首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
We describe a polynomial time algorithm to decide for a given connected graph G and a given partition of its vertex set into two sets A and B  , whether it is possible to assign a closed interval I(u)I(u) to each vertex u of G such that two distinct vertices u and v of G   are adjacent if and only if I(u)I(u) and I(v)I(v) intersect, all intervals assigned to vertices in A   have some length LALA, and all intervals assigned to vertices in B   have some length LBLB where LA<LBLA<LB. Our result is motivated by the interval count problem whose complexity status is open.  相似文献   

2.
3.
For a vertex v   of a connected graph G(V,E)G(V,E) and a subset S of V, the distance between a vertex v and S   is defined by d(v,S)=min{d(v,x):x∈S}d(v,S)=min{d(v,x):xS}. For an ordered k  -partition π={S1,S2Sk}π={S1,S2Sk} of V, the partition representation of v with respect to π is the k  -vector r(v|π)=(d(v,S1),d(v,S2)…d(v,Sk))r(v|π)=(d(v,S1),d(v,S2)d(v,Sk)). The k-partition π is a resolving partition if the k  -vectors r(v|π)r(v|π), v∈V(G)vV(G) are distinct. The minimum k for which there is a resolving k-partition of V is the partition dimension of G. Salman et al. [1] in their paper which appeared in Acta Mathematica Sinica, English Series   proved that partition dimension of a class of circulant graph G(n,±{1,2})G(n,±{1,2}), for all even n?6n?6 is four. In this paper we prove that it is three.  相似文献   

4.
The process of identifying faulty processors is called the diagnosis of the system. Several diagnostic models have been proposed, the most popular is the PMC (Preparata, Metze and Chen) diagnostic model. The pessimistic diagnosis strategy is a classic strategy based on the PMC model in which isolates all faulty nodes within a set containing at most one fault-free node. A system is t/tt/t-diagnosable if, provided the number of faulty processors is bounded by t, all faulty processors can be isolated within a set of size at most t with at most one fault-free node mistaken as a faulty one. The pessimistic diagnosability of a system G  , denoted by tp(G)tp(G), is the maximal number of faulty processors so that the system G   is t/tt/t-diagnosable. Jwo et al. [11] introduced the alternating group graph as an interconnection network topology for computing systems. The proposed graph has many advantages over hypercubes and star graphs. For example, for all alternating group graphs, every pair of vertices in the graph are connected by a Hamiltonian path and the graph can embed cycles with arbitrary length with dilation 1. In this article, we completely determine the pessimistic diagnosability of an n  -dimensional alternating group graph, denoted by AGnAGn. Furthermore, tp(AGn)=4n−11tp(AGn)=4n11 for n≥4n4.  相似文献   

5.
In this paper we study the computational complexity of the following optimization problem: given a graph G=(V,E)G=(V,E), we wish to find a tree T such that (1) the degree of each internal node of T   is at least 3 and at most ΔΔ, (2) the leaves of T are exactly the elements of V, and (3) the number of errors, that is, the symmetric difference between E   and {{u,v}:u,v{{u,v}:u,v are leaves of T   and dT(u,v)≤k}dT(u,v)k}, is as small as possible, where dT(u,v)dT(u,v) denotes the distance between uu and vv in tree T  . We show that this problem is NP-hard for all fixed constants Δ,k≥3Δ,k3.  相似文献   

6.
Two mobile agents (robots) having distinct labels and located in nodes of an unknown anonymous connected graph have to meet. We consider the asynchronous version of this well-studied rendezvous problem and we seek fast deterministic algorithms for it. Since in the asynchronous setting, meeting at a node, which is normally required in rendezvous, is in general impossible, we relax the demand by allowing meeting of the agents inside an edge as well. The measure of performance of a rendezvous algorithm is its cost: for a given initial location of agents in a graph, this is the number of edge traversals of both agents until rendezvous is achieved. If agents are initially situated at a distance D   in an infinite line, we show a rendezvous algorithm with cost O(D|Lmin|2)O(D|Lmin|2) when D   is known and O((D+|Lmax|)3)O((D+|Lmax|)3) if D   is unknown, where |Lmin||Lmin| and |Lmax||Lmax| are the lengths of the shorter and longer label of the agents, respectively. These results still hold for the case of the ring of unknown size, but then we also give an optimal algorithm of cost O(n|Lmin|)O(n|Lmin|), if the size n   of the ring is known, and of cost O(n|Lmax|)O(n|Lmax|), if it is unknown. For arbitrary graphs, we show that rendezvous is feasible if an upper bound on the size of the graph is known and we give an optimal algorithm of cost O(D|Lmin|)O(D|Lmin|) if the topology of the graph and the initial positions are known to agents.  相似文献   

7.
Dimensional analysis yields a new scaling formula for the Linpack benchmark. The computational power r(p0,q0)r(p0,q0) on a set of processors decomposed into a (p0,q0)(p0,q0) grid determines the computational power r(p,q)r(p,q) on a set of processors decomposed into a (p,q)(p,q) grid by the formula r(p,q)=(p/p0)α(q/q0)βr(p0,q0)r(p,q)=(p/p0)α(q/q0)βr(p0,q0). The two scaling parameters αα and ββ measure interprocessor communication overhead required by the algorithm. A machine that scales perfectly corresponds to α=β=1α=β=1; a machine that scales not at all corresponds to α=β=0α=β=0. We have determined the two scaling parameters by imposing a fixed-time constraint on the problem size such that the execution time remains constant as the number of processors changes. Results for a collection of machines confirm that the formula suggested by dimensional analysis is correct. Machines with the same values for these parameters are self-similar. They scale the same way even though the details of their specific hardware and software may be quite different.  相似文献   

8.
9.
Let id(v)id(v) denote the implicit degree of a vertex v in a graph G. In this paper, we prove that: Let G   be a 2-connected graph. If max?{id(u),id(v)}≥c/2max?{id(u),id(v)}c/2 for each pair of nonadjacent vertices u and v   in an induced claw, and |N(x)∩N(y)|≥2|N(x)N(y)|2 for each pair of nonadjacent vertices x and y in an induced modified claw, then G contains either a hamiltonian cycle or a cycle of length at least c.  相似文献   

10.
Given a capacitated undirected graph G=(V,E)G=(V,E) with a set of terminals K⊂VKV, a mimicking network   is a smaller graph H=(VH,EH)H=(VH,EH) which contains the set of terminals K   and for every bipartition [U,K−U][U,KU] of the terminals, the cost of the minimum cut separating U   from K−UKU in G is exactly equal to the cost of the minimum cut separating U   from K−UKU in H.  相似文献   

11.
12.
We propose to study a problem that arises naturally from both Topological Numbering of Directed Acyclic Graphs, and Additive Coloring (also known as Lucky Labeling). Let D be a digraph and f   a labeling of its vertices with positive integers; denote by S(v)S(v) the sum of labels over all neighbors of each vertex v. The labeling f is called topological additive numbering   if S(u)<S(v)S(u)<S(v) for each arc (u,v)(u,v) of the digraph. The problem asks to find the minimum number k for which D   has a topological additive numbering with labels belonging to {1,…,k}{1,,k}, denoted by ηt(D)ηt(D).  相似文献   

13.
A collection of T1,T2,…,TkT1,T2,,Tk of unrooted, leaf labelled (phylogenetic) trees, all with different leaf sets, is said to be compatible   if there exists a tree TT such that each tree TiTi can be obtained from TT by deleting leaves and contracting edges. Determining compatibility is NP-hard, and the fastest algorithm to date has worst case complexity of around Ω(nk)Ω(nk) time, nn being the number of leaves. Here, we present an O(nf(k))O(nf(k)) algorithm, proving that compatibility of unrooted phylogenetic trees is fixed parameter tractable   (FPT) with respect to the number kk of trees.  相似文献   

14.
In this paper we show a new method for calculating the nucleolus by solving a unique minimization linear program with O(4n)O(4n) constraints whose coefficients belong to {−1,0,1}{1,0,1}. We discuss the need of having all these constraints and empirically prove that they can be reduced to O(kmax2n)O(kmax2n), where kmax is a positive integer comparable with the number of players. A computational experience shows the applicability of our method over (pseudo)random transferable utility cooperative games with up to 18 players.  相似文献   

15.
Chomsky and Schützenberger showed in 1963 that the sequence dL(n)dL(n), which counts the number of words of a given length n in a regular language L, satisfies a linear recurrence relation with constant coefficients for n  , i.e., it is C-finite. It follows that every sequence s(n)s(n) which satisfies a linear recurrence relation with constant coefficients can be represented as dL1(n)−dL2(n)dL1(n)dL2(n) for two regular languages. We view this as a representation theorem for C-finite sequences. Holonomic or P-recursive sequences are sequences which satisfy a linear recurrence relation with polynomial coefficients. q-Holonomic sequences are the q-analog of holonomic sequences. In this paper we prove representation theorems of holonomic and q-holonomic sequences based on position specific weights on words, and for holonomic sequences, without using weights, based on sparse regular languages.  相似文献   

16.
We aim at finding the best possible seed values when computing a1/pa1/p using the Newton–Raphson iteration in a given interval. A natural choice of the seed value would be the one that best approximates the expected result. It turns out that in most cases, the best seed value can be quite far from this natural choice. When we evaluate a monotone function f(a)f(a) in the interval [amin,amax][amin,amax], by building the sequence xnxn defined by the Newton–Raphson iteration, the natural choice consists in choosing x0x0 equal to the arithmetic mean of the endpoint values. This minimizes the maximum possible distance between x0x0 and f(a)f(a). And yet, if we perform nn iterations, what matters is to minimize the maximum possible distance between xnxn and f(a)f(a). In several examples, the value of the best starting point varies rather significantly with the number of iterations.  相似文献   

17.
18.
The twisted cube is an important variation of the hypercube. It possesses many desirable properties for interconnection networks. In this paper, we study fault-tolerant embedding of paths in twisted cubes. Let TQn(V,E)TQn(V,E) denote the n-dimensional twisted cube. We prove that a path of length l   can be embedded between any two distinct nodes with dilation 1 for any faulty set F⊂V(TQn)∪E(TQn)FV(TQn)E(TQn) with |F|?n-3|F|?n-3 and any integer l   with 2n-1-1?l?|V(TQn-F)|-12n-1-1?l?|V(TQn-F)|-1 (n?3n?3). This result is optimal in the sense that the embedding has the smallest dilation 1. The result is also complete in the sense that the two bounds on path length l   and faulty set size |F||F| for a successful embedding are tight. That is, the result does not hold if l?2n-1-2l?2n-1-2 or |F|?n-2|F|?n-2. We also extend the result on (n-3)(n-3)-Hamiltonian connectivity of TQnTQn in the literature.  相似文献   

19.
In this paper we consider the problem of scheduling nn preemptive jobs on mm machines with identical speed under machine availability and eligibility constraints when minimizing maximum lateness (Lmax(Lmax). The lateness of a job is defined to be its completion time minus its due date, and LmaxLmax is the maximum value of lateness among all jobs. We assume that each machine is not continuously available at all time throughout the planning horizon and each job is only allowed to be processed on specific machines. Network flow technique is used to formulate this scheduling problem into a series of maximum flow problems. We propose a polynomial time two-phase binary search algorithm to verify the feasibility of the problem and to solve the scheduling problem optimally if a feasible schedule exists. Finally, we show that the time complexity of the algorithm is O((n+(2n+2x))3log(UB-LB))O((n+(2n+2x))3log(UB-LB)). Most literature in parallel machine scheduling assume that all machines are continuously available for processing and all jobs can be processed at any available machine throughout the planning horizon. But both assumptions might not be true in some practical environment, such as machine preventive maintenance and machines that have different capabilities to process jobs. This type of scheduling problem is seldom studied in the literature. The purpose of this paper is to examine the scheduling problem with machines with identical speed under machine availability and eligibility constraints. The objective is to minimize maximum lateness. We formulate this scheduling problem into a series of maximum flow problems with different values of LmaxLmax. A polynomial time two-phase binary search algorithm is proposed to verify the feasibility of the problem and to determine the optimal LmaxLmax.  相似文献   

20.
In this paper, we establish a new model for path planning with interval data which arises in a variety of applications. It is formulated as minimum risk-sum path problem  : given a source-destination pair in a network G=(V,E)G=(V,E), traveling on each link e in G   may take time xexe in a prespecified interval [le,ue][le,ue] and take risk (ue-xe)/(ue-le)(ue-xe)/(ue-le), the goal is to find a path in G from the source to the destination, together with an allocation of travel times along each link on the path, so that the total travel time of links on the path is no more than a given time bound and the risk-sum over the links on the path is minimized. Our study shows that this new model has two features that make it different from the existing models. First, the minimum risk-sum path problem is polynomial-time solvable, and second, it provides many solutions that vary with time bounds and risk sums and leaves the choice for decision makers. Therefore, the new model is more flexible and easier to use for the path planning with interval data.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号