithmus
beschrieben, der zu jedem Naherungsvert' eine Fehlerabschatzung liefert.
Das Verfahren ist "konvergent" und besitzt eine gevisse (schwache)
Optimalitat. Es benbtigt keinerlei zus'atzliche Informationen uber die
exakten Nullstellen und versagt nie, auch night im Falle von mehrfachen
Nullstellen oder von Wurzelhaufen. Der Algorithmus wird durch ein Triplex-
ALGOL 60-Programm verwirklicht , vomit auch noch die unvermeidlichen
Runkungsfehler berucksichtigt "werden.
KARL 69/6 June 1969 22 pages Program Incl.
Abbruchkriterien und Numerishche Konvergenz
by K. Nickel and K. Ritter
Es sei X -> X eine von einem Verfahren erzeugte Folge zur
Approximation der reellen Zahl x. Es sei x (L) ein mit einer L-ziffrigen
Maschine gewonnener Naherungsvert zu x mit lim x (L) = x . Es wird em
" n , n n
L-x»
Abbrechkriterium N(L) angegeben derart, da3 es geniigt, bei fester Ziffer-
nanzahl L allein die Werte x (Lj, x-^ (L) , . . . ,31^/^ v (L) zu berechnen und
da6 unter sehr schvachen Voraussetzungen
L->o°
ist, d.h. da3 x^^/_s(L) "numerisch konvergiert ".
KARL 70/6 May 1970 11 pages
Abbrechkirterium fur Iterationsverfahren
tiy Rudolf Kravczyk
Die unendliche Folge x des allgemeinen Iterationsverfahrens zur
Losung einer Operatorgleichung x = Tx in einem metrischen Raum vird haufig
durch eine endliche Folge x approximiert, velche von der benutzten Rechen-
anlage abhangt. Es vird ein Abbrechkriterium angegeben, velches die
"numerische Konvergenz" im Sinne von [3] garantiert.
Dieses Abbrechkriteritim wird auf das NEWTONsche Verfahren zur
Los-ung einer Gleichung im Reellen und auf eine Lineare Integral gleichung
angevandt .
KARL 70/12 September 1970 11 pages
25
GRAPH ALGORITHMS
Two Upper Bounds for the Weighted Path Length of Binary Trees
"by Jean Louis Pradels
Rooted binary trees with weighted nodes are structures encountered
in many areas, such as coding theory, searching and sorting, information
storage and retrieval. The path length is a meaningful quantity which gives
indication about the expected time of a search or the length of a code for
example. In this paper, two sharp boimds for the total path length of
general weighted node trees are derived.
UIUC-R- 73-565 January 1973 1^ pages
An Efficient Implementation of Edmonds ' Maximum Matching Algorithm
by Harold Gabow
A matching in a graph is a collection of edges, no two of which
share a vertex. A maximum matching contains the greatest number of edges
possible. This paper presents an efficient implementation of Edmonds'
algorithm for finding maximum matchings. The computation time is proportional
to v3, where V is the number of vertices; previous algorithms have computation
time proportional to V^. The implementation avoids Edmonds' blossom reduction
by using pointers to encode the structure of alternating paths.
STAN-CS-72-328 June 1972 68 pages Program Incl.
Finding the Cliques of a Graph
by George B. Purdy
Auguston and Minker [l] presented a version of the Bierstone
algorithm for finding the set of cliques of a finite undirected graph.
(A clique is a maximal complete subgraph). However they gave no proof that
their algorithm worked, and indeed Mulligan and Cornell [2] pointed out that
it was wrong. Mulligan in [3] described his PL/I implementation of their
modified version of the algorithm, but it is referred to there as a
heuristic. For our algorithm we include a proof that it works.
This algorithm is clearly well suited for use on an array pro-
cessor, or an array of processors, which the other algorithms are not.
CAC m No. 5 December 1972 8 pages Program Inc.
26
MISCELLANEOUS
A Universal Random Number Generator
"by Michael A. Malcolm and Cleve B. Moler
A subroutine for generating uniformly-distrituted floating-point
numbers in the interval [O, l) is presented in ANSI standard Fortran.
The subroutine , URAND, is designed to be relatively machine independent.
URAND has undergone minimal testing on various machines and is thought to
work properly on any machine having binary integer number representation,
integer multiplication modulo m and integer addition either modulo m
or yielding at least £og (m) significant bits, where m is some integral
power of 2 .
Upon the first call of UMND, the value of m is automatically
determined and appropriate constants for a linear congruential generator are
computed following the suggestions of D. E. Knuth, Volume 2. URAND is
guaranteed to have a full-length cycle. Readers are invited to apply their
favorite statistical tests to URAND, using any binary machine, and report
the results to the authors.
STAN-CS-T3-33^ January 1973 Program Incl.
Computation of the Stationary Distribution of an Infinite Markov Matrix
by G. Golub and E. Seneta
An algorithm is presented for computing the -unique stationary
distribution of an infinite stochastic matrix possessing at least one
coliimn whose elements are bounded away from zero. Elementwise convergence
rate is discussed by means of two examples.
STAN-CS-73-335 Januaiy 1973
Calc\iIation of GFSR Pseudorandom Number Binary Starting Matrix
by W. H. Payne
The generalized feedback shift register pseudorandom niimber
algorithm produces the same floating-point sequence of pseudorandom numbers
on any computer. The algorithm requires a binary initialization matrix.
A matrix, given both in octal and hexadecimal, for primitive polynomial,
modulo 2, x98 + x27 + i is listed.
UIUC-R-73-567 March 1973 1^+ pages Program Incl.
27
The SAC-1 Modular Arithmetic System
by G. E. Collins, L. E. Heindel, E. Horowitz, M. T. McClellan and D. R. Musser
This is a reprinting of the original report of June I969, with
correction of a few minor errors. The SAC-1 Modular Arithmetic System is
the fifth of the ten SAC-1 subsystems which are now available. It provides
subprograms for the arithmetic operations in a prime finite field GF(p),
for any single-precision prime p, and for various operations on polynomials
in several variables with coefficients in GF(p). Besides the arithmetic
operations on such polynomials there are included subprograms for the
Chinese remainder theorem, evaluation and interpolation. For invariate
polynomials, subprograms are included for greatest common divisor calculation
and Berlekamp's factorization algorithm.
¥IS-l65 November 1972 50 pages Program Incl.
Gleichungen in halbgeordneten Raumen
"by R. Krawczyk
Im ersten Teil dieser Arbeit wird eine Operatorgleichung Tx = 9
in eine Operatorgleichung x = Sx transformiert . Darauf werden Fixpunksatze
angewendet und Fehlerabschatzungen fiir eine Losung durchgefuhrt . Das
allgemeine Iterationsverfahren entspricht bei variablem S dem WEWTONschen
Verfahren in normierten Raumen, ohne da3 eine Norm benotigt wird. Anstelle
der Frechet-Ableitung des Operators T tritt eine allgemeine Lips chit zbeding\mg
mit linearen Operatoren. Im zweiten Teil werden die abstrakten SStze des
ersten Teils auf einfache Beispiele: Gleichungen, nichtlineare
Gleichungssysteme, algebraische Eigenwertprobleme angewendet.
KARL TO/3 April 1970 16 pages
Das Prae-Euler'sche Limit ierungs verfahren
by Karl Nickel
Es sei {a } eine vollmonoton fallende Nullfolge. Es wird ein
n
Limit ierungs verfahren zur Kbnvergenzverbesserimg der alternierenden Reihe
I (-1) a angegeben und durch ein Triplex-ALGOL 60-Programm realisiert.
v=o
Es werden apriori-Fehlerschranken angegeben, die Stabilitat wird untersucht,
die Rundungsfehler fvor eine Klasse "idealer" Komputer werden abgeschatzt \md
es wird gezeigt, dass das Verfahren in dieser Klasse sogar "n-umerisch
konvergiert" . Beispiele zeigen die praktische Brauchbarkeit der Methode.
KARL 70/7 July 1970 ill pages Program Incl.
28
KEY TO REPORT SOURCES
ANL - Argonne National Laboratory
Argonne, Illinois 60^39
BTL - Bell Telephone Laboratories, Inc.
Murray Hill, New Jersey 079 71
CAC
Center for Advanced Computation
University of Illinois, Urbana, Illinois 618OI
CAL - Department of Mathematics
Statistics and Computing Science
University of Calgary, Calgary
Alberta, Canada
CMU
CNA
Carnegie-Mellon University
Computer Science Department
Pittsbiorgh, Pennsylvania 15213
Center for Numerical Analysis
University of Texas, Austin, Texas 78712
KARL - Inst i tut Fiir Informatik
Universitat Karlsruhe
Englerstrasse 2, Postfach 638O
D 75 Karlsriohe 1, Germany
MAC
MRC
Massachusetts Institute of Technology
Project MAC
Cambridge, Massachusetts 02139
Mathematics Research Center
University of Wisconsin, Madison, Wisconsin 53706
PRAK - Institut fur Praktische Mathematik
Universitat Karlsruhe
Englerstrasse 2, Postfach 638O
D 75 Karlsruhe 1, Germany
STAN - Computer Science Department
Stanford University, Stanford, California 9^305
TOR
Department of Computer Science
University of Toronto, Ontario, Canada
UAE - Department of Computing Science
University of Alberta, Edmonton, Alberta, Canada
UBC
Department of Computer Science
University of British Coliombia, Vancouver, B. C, Canada
29
UMINF -
UIUC -
WIS
Department of Information Processing
University of Umea, Umea, Sweden
Department of Computer Science
University of Illinois, Urbana, Illinois
Computer Sciences Department
The University of Wisconsin
1210 West Dayton Street
Madison, Wisconsin 53T06
61801
WSU - Computer Science Department
Washington State University
Pullman, Washington 99l63
YORK - T. J. Watson Research Center
Yorktown Heights, New York IO598
30
UNCLASSIFIED
SECURITY CL ASSinCATIOhi OF THIS PAGE (i*'hrn Data
Fnfer^d)
REPORT DOCUMENTATION PAGE
RliAD INSTRUCTIONS
BEFORE COMPLETING FORM
1. REPORT NUMQER
CAC Document No, 90
2. GOVT ACCESSION NO.
3. RECIPIENT'S CATALOG NUMBER
4. TITLE (end Subtllle)
Computational Mathematics Abstracts
5. TYPE OF REPORT & PERIOD COVERED
Bibliographical Abstracts
6. PERFORMING ORG. REPORT NUMBER
7. AUTHORCs;
Edited "by: Geneva Belford, Jonathan Lermit,
George Purdy, and Ahmed Sameh
8. CONTRACT OR GRANT NUMBER(-»;
DAHCOJ+-72-C-OOOI
9. PERFORMING ORGANIZATION NAME AND ADDRESS
Center for Advanced Computation
University of Illinois at Urhana-Champaign
Urhana, Illinois 618OI
10. PROGRAM ELEMENT. PROJECT, TASK
AREA 4 WORK UNIT NUMBERS
AEPA Order No. l899
»l. CONTROLLING OFFICE NAME AND ADDRESS
U.S. Army Research Office-Durham
Duke Station, Durham, North Carolina
12. REPORT DATE
October 1973
13. NUMBER OF PAGES
32
U. MONITORING AGENCY NAME A ADDRESSf// dlllerent from Controlling Oflice)
15. SECURITY CLASS, (oi thia report)
UNCLASSIFIED
15«. DECLASSIFICATION/ DOWNGRADING
SCHEDULE
16. DISTRIBUTION ST ATEM EN T Co/ <h<s Repor (;
Copies may be requested from the i\[ational Technical Information Service,
Springfield, Virginia 22151
17. DISTRIBUTION STATEMENT (ol the abstract entered In Block 20, II dlllerent Irom Report)
t8. SUPPLEMENTARY NOTES
19. KEY WORDS (Continue on reverse aide II necessary and Identlly by block number)
Numerical Analysis
Graph Theory
Mathematical Programming
20. ABSTRACT (Continue on reverse side II necessary and Idenlily by block number)
NONE
DD 1 JAN 73 1473 EDITION OF 1 NOV 65 IS OBSOLETE
UNCLASSIFIED
SECURITY CLASSIFICATION OF THIS PAGE fWTien Data Entered)
m