Previous |  Up |  Next

Article

References:
[1] I.  Babuška: Courant element: Before and after. Finite Element Methods: Fifty Years of Courant Method. Lecture Notes in Pure and Applied Mathematics No.  164, M.  Křížek, P.  Neittaanmäki, and R.  Stenberg (eds.), Marcel Dekker, New York, 1994, pp. 37–51. MR 1299986
[2] I.  Babuška, J. T. Oden: Verification and validation in computational engineering and sciences. Part  I, Basic concepts. Comput. Methods Appl. Mech. Eng. 193 (2004), 4047–4066. DOI 10.1016/j.cma.2004.03.002 | MR 2083102
[3] I.  Babuška, J. T. Oden: The reliability of computer predictions: Can they be trusted. Int. J.  Numer. Anal. Model. 3 (2006), 255–273.
[4] M. D. Frank: The physical limits of computing. Computing in Science and Engineering 4 (2002), 16–26. DOI 10.1109/5992.998637
[5] H. H.  Goldstine, J. von  Neumann: Numerical inverting of matrices of high order. Bull. Am. Math. Soc. 53 (1947), 1021–1099. DOI 10.1090/S0002-9904-1947-08909-6 | MR 0024235
[6] H. H.  Goldstine, J. von  Neumann: Guide for verification and validation of computational dynamics simulation. AIAA Report G-077-1998, American Institute of Aeronautics and Astronautics, 1998.
[7] I. Hlaváček, J. Chleboun, and I.  Babuška: Uncertain Input Data Problem and the Worst Scenario Method. Elsevier, Amsterdam, 2004. MR 2285091
[8] J.  Mackerle: MAKABASE. Private communication.
[9] W. L. Oberkampf, T. G.  Trucano: Verification and validation in computational fluid dynamics. Progress in Aerospace Sciences 38 (2002), 209–272.
[10] J. T.  Oden: The promise of computational engineering and science: Will it be kept?, Expressions 12 (2002), 12–15. Zbl 1053.74049
[11] D. E.  Post: The coming crisis in computational science. Los Alamos National Laboratory Report LA-UR-0388. 2004.
[12] P. J. Roache: Verification and Validation in Computational Science and Engineering. Hermosa Publishers, Albuquerque, 1998.
Partner of
EuDML logo