![]() Adamsky, Florian ![]() ![]() ![]() in 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) (2018, June) Detailed reference viewed: 287 (14 UL)![]() ; Bordas, Stéphane ![]() in International Journal for Numerical Methods in Engineering (2008), 76(8), 1123-1138 This contribution presents an extended global derivative recovery for enriched finite element methods (FEMs), such as the extended FEM along with an associated error indicator. Owing to its simplicity ... [more ▼] This contribution presents an extended global derivative recovery for enriched finite element methods (FEMs), such as the extended FEM along with an associated error indicator. Owing to its simplicity, the proposed scheme is ideally suited to industrial applications. The procedure is based on global minimization of the L2 norm of the difference between the raw strain field (C-1) and the recovered (C0) strain field. The methodology engineered in this paper extends the ideas of Oden and Brauchli (Int. J. Numer. Meth. Engng 1971; 3) and Hinton and Campbell (Int. J. Numer. Meth. Engng 1974; 8) by enriching the approximation used for the construction of the recovered derivatives (strains) with the gradients of the functions employed to enrich the approximation employed for the primal unknown (displacements). We show linear elastic fracture mechanics examples, both in simple two-dimensional settings, and for a three-dimensional structure. Numerically, we show that the effectivity index of the proposed indicator converges to unity upon mesh refinement. Consequently, the approximate error converges to the exact error, indicating that the error indicator is valid. Additionally, the numerical examples suggest a novel adaptive strategy for enriched approximations in which the dimensions of the enrichment zone are first increased, before standard h- and p-adaptivities are applied; we suggest to coin this methodology e-adaptivity. Copyright © 2008 John Wiley & Sons, Ltd. [less ▲] Detailed reference viewed: 159 (0 UL)![]() Houssemand, Claude ![]() in Ben Mrad, Fathi; Distler, Frédéric; Méloni, Jean-Paul (Eds.) Innovations et interventions sociales: initiatives, adaptations et créations (2020) Detailed reference viewed: 30 (3 UL)![]() Becker, Katrin ![]() Presentation (2017, December 01) Detailed reference viewed: 101 (7 UL)![]() Becker, Katrin ![]() in Geisenhanslüke, Achim (Ed.) Buchstäblichkeit Theorie, Geschichte, Übersetzung (2019) Detailed reference viewed: 81 (1 UL)![]() Dittrich, Klaus ![]() in French History (2008), 22(3), 374-375 Detailed reference viewed: 162 (1 UL)![]() Osthues, Julian ![]() Book published by transcript (2016) Detailed reference viewed: 73 (0 UL)![]() Biesta, Gert ![]() in Heyting, F.; Tenorth, H.-E. (Eds.) Pädagogik und Pluralismus. Deutsche und niederländische Erfahrungen im Umgang mit Pluralität in Erziehung und Erziehungswissenschaft. (1994) Detailed reference viewed: 58 (0 UL)![]() Biesta, Gert ![]() in Pedagogiek en Pluralisme. Duitse en Nederlandse visies op pluraliteit in de theorie en de praktijk van de opvoeding. (1993) Detailed reference viewed: 56 (0 UL)![]() Hesse, Markus ![]() in Geographische Zeitschrift (2007), 94(2), 118-20 Detailed reference viewed: 78 (0 UL)![]() ![]() Biesta, Gert ![]() in Interchange (1995), 26 Detailed reference viewed: 96 (0 UL)![]() Biesta, Gert ![]() in Säfström, C. A.; Östman, L. (Eds.) Textanalys. Introduktion till syftesrelaterad kritik. (1999) Detailed reference viewed: 27 (0 UL)![]() Dembeck, Till ![]() in Zeitschrift für Interkulturelle Germanistik (2012), (2), 133147 Detailed reference viewed: 90 (5 UL)![]() Mein, Georg ![]() in Zeitschrift für Interkulturelle Germanistik (2013), (2), 133-147 Detailed reference viewed: 128 (10 UL)![]() ; ; et al in Cell Reports (2020), 30 Detailed reference viewed: 54 (3 UL)![]() Carr, Constance ![]() Presentation (2009, November) Detailed reference viewed: 52 (0 UL)![]() Cramer, Marcos ![]() ![]() in Cramer, Marcos; Casini, Giovanni (Eds.) Principles of Security and Trust. Proceedings of the 6th International Conference POST 2017 (2017, January 18) In access control frameworks with the possibility of delegating permissions and administrative rights, delegation chains can form. There are di erent ways to treat these delegation chains when revoking ... [more ▼] In access control frameworks with the possibility of delegating permissions and administrative rights, delegation chains can form. There are di erent ways to treat these delegation chains when revoking rights, which give rise to di erent revocation schemes. Hagstr om et al. [11] proposed a framework for classifying revocation schemes, in which the di erent revocation schemes are de ned graph-theoretically. At the outset, we identify multiple problems with Hagstr om et al.'s de nitions of the revocation schemes, which can pose security risks. This paper is centered around the question how one can systematically ensure that improved de nitions of the revocation schemes do not lead to similar problems. For this we propose to apply the axiomatic method originating in social choice theory to revocation schemes. Our use of the axiomatic method resembles its use in belief revision theory. This means that we de ne postulates that describe the desirable behaviour of revocation schemes, study which existing revocation frameworks satisfy which postulates, and show how all de ned postulates can be satis ed by de ning the revocation schemes in a novel way. [less ▲] Detailed reference viewed: 184 (39 UL)![]() Weber, Jean-Marie ![]() in Transfert (2006) Detailed reference viewed: 54 (0 UL)![]() Barthelmebs-Raguin, Hélène ![]() Presentation (2019) Detailed reference viewed: 93 (1 UL)![]() ; Schulz, Christian ![]() in Lange, Bastian; Hülz, Martina; Schmid, Benedikt (Eds.) et al Postwachstumsgeographien. Raumbezüge diverser und alternativer Ökonomien (2020) Detailed reference viewed: 43 (4 UL) |
||