[5], which uses most of the structure theory of the Graph Minors project of Robertson and Seymour [6]). The second part of this article looks at these positive techniques systematically, and we hope that the re
Interestingly, for a large family of plane graphs, the problemsAreaUniversalityandAreaUniversality≥0coincide: A compactness argument shows that for the area-universality of a triangulation (even more generally, for every plane graph with a triangular outer face) it makes in fact no difference whethe...
4. The graph of two-dimensional Delone triangulations. group actions and there are only finitely many, as shown by Voronoi [64, Section 98] (see also Chapter 13.3 of [30]). Altogether we get: Theorem 5.3 (Main Theorem of Voronoi's Reduction Theory). The secondary cone of a Delone ...
Gurtin M (1972) The Linear Theory of Elasticity. In: Truesdell C (ed) Encyclopedia of Physics VIa, Vol II, Springer-Verlag, Berlin, pp 1–295 (reprinted as Mechanics of Solids, vol II. Springer, Berlin) Guyan RJ (1965) Reduction of stiffness and mass matrices. AIAA J 3:380 Article ...
1Introduction We present a variational model for the matching of surfaces implicitly represented as level sets. The approach is inspired by the mathematical theory of nonlinear elasticity of thin shells. The model consists in an energy functional, which is to be minimized among deformations of a c...
Once roadmaps are computed with singly exponential complexity, questions about connectivity are reduced to the same questions in a finite graph, and can be answered with complexity no greater than polynomial in the size of the roadmap itself. ...
such that the graph ofu(t) maps onto\({\mathbb {C}}\)and\(u(0)=u\). For the general\(t\in {\mathbb {C}}\), by genericity of every\(\Delta F_i\)and\(\Delta g_i\)and the elimination theory (see [4]), we have\(u(t)=(u_1(t),\ldots ,u_n(t))\)satisfies...
This means identifying the isomorphism type of the incidence graph of the 20 vertices and the 27 tetrahedra. The software nauty [18] is a standard tool for this task. It computes a canonical hash value, which is a 64-Bit integer that encodes the isomorphism type. This hash value is also...