| spam.chol.NgPeyton-class {spam} | R Documentation |
Result of a Cholesky decomposition with the NgPeyton
method
Objects are created by calls of the form chol(x,method="NgPeyton", ...)
and should not be created directly with a
new("spam.chol.NgPeyton", ...) call.
At present, no proper print method is defined. However, the factor can
be transformed into a spam object.
signature(x = "spam"): Transform the factor
into a spam object signature(x = "spam"): ... signature(r = "spam.chol.NgPeyton"): solving
a triangular system, see solve.signature(l = "spam.chol.NgPeyton"): solving
a triangular system, see solve.signature(x = "spam"): Retrieve the
dimension. Note that "dim<-" is not implemented.signature(x = "spam"): Retrieve the
dimension. Note that "dim<-" is not implemented. signature(x = "spam"): Coerce the factor into a vector .Reinhard Furrer
Ng, E. G. and B. W. Peyton (1993), "Block sparse Cholesky algorithms on advanced uniprocessor computers", SIAM J. Sci. Comput., 14, pp. 1034-1056.
print.spam
ordering and chol
x <- spam( c(4,3,0,3,5,1,0,1,4),3) cf <- chol( x) cf as.spam( cf) # Modify at own risk... slotNames(cf)