TOPICS
Search

Search Results for ""


371 - 380 of 1355 for Symmetric MatrixSearch Results
An (m+1)-dimensional subspace W of an (n+1)-dimensional vector space V can be specified by an (m+1)×(n+1) matrix whose rows are the coordinates of a basis of W. The set of ...
Bourque and Ligh (1992) conjectured that the least common multiple matrix on a GCD-closed set S is nonsingular. This conjecture was shown to be false by Haukkanen et al. ...
The all-pairs shortest path problem is the determination of the shortest graph distances between every pair of vertices in a given graph. The problem can be solved using n ...
Consider the characteristic equation |lambdaI-A|=lambda^n+b_1lambda^(n-1)+...+b_(n-1)lambda+b_n=0 (1) determining the n eigenvalues lambda of a real n×n square matrix A, ...
If x is a member of a set A, then x is said to be an element of A, written x in A. If x is not an element of A, this is written x not in A. The term element also refers to a ...
A representation phi of a group G is faithful if it is one-to-one, i.e., if phi(g)=phi(h) implies g=h for g,h in G. Equivalently, phi is faithful if phi(g)=I_n implies g=e, ...
The graph difference of graphs G and H is the graph with adjacency matrix given by the difference of adjacency matrices of G and H. A graph difference is defined when the ...
A tensor-like object which reverses sign under inversion. Given a transformation matrix A, A_(ij)^'=det|A|a_(ik)a_(jl)A_(kl), where det is the determinant. A pseudotensor is ...
In general, there is no unique matrix solution A to the matrix equation y=Ax. Even in the case of y parallel to x, there are still multiple matrices that perform this ...
The Cayley-Purser algorithm is a public-key cryptography algorithm that relies on the fact that matrix multiplication is not commutative. It was devised by Sarah Flannery ...
1 ... 35|36|37|38|39|40|41 ... 136 Previous Next

...