首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 625 毫秒
1.
A code C in the n-dimensional metric space $ \mathbb{F}_q^n $ \mathbb{F}_q^n over the Galois field GF(q) is said to be metrically rigid if any isometry I: C → $ \mathbb{F}_q^n $ \mathbb{F}_q^n can be extended to an isometry (automorphism) of $ \mathbb{F}_q^n $ \mathbb{F}_q^n . We prove metric rigidity for some classes of codes, including certain classes of equidistant codes and codes corresponding to one class of affine resolvable designs.  相似文献   

2.
Let {ξ k } k=0 be a sequence of i.i.d. real-valued random variables, and let g(x) be a continuous positive function. Under rather general conditions, we prove results on sharp asymptotics of the probabilities $ P\left\{ {\frac{1} {n}\sum\limits_{k = 0}^{n - 1} {g\left( {\xi _k } \right) < d} } \right\} $ P\left\{ {\frac{1} {n}\sum\limits_{k = 0}^{n - 1} {g\left( {\xi _k } \right) < d} } \right\} , n → ∞, and also of their conditional versions. The results are obtained using a new method developed in the paper, namely, the Laplace method for sojourn times of discrete-time Markov chains. We consider two examples: standard Gaussian random variables with g(x) = |x| p , p > 0, and exponential random variables with g(x) = x for x ≥ 0.  相似文献   

3.
Let G be an undirected graph and $\mathcal{T}=\{T_{1},\ldots,T_{k}\}Let G be an undirected graph and T={T1,?,Tk}\mathcal{T}=\{T_{1},\ldots,T_{k}\} be a collection of disjoint subsets of nodes. Nodes in T 1⋅⋅⋅T k are called terminals, other nodes are called inner. By a T\mathcal{T} -path we mean a path P such that P connects terminals from distinct sets in T\mathcal{T} and all internal nodes of P are inner. We study the problem of finding a maximum cardinality collection ℘ of T\mathcal{T} -paths such that at most two paths in ℘ pass through any node. Our algorithm is purely combinatorial and has the time complexity O(mn 2), where n and m denote the numbers of nodes and edges in G, respectively.  相似文献   

4.
Let w(t) be a standard Wiener process, w(0) = 0, and let η a (t) = w(t + a) − w(t), t ≥ 0, be increments of the Wiener process, a > 0. Let Z a (t), t ∈ [0, 2a], be a zeromean Gaussian stationary a.s. continuous process with a covariance function of the form E Z a (t)Z a (s) = 1/2[a − |ts|], t, s ∈ [0, 2a]. For 0 < p < ∞, we prove results on sharp asymptotics as ɛ → 0 of the probabilities
$ P\left\{ {\int\limits_0^T {\left| {\eta _a \left( t \right)} \right|^p dt \leqslant \varepsilon ^p } } \right\} for T \leqslant a, P\left\{ {\int\limits_0^T {\left| {Z_a \left( t \right)} \right|^p dt \leqslant \varepsilon ^p } } \right\} for T < 2a $ P\left\{ {\int\limits_0^T {\left| {\eta _a \left( t \right)} \right|^p dt \leqslant \varepsilon ^p } } \right\} for T \leqslant a, P\left\{ {\int\limits_0^T {\left| {Z_a \left( t \right)} \right|^p dt \leqslant \varepsilon ^p } } \right\} for T < 2a   相似文献   

5.
The 1-versus-2 queries problem, which has been extensively studied in computational complexity theory, asks in its generality whether every efficient algorithm that makes at most 2 queries to a Σ k p -complete language L k has an efficient simulation that makes at most 1 query to L k . We obtain solutions to this problem for hypotheses weaker than previously considered. We prove that:
(I)  For each k≥2, PSpk[2]tt í ZPPSpk[1]T PH=Spk\mathrm{P}^{\Sigma^{p}_{k}[2]}_{tt}\subseteq \mathrm{ZPP}^{\Sigma^{p}_{k}[1]}\Rightarrow \mathrm{PH}=\Sigma^{p}_{k} , and
(II)  P tt NP[2]⊆ZPPNP[1] PH=S2 p .
Here, for any complexity class C\mathcal{C} and integer j≥1, we define ZPPC[j]\mathrm{ZPP}^{\mathcal{C}[j]} to be the class of problems solvable by zero-error randomized algorithms that run in polynomial time, make at most j queries to C\mathcal{C} , and succeed with probability at least 1/2+1/poly(⋅). This same definition of ZPPC[j]\mathrm{ZPP}^{\mathcal{C}[j]} , also considered in Cai and Chakaravarthy (J. Comb. Optim. 11(2):189–202, 2006), subsumes the class of problems solvable by randomized algorithms that always answer correctly in expected polynomial time and make at most j queries to C\mathcal{C} . Hemaspaandra, Hemaspaandra, and Hempel (SIAM J. Comput. 28(2):383–393, 1998), for k>2, and Buhrman and Fortnow (J. Comput. Syst. Sci. 59(2):182–194, 1999), for k=2, had obtained the same consequence as ours in (I) using the stronger hypothesis PSpk[2]tt í PSpk[1]\mathrm{P}^{\Sigma^{p}_{k}[2]}_{tt}\subseteq \mathrm{P}^{\Sigma^{p}_{k}[1]} . Fortnow, Pavan, and Sengupta (J. Comput. Syst. Sci. 74(3):358–363, 2008) had obtained the same consequence as ours in (II) using the stronger hypothesis P tt NP[2]⊆PNP[1].  相似文献   

6.
Let SFd and Πψ,n,d = { nj=1bjψ(ωj·x+θj) :bj,θj∈R,ωj∈Rd} be the set of periodic and Lebesgue’s square-integrable functions and the set of feedforward neural network (FNN) functions, respectively. Denote by dist (SF d, Πψ,n,d) the deviation of the set SF d from the set Πψ,n,d. A main purpose of this paper is to estimate the deviation. In particular, based on the Fourier transforms and the theory of approximation, a lower estimation for dist (SFd, Πψ,n,d) is proved. That is, dist(SF d, Πψ,n,d) (nlogC2n)1/2 . T...  相似文献   

7.
Let (S,d) be a finite metric space, where each element pS has a non-negative weight w (p). We study spanners for the set S with respect to the following weighted distance function:
$\mathbf{d}_{\omega}(p,q)=\left\{{ll}0&\mbox{ if $\mathbf{d}_{\omega}(p,q)=\left\{\begin{array}{ll}0&\mbox{ if  相似文献   

8.
We construct well-conditioned orthonormal hierarchical bases for simplicial L2\mathcal{L}_{2} finite elements. The construction is made possible via classical orthogonal polynomials of several variables. The basis functions are orthonormal over the reference simplicial elements in two and three dimensions. The mass matrices M are identity while the conditioning of the stiffness matrices S grows as O(p3)\mathcal{O}(p^{3}) with respect to the order p. The diagonally normalized stiffness matrices are well conditioned. The diagonally normalized composite matrices ζM+S are also well conditioned for a wide range of ζ. For the mass, stiffness and composite matrices, the bases in this study have much better conditioning than existing high-order hierarchical bases.  相似文献   

9.
In this paper we define the sequence space wF(f,p,\Updelta){w}_{{\mathcal{F}}}\left(f,p,\Updelta\right) which is called the space of strongly \Updelta p\Updelta p-Cesàro summable sequences with modulus f. Furthermore the fuzzy Δ-statistically pre-Cauchy sequence is defined and the necessary and sufficient conditions are given for a sequence of fuzzy numbers to be fuzzy \Updelta\Updelta-statistically pre-Cauchy and to be fuzzy \Updelta\Updelta-statistically convergent. Also some relations between wF(f,p,\Updelta)w_{{\mathcal{F}}}(f,p,\Updelta) and SF(\Updelta){S}_{{\mathcal{F}}}(\Updelta) are given.  相似文献   

10.
This paper studies the notions of self-reducibility and autoreducibility. Our main result regarding length-decreasing self-reducibility is that any complexity class C\mathcal{C} that has a (logspace) complete language and is closed under polynomial-time (logspace) padding has the property that if all C\mathcal{C} -complete languages are length-decreasing (logspace) self-reducible then C í P\mathcal{C}\subseteq \mathrm {P} (C í L\mathcal {C}\subseteq \mathrm {L} ). In particular, this result applies to NL, NP and PSPACE. We also prove an equivalent of this theorem for function classes (for example, for #P). We also show that for several hard function classes, in particular for #P, it is the case that all their complete functions are deterministically autoreducible. In particular, we show the following result. Let f be a #P parsimonious function with two preimages of 0. We show that there are two FP functions h and t such that for all inputs x we have f(x)=t(x)+f(h(x)), h(x)≠x, and t(x)∈{0,1}. Our results regarding single-query autoreducibility of #P functions can be contrasted with random self-reducibility for which it is known that if a #P complete function were random self-reducible with one query then the polynomial hierarchy would collapse.  相似文献   

11.
We are given a trajectory T\mathcal{T} and an area A\mathcal{A} . T\mathcal{T} might intersect A\mathcal{A} several times, and our aim is to detect whether T\mathcal{T} visits A\mathcal{A} with some regularity, e.g. what is the longest time span that a GPS-GSM equipped elephant visited a specific lake on a daily (weekly or yearly) basis, where the elephant has to visit the lake most of the days (weeks or years), but not necessarily on every day (week or year).  相似文献   

12.
The typechecking problem for transformations of relational data into tree data is the following: given a relational-to-XML transformation P, and an XML type d, decide whether for every database instance the result of the transformation P on satisfies d. TreeQL programs with projection-free conjunctive queries (see Alon et al. in ACM Trans. Comput. Log. 4(3):315–354, 2003) are considered as transformations and DTDs with arbitrary regular expressions as XML types. A non-elementary upper bound for the typechecking problem was already given by Alon et al. (ACM Trans. Comput. Log. 4(3):315–354, 2003) (although in a more general setting, where equality and negation in projection-free conjunctive queries and additional universal integrity constraints are allowed). In this paper we show that the typechecking problem is coNEXPTIME-complete. As an intermediate step we consider the following problem, which can be formulated independently of XML notions. Given a set of triples of the form (φ,k,j), where φ is a projection-free conjunctive query and k,j are natural numbers, decide whether there exists a database such that, for each triple (φ,k,j) in the set, there exists a natural number α, such that there are exactly k+j*α tuples satisfying the query φ in . Our main technical contribution consists of a NEXPTIME algorithm for the last problem. Partially supported by Polish Ministry of Science and Higher Education research project N206 022 31/3660, 2006/2009. This paper is an extended version of 20, where the coNEXPTIME upper bound was shown.  相似文献   

13.
Given a “black box” function to evaluate an unknown rational polynomial f ? \mathbbQ[x]f \in {\mathbb{Q}}[x] at points modulo a prime p, we exhibit algorithms to compute the representation of the polynomial in the sparsest shifted power basis. That is, we determine the sparsity $t \in {\mathbb{Z}}_{>0}$t \in {\mathbb{Z}}_{>0}, the shift a ? \mathbbQ\alpha \in {\mathbb{Q}}, the exponents 0 £ e1 < e2 < ? < et{0 \leq e_{1} < e_{2} < \cdots < e_{t}}, and the coefficients c1, ?, ct ? \mathbbQ \{0}c_{1}, \ldots , c_{t} \in {\mathbb{Q}} \setminus \{0\} such that
f(x) = c1(x-a)e1+c2(x-a)e2+ ?+ct(x-a)etf(x) = c_{1}(x-\alpha)^{e_{1}}+c_{2}(x-\alpha)^{e_{2}}+ \cdots +c_{t}(x-\alpha)^{e_{t}}  相似文献   

14.
A homomorphism (?) of logic programs from P to P' is a function mapping Atoms(P) to Atoms(P') and it preserves complements and program clauses. For each definite program clause a←a1,...,an∈P it implies that (?)(a)←(?)(a1),...,(?)(an) is a program clause of P'. A homomorphism (?) is an isomorphism if (?) is a bijection. In this paper, the complexity of the decision problems on homomorphism and isomorphism for definite logic programs is studied. It is shown that the homomorphism problem (HOM-LP) for definite logic programs is NP-complete, and the isomorphism problem (ISO-LP) is equivalent to the graph isomorphism problem (GI).  相似文献   

15.
This paper introduces a general decomposition scheme for single stage scheduling problems with jobs that have arbitrary release dates. We assume that the objective function is monotone in the completion time of each job. The decomposition scheme has significant theoretical and practical relevance. When assuming equal processing times, we can reduce the number of steps required to solve several well-known nonpreemptive single machine scheduling problems by O(n3)\mathcal{O}(n^{3}), provided the processing time p is constant. Specifically, we develop new approaches that solve the problems 1|r i ,p i =p|∑f i (C i ) and 1|r i ,p i =p|∑w i U i in O(n4)\mathcal{O}(n^{4}) time; the algorithms that have been described in the literature for these problems operate in O(n7)\mathcal{O}(n^{7}). Moreover, solution approaches for NP\mathcal{NP}-hard problems with unequal processing times may also benefit from our decomposition rule. This is particularly true if p max/p min is close to 1. Using the decomposition rule, either the problem size is reduced or additional information about the maximal schedule length is obtained.  相似文献   

16.
Xue  -H. Lin  -Z. Du 《Algorithmica》2008,31(4):479-500
Abstract. Let P = {p 1 , p 2 , \ldots, p n } be a set of n {\lilsf terminal points} in the Euclidean plane, where point p i has a {\lilsf service request of grade} g(p i ) ∈ {1, 2, \ldots, n} . Let 0 < c(1) < c(2) < ⋅s < c(n) be n real numbers. The {\lilsf Grade of Service Steiner Minimum Tree (GOSST)} problem asks for a minimum cost network interconnecting point set P and some {\lilsf Steiner points} with a service request of grade 0 such that (1) between each pair of terminal points p i and p j there is a path whose minimum grade of service is at least as large as \min(g(p i ), g(p j )) ; and (2) the cost of the network is minimum among all interconnecting networks satisfying (1), where the cost of an edge with service of grade g is the product of the Euclidean length of the edge with c(g) . The GOSST problem is a generalization of the Euclidean Steiner minimum tree problem where all terminal points have the same grade of service request. When there are only two (three, respectively) different grades of service request by the terminal points, we present a polynomial time approximation algorithm with performance ratio \frac 4 3 ρ (((5+4\sqrt 2 )/7)ρ , respectively), where ρ is the performance ratio achieved by an approximation algorithm for the Euclidean Steiner minimum tree problem. For the general case, we prove that there exists a GOSST that is the minimum cost network under a full Steiner topology or its degeneracies. A powerful interior-point algorithm is used to find a (1+ε) -approximation to the minimum cost network under a given topology or its degeneracies in O(n 1.5 (log n + log (1/ε))) time. We also prove a lower bound theorem which enables effective pruning in a branch-and-bound method that partially enumerates the full Steiner topologies in search for a GOSST. We then present a k -optimal heuristic algorithm to compute good solutions when the problem size is too large for the branch-and-bound algorithm. Preliminary computational results are presented.  相似文献   

17.
Let mad (G) denote the maximum average degree (over all subgraphs) of G and let χ i (G) denote the injective chromatic number of G. We prove that if Δ≥4 and mad(G) < \frac145\mathrm{mad}(G)<\frac{14}{5}, then χ i (G)≤Δ+2. When Δ=3, we show that mad(G) < \frac3613\mathrm{mad}(G)<\frac{36}{13} implies χ i (G)≤5. In contrast, we give a graph G with Δ=3, mad(G)=\frac3613\mathrm{mad}(G)=\frac{36}{13}, and χ i (G)=6.  相似文献   

18.
M. Drmota 《Algorithmica》2001,29(1-2):89-119
By using analytic tools it is shown that the expected value of the heightH n of binary search trees of sizen is asymptotically given by EH n =c logn+ (log logn) and its variance by VH n = ((log logn)2), wherec=4.31107 …. The same bounds have been obtained by Devroye and Reed [3] by completely different methods. Dedicated to Philippe Flajolet on the occasion of his 50th birthday This research was supported by the Austrian Science Foundation FWF, Grant P10187-MAT. Online publication September 22, 2000.  相似文献   

19.
We consider a variant of the path cover problem, namely, the k-fixed-endpoint path cover problem, or kPC for short, on interval graphs. Given a graph G and a subset T\mathcal{T} of k vertices of V(G), a k-fixed-endpoint path cover of G with respect to T\mathcal{T} is a set of vertex-disjoint paths ℘ that covers the vertices of G such that the k vertices of T\mathcal{T} are all endpoints of the paths in ℘. The kPC problem is to find a k-fixed-endpoint path cover of G of minimum cardinality; note that, if T\mathcal{T} is empty the stated problem coincides with the classical path cover problem. In this paper, we study the 1-fixed-endpoint path cover problem on interval graphs, or 1PC for short, generalizing the 1HP problem which has been proved to be NP-complete even for small classes of graphs. Motivated by a work of Damaschke (Discrete Math. 112:49–64, 1993), where he left both 1HP and 2HP problems open for the class of interval graphs, we show that the 1PC problem can be solved in polynomial time on the class of interval graphs. We propose a polynomial-time algorithm for the problem, which also enables us to solve the 1HP problem on interval graphs within the same time and space complexity.  相似文献   

20.
We present new efficient deterministic and randomized distributed algorithms for decomposing a graph with n nodes into a disjoint set of connected clusters with radius at most k−1 and having O(n 1+1/k ) intercluster edges. We show how to implement our algorithms in the distributed CONGEST\mathcal{CONGEST} model of computation, i.e., limited message size, which improves the time complexity of previous algorithms (Moran and Snir in Theor. Comput. Sci. 243(1–2):217–241, 2000; Awerbuch in J. ACM 32:804–823, 1985; Peleg in Distributed Computing: A Locality-Sensitive Approach, 2000) from O(n) to O(n 1−1/k ). We apply our algorithms for constructing low stretch graph spanners and network synchronizers in sublinear deterministic time in the CONGEST\mathcal{CONGEST} model.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号