scholarly journals A Backward Stable Algorithm for Computing the CS Decomposition via the Polar Decomposition

2018 ◽  
Vol 39 (3) ◽  
pp. 1448-1469 ◽  
Author(s):  
Evan S. Gawlik ◽  
Yuji Nakatsukasa ◽  
Brian D. Sutton
2020 ◽  
Vol 41 (4) ◽  
pp. 709-713
Author(s):  
E. T. Shavgulidze ◽  
N. E. Shavgulidze

2021 ◽  
Vol 15 (3) ◽  
Author(s):  
Domenico P. L. Castrigiano

AbstractSome basics of a theory of unbounded Wiener–Hopf operators (WH) are developed. The alternative is shown that the domain of a WH is either zero or dense. The symbols for non-trivial WH are determined explicitly by an integrability property. WH are characterized by shift invariance. We study in detail WH with rational symbols showing that they are densely defined, closed and have finite dimensional kernels and deficiency spaces. The latter spaces as well as the domains, ranges, spectral and Fredholm points are explicitly determined. Another topic concerns semibounded WH. There is a canonical representation of a semibounded WH using a product of a closable operator and its adjoint. The Friedrichs extension is obtained replacing the operator by its closure. The polar decomposition gives rise to a Hilbert space isomorphism relating a semibounded WH to a singular integral operator of Hilbert transformation type. This remarkable relationship, which allows to transfer results and methods reciprocally, is new also in the thoroughly studied case of bounded WH.


2013 ◽  
Vol 299 ◽  
pp. 130-134
Author(s):  
Li Wei ◽  
Da Zhi Deng

In recent years,china input in the construction of the network management is constantly increasing;information technology has improved continuously,but,making a variety of network security incidents occur frequently,due to the vulnerability of the computer network system inherent,a direct impact on national security and social and political stability. Because of the popularity of computers and large-scale development of the Internet, network security has been increasing as the theme. Reasonable safeguards against violations of resources; regular Internet user behavior and so on has been the public's expectations of future Internet. This paper described a stable method of getting telnet user’s account in development of network management based on telnet protocol.


Sign in / Sign up

Export Citation Format

Share Document