共查询到20条相似文献,搜索用时 29 毫秒
1.
Given an alphabet Σ={1,2,…,|Σ|} text string T∈Σ
n
and a pattern string P∈Σ
m
, for each i=1,2,…,n−m+1 define L
p
(i) as the p-norm distance when the pattern is aligned below the text and starts at position i of the text. The problem of pattern matching with L
p
distance is to compute L
p
(i) for every i=1,2,…,n−m+1. We discuss the problem for d=1,2,∞. First, in the case of L
1 matching (pattern matching with an L
1 distance) we show a reduction of the string matching with mismatches problem to the L
1 matching problem and we present an algorithm that approximates the L
1 matching up to a factor of 1+ε, which has an
O(\frac1e2nlogmlog|S|)O(\frac{1}{\varepsilon^{2}}n\log m\log|\Sigma|)
run time. Then, the L
2 matching problem (pattern matching with an L
2 distance) is solved with a simple O(nlog m) time algorithm. Finally, we provide an algorithm that approximates the L
∞ matching up to a factor of 1+ε with a run time of
O(\frac1enlogmlog|S|)O(\frac{1}{\varepsilon}n\log m\log|\Sigma|)
. We also generalize the problem of String Matching with mismatches to have weighted mismatches and present an O(nlog 4
m) algorithm that approximates the results of this problem up to a factor of O(log m) in the case that the weight function is a metric. 相似文献
2.
Mohammad Ali Abam Mark de Berg Mohammad Farshi Joachim Gudmundsson Michiel Smid 《Algorithmica》2011,61(1):207-225
Let (S,d) be a finite metric space, where each element p∈S has a non-negative weight w (p). We study spanners for the set S with respect to the following weighted distance function:
$\mathbf{d}_{\omega}(p,q)=\left\{{ll}0&\mbox{ if $\mathbf{d}_{\omega}(p,q)=\left\{\begin{array}{ll}0&\mbox{ if 相似文献
3.
We consider the 2-XOR satisfiability problem, in which each instance is a formula that is a conjunction of Boolean equations
of the form x
⊕
y=0 or x
⊕
y=1. Formula of size m on n Boolean variables are chosen uniformly at random from among all
((n(n-1)) || (m)){n(n-1)\choose m}
possible choices. When c<1/2 and as n tends to infinity, the probability p(n,m=cn) that a random 2-XOR formula is satisfiable, tends to the threshold function exp (c/2)⋅(1−2c)1/4. This gives the asymptotic behavior of random 2-XOR formula in the SAT/UNSAT subcritical phase transition. In this paper,
we first prove that the error term in this subcritical region is O(n
−1). Then, in the critical region c=1/2, we prove that p(n,n/2)=Θ(n
−1/12). Our study relies on the symbolic method and analytical tools coming from generating function theory which also enable us
to describe the evolution of
n1/12 p(n,\fracn2(1+mn-1/3))n^{1/12}\ p(n,\frac{n}{2}(1+\mu n^{-1/3}))
as a function of μ. Thus, we propose a complete picture of the finite size scaling associated to the subcritical and critical regions of 2-XORSAT
transition. 相似文献
4.
Power optimization is a central issue in wireless network design. Given a graph with costs on the edges, the power of a node
is the maximum cost of an edge incident to it, and the power of a graph is the sum of the powers of its nodes. Motivated by
applications in wireless networks, we consider several fundamental undirected network design problems under the power minimization
criteria. Given a graph
G=(V,E)\mathcal{G}=(V,\mathcal{E})
with edge costs {c(e):e∈ℰ} and degree requirements {r(v):v∈V}, the
Minimum-Power Edge-Multi-Cover\textsf{Minimum-Power Edge-Multi-Cover}
(MPEMC\textsf{MPEMC}
) problem is to find a minimum-power subgraph G of
G\mathcal{G}
so that the degree of every node v in G is at least r(v). We give an O(log n)-approximation algorithms for
MPEMC\textsf{MPEMC}
, improving the previous ratio O(log 4
n). This is used to derive an O(log n+α)-approximation algorithm for the undirected
$\textsf{Minimum-Power $\textsf{Minimum-Power
($\textsf{MP$\textsf{MP
) problem, where α is the best known ratio for the min-cost variant of the problem. Currently,
_boxclosen-k)\alpha=O(\log k\cdot \log\frac{n}{n-k})
which is O(log k) unless k=n−o(n), and is O(log 2
k)=O(log 2
n) for k=n−o(n). Our result shows that the min-power and the min-cost versions of the
$\textsf{$\textsf{
problem are equivalent with respect to approximation, unless the min-cost variant admits an o(log n)-approximation, which seems to be out of reach at the moment. 相似文献
5.
Given an undirected graph and 0 £ e £ 1{0\le\epsilon\le1}, a set of nodes is called an e{\epsilon}-near clique if all but an e{\epsilon} fraction of the pairs of nodes in the set have a link between them. In this paper we present a fast synchronous network algorithm
that uses small messages and finds a near-clique. Specifically, we present a constant-time algorithm that finds, with constant
probability of success, a linear size e{\epsilon}-near clique if there exists an e3{\epsilon^3}-near clique of linear size in the graph. The algorithm uses messages of O(log n) bits. The failure probability can be reduced to n
−Ω(1) by increasing the time complexity by a logarithmic factor, and the algorithm also works if the graph contains a clique of
size Ω(n/(log log n)
α
) for some a ? (0,1){\alpha \in (0,1)}. Our approach is based on a new idea of adapting property testing algorithms to the distributed setting. 相似文献
6.
The notions of $(\overline{\in}, \overline{\in} \vee \overline{\hbox{q}})
7.
Andrzej Lingas 《Algorithmica》2011,61(1):36-50
We use randomness to exploit the potential sparsity of the Boolean matrix product in order to speed up the computation of
the product. Our new fast output-sensitive algorithm for Boolean matrix product and its witnesses is randomized and provides
the Boolean product and its witnesses almost certainly. Its worst-case time performance is expressed in terms of the input
size and the number of non-zero entries of the product matrix. It runs in time [(O)\tilde](n2sw/2-1)\widetilde{O}(n^{2}s^{\omega/2-1}), where the input matrices have size n×n, the number of non-zero entries in the product matrix is at most s, ω is the exponent of the fast matrix multiplication and [(O)\tilde](f(n))\widetilde{O}(f(n)) denotes O(f(n)log
d
n) for some constant d. By the currently best bound on ω, its running time can be also expressed as [(O)\tilde](n2s0.188)\widetilde{O}(n^{2}s^{0.188}). Our algorithm is substantially faster than the output-sensitive column-row method for Boolean matrix product for s larger than n
1.232 and it is never slower than the fast [(O)\tilde](nw)\widetilde{O}(n^{\omega})-time algorithm for this problem. By applying the fast rectangular matrix multiplication, we can refine our upper bound further
to the form
[(O)\tilde](nw(\frac12logns,1,1))\widetilde{O}(n^{\omega(\frac{1}{2}\log_{n}s,1,1)}), where ω(p,q,t) is the exponent of the fast multiplication of an n
p
×n
q
matrix by an n
q
×n
t
matrix. 相似文献
8.
In this paper we study collective additive tree spanners for special families of graphs including planar graphs, graphs with bounded genus, graphs with bounded tree-width, graphs with bounded clique-width, and graphs with bounded chordality. We say that a graph G=(V,E) admits a system of μ collective additive tree r -spanners if there is a system $\mathcal{T}(G)
9.
We study the string-property of being periodic and having periodicity smaller than a given bound. Let Σ be a fixed alphabet
and let p,n be integers such that
p £ \fracn2p\leq \frac{n}{2}
. A length-n string over Σ, α=(α
1,…,α
n
), has the property Period(p) if for every i,j∈{1,…,n}, α
i
=α
j
whenever i≡j (mod p). For an integer parameter
g £ \fracn2,g\leq \frac{n}{2},
the property Period(≤g) is the property of all strings that are in Period(p) for some p≤g. The property
Period( £ \fracn2)\mathit{Period}(\leq \frac{n}{2})
is also called Periodicity. 相似文献
10.
Minimum Augmentation of Edge-Connectivity between Vertices and Sets of Vertices in Undirected Graphs
Given an undirected multigraph G=(V,E), a family $\mathcal{W}
11.
Roel Verstappen 《Journal of scientific computing》2011,49(1):94-110
Large eddy simulation (LES) seeks to predict the dynamics of spatially filtered turbulent flows. The very essence is that
the LES-solution contains only scales of size ≥Δ, where Δ denotes some user-chosen length scale. This property enables us
to perform a LES when it is not feasible to compute the full, turbulent solution of the Navier-Stokes equations. Therefore,
in case the large eddy simulation is based on an eddy viscosity model we determine the eddy viscosity such that any scales
of size <Δ are dynamically insignificant. In this paper, we address the following two questions: how much eddy diffusion is
needed to (a) balance the production of scales of size smaller than Δ; and (b) damp any disturbances having a scale of size
smaller than Δ initially. From this we deduce that the eddy viscosity ν
e
has to depend on the invariants
q = \frac12tr(S2)q = \frac{1}{2}\mathrm{tr}(S^{2}) and
r = -\frac13tr(S3)r= -\frac{1}{3}\mathrm{tr}(S^{3}) of the (filtered) strain rate tensor S. The simplest model is then given by
ne = \frac32(D/p)2 |r|/q\nu_{e} = \frac{3}{2}(\Delta/\pi)^{2} |r|/q. This model is successfully tested for a turbulent channel flow (Re
τ
=590). 相似文献
12.
Complexity of Hard-Core Set Proofs 总被引:1,自引:1,他引:0
We study a fundamental result of Impagliazzo (FOCS’95) known as the hard-core set lemma. Consider any function f:{0,1}n?{0,1}{f:\{0,1\}^n\to\{0,1\}} which is “mildly hard”, in the sense that any circuit of size s must disagree with f on at least a δ fraction of inputs. Then, the hard-core set lemma says that f must have a hard-core set H of density δ on which it is “extremely hard”, in the sense that any circuit of size
s¢=O(s/(\frac1e2log(\frac1ed))){s'=O(s/(\frac{1}{\epsilon^2}\log(\frac{1}{\epsilon\delta})))} must disagree with f on at least (1-e)/2{(1-\epsilon)/2} fraction of inputs from H. 相似文献
13.
Exposure-Resilient Extractors and the Derandomization of Probabilistic Sublinear Time 总被引:1,自引:1,他引:0
Marius Zimand 《Computational Complexity》2008,17(2):220-253
14.
The concept of $(\overline{\in},\overline{\in} \vee \overline{q})
15.
Alexander A. Sherstov 《Computational Complexity》2010,19(1):135-150
We solve an open problem in communication complexity posed by Kushilevitz and Nisan (1997). Let R∈(f) and $D^\mu_\in
(f)$D^\mu_\in
(f) denote the randomized and μ-distributional communication complexities of f, respectively (∈ a small constant). Yao’s well-known minimax principle states that $R_{\in}(f) = max_\mu
\{D^\mu_\in(f)\}$R_{\in}(f) = max_\mu
\{D^\mu_\in(f)\}. Kushilevitz and Nisan (1997) ask whether this equality is approximately preserved if the maximum is taken over product distributions
only, rather than all distributions μ. We give a strong negative answer to this question. Specifically, we prove the existence
of a function f : {0, 1}n ×{0, 1}n ? {0, 1}f : \{0, 1\}^n \times \{0, 1\}^n \rightarrow \{0, 1\} for which maxμ product {Dm ? (f)} = Q(1) but R ? (f) = Q(n)\{D^\mu_\in (f)\} = \Theta(1) \,{\textrm but}\, R_{\in} (f) = \Theta(n). We also obtain an exponential separation between the statistical query dimension and signrank, solving a problem previously
posed by the author (2007). 相似文献
16.
We prove that the concept class of disjunctions cannot be pointwise approximated by linear combinations of any small set of
arbitrary real-valued functions. That is, suppose that there exist functions f1, ?, fr\phi_{1}, \ldots , \phi_{r} : {− 1, 1}n →
\mathbbR{\mathbb{R}} with the property that every disjunction f on n variables has $\|f - \sum\nolimits_{i=1}^{r} \alpha_{i}\phi
_{i}\|_{\infty}\leq 1/3$\|f - \sum\nolimits_{i=1}^{r} \alpha_{i}\phi
_{i}\|_{\infty}\leq 1/3 for some reals a1, ?, ar\alpha_{1}, \ldots , \alpha_{r}. We prove that then $r \geq
exp \{\Omega(\sqrt{n})\}$r \geq
exp \{\Omega(\sqrt{n})\}, which is tight. We prove an incomparable lower bound for the concept class of decision lists. For the concept class of majority
functions, we obtain a lower bound of W(2n/n)\Omega(2^{n}/n) , which almost meets the trivial upper bound of 2n for any concept class. These lower bounds substantially strengthen and generalize the polynomial approximation lower bounds of Paturi
(1992) and show that the regression-based agnostic learning algorithm of Kalai et al. (2005) is optimal. 相似文献
17.
Alastair A. Abbott 《Natural computing》2012,11(1):3-11
The Deutsch–Jozsa problem is one of the most basic ways to demonstrate the power of quantum computation. Consider a Boolean
function f : {0, 1}
n
→ {0, 1} and suppose we have a black-box to compute f. The Deutsch–Jozsa problem is to determine if f is constant (i.e. f(x) = const, "x ? {0,1}nf(x) = \hbox {const, } \forall x \in \{0,1\}^n) or if f is balanced (i.e. f(x) = 0 for exactly half the possible input strings x ? {0,1}nx \in \{0,1\}^n) using as few calls to the black-box computing f as is possible, assuming f is guaranteed to be constant or balanced. Classically it appears that this requires at least 2
n−1 + 1 black-box calls in the worst case, but the well known quantum solution solves the problem with probability one in exactly
one black-box call. It has been found that in some cases the algorithm can be de-quantised into an equivalent classical, deterministic
solution. We explore the ability to extend this de-quantisation to further cases, and examine with more detail when de-quantisation
is possible, both with respect to the Deutsch–Jozsa problem, as well as in more general cases. 相似文献
18.
Every Boolean function on n variables can be expressed as a unique multivariate polynomial modulo p for every prime p. In this work, we study how the degree of a function in one characteristic affects its complexity in other characteristics.
We establish the following general principle: functions with low degree modulo p must have high complexity in every other characteristic q. More precisely, we show the following results about Boolean functions f : {0, 1}n → {0, 1} which depend on all n variables, and distinct primes p, q:
|
设为首页 | 免责声明 | 关于勤云 | 加入收藏 |
Copyright©北京勤云科技发展有限公司 京ICP备09084417号 |