On Thu, 2 Aug 2012, Cody Permann wrote:
I'll see what I can do. That rectangle example is actually the most
complicated one in the bunch! it is using subdomain restricted
terms, but I think the problem shows up even in simpler examples.
I've managed to duplicate the problem with adaptivity_ex5; a simpler
example would be greatly preferable but I think I can get a handle on
it from this if necessary.
---
Roy
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Libmesh-devel mailing list
Libmesh-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/libmesh-devel