Search Results for ""
371 - 380 of 1355 for Symmetric MatrixSearch Results
An (m+1)-dimensional subspace W of an (n+1)-dimensional vector space V can be specified by an (m+1)×(n+1) matrix whose rows are the coordinates of a basis of W. The set of ...
Bourque and Ligh (1992) conjectured that the least common multiple matrix on a GCD-closed set S is nonsingular. This conjecture was shown to be false by Haukkanen et al. ...
The all-pairs shortest path problem is the determination of the shortest graph distances between every pair of vertices in a given graph. The problem can be solved using n ...
Consider the characteristic equation |lambdaI-A|=lambda^n+b_1lambda^(n-1)+...+b_(n-1)lambda+b_n=0 (1) determining the n eigenvalues lambda of a real n×n square matrix A, ...
If x is a member of a set A, then x is said to be an element of A, written x in A. If x is not an element of A, this is written x not in A. The term element also refers to a ...
A representation phi of a group G is faithful if it is one-to-one, i.e., if phi(g)=phi(h) implies g=h for g,h in G. Equivalently, phi is faithful if phi(g)=I_n implies g=e, ...
The graph difference of graphs G and H is the graph with adjacency matrix given by the difference of adjacency matrices of G and H. A graph difference is defined when the ...
A tensor-like object which reverses sign under inversion. Given a transformation matrix A, A_(ij)^'=det|A|a_(ik)a_(jl)A_(kl), where det is the determinant. A pseudotensor is ...
In general, there is no unique matrix solution A to the matrix equation y=Ax. Even in the case of y parallel to x, there are still multiple matrices that perform this ...
The Cayley-Purser algorithm is a public-key cryptography algorithm that relies on the fact that matrix multiplication is not commutative. It was devised by Sarah Flannery ...
...
View search results from all Wolfram sites (18358 matches)

