首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 671 毫秒
1.
LetW itk(n) be the minimax complexity of selecting thek largest elements ofn numbersx 1,x 2,...,x n by pairwise comparisonsx i :x j . It is well known thatW 2(n) =n–2+ [lgn], andW k (n) = n + (k–1)lg n +O(1) for all fixed k 3. In this paper we studyW k (n), the minimax complexity of selecting thek largest, when tests of the form Isx i the median of {x i ,x j ,x t }? are also allowed. It is proved thatW2(n) =n–2+ [lgn], andW k (n) =n + (k–1)lg2 n +O(1) for all fixedk3.This research was supported in part by the National Science Foundation under Grant No. DCR-8308109.  相似文献   

2.
3.
An optimal piecewise linear continuous fit to a given set of n data points D = {(xi, yi) : 1 ≤ in} in two dimensions consists of a continuous curve defined by k linear segments {L1, L2,…,Lk} which minimizes a weighted least squares error function with weight wi at (xi, yi), where k ≥ 1 is a given integer. A key difficulty here is the fact that the linear segment Lj, which approximates a subset of consecutive data points DjD in an optimal solution, is not necessarily an optimal fit in itself for the points Dj. We solve the problem for the special case k = 2 by showing that an optimal solution essentially consists of two least squares linear regression lines in which the weight wj of some data point (xj, yj) is split into the weights λwj and (1 − λ)wj, 0 ≤ λ ≤ 1, for computations of these lines. This gives an algorithm of worst-case complexity O(n) for finding an optimal solution for the case k = 2.  相似文献   

4.
The aim of this paper is to generalize a result given by Curry and Feys, who have shown that the only regular combinators possessing inverse in the λ-β-η-calculus are the permutators, whose definition is p=λzλx1λxn(zxi1xin) for n?0 where i1,…, ir is a permutation of 1,…, n. Here we extend this characterization to the set of normal forms, showing that the only normal forms possessing inverse in the λ-βη-calculus are the “hereditarily finite permutators” (h.f.p.), whose recursive definition is: if n?0, Pj (1?j?n) are h.f.p. and i1,…,in is a permutation of 1,…, n, then the normal form of P = λzλx1λxn(z(P1xi1))… (Pnin) is an h.f.p.  相似文献   

5.
In this paper the well-known multilevel processor-sharing algorithm for M/G/1 systems without priorities is extended to M/G/1 systems with priority classes. The average response timeT j (x) and the average waiting timeW j (x) for aj-class job, which requires a total service ofx sec, is analytically calculated. Some figures demonstrate, how the priority classes and the total number of the different levels affect the behavior of the functionsT j (x) andW j (x). In addition, the foreground-background algorithm with priorities, which is in the literature not yet covered, is treated as a special case of the multilevel processor-sharing algorithm.  相似文献   

6.
P. Brucker  L. Nordmann 《Computing》1994,52(2):97-122
Thek-track assignment problem is a scheduling problem withn jobs andk machines. Each machinej has a certain operational period (track) which starts at timea j and ends at timeb j . Each jobi has a specific start times i and a specific finish timet i . A schedule is an assignment of certain jobs to machines such that the intervals [s i ,t i [assigned to the same machinej do not overlap and fit into track [a j ,b j [. We are interested in a schedule which maximizes the number of assigned jobs. AO(n k?1 k!k k+1 )-algorithm which solves this problem is presented. Furthermore it is shown that the more general problem, in which for each track only a given set of jobs can be scheduled on that track, can be solved inO(n k k!k k )-time.  相似文献   

7.
Sufficient conditions of existence and uniqueness of α-bounded and bounded solutions to the difference equation with advancedd arguments x(n + 1) = A(n)x(n) + B(n)x(σ1(n)) + f(n, x(n), x(σ2(n)), σi(n) ⩾ n + 1, i = 1,2, are given. It is proven that under certain conditions it is possible to find positive numbers R, μ, such that from every initial condition ξ satisfying ∥ξ∥ ⩽ R, a unique bounded solution, belonging to the ball ∥x∥ ⩽ μ, starts.  相似文献   

8.
A two-dimensional arrayA={a[i, j]} is calledtotally monotone if, for alli 1i 2 andj 1j 2,a[i 1,j 1]a[i 1,j 2] impliesa[i 2,j 1]a[i 2,j 2]. Totally monotone arrays were introduced in 1987 by Aggarwal, Klawe, Moran, Shor, and Wilber, who showed that several problems in computational geometry and VLSI river routing could be reduced to the problem of finding a maximum entry in each row of a totally monotone array. In this paper we consider several selection and sorting problems involving totally monotone arrays and give a number of applications of solutions for these problems. In particular, we obtain the following results for anm × n totally monotone arrayA:
1.  Thek largest (ork smallest) entries in each row ofA can be computed inO(k(m + n)) time. This result allows us to determine thek farthest (ork nearest) neighbors of each vertex of a convexn-gon inO(kn) time.
2.  Provided the transpose ofA is also totally monotone, thek largest (ork smallest) entries overall inA can be computed inO(m + n + k lg(mn/k)) time. This result allows us to find thek farthest (ork nearest) pairs of vertices from a convexn-gon inO(n + k lg(n 2/k)) time.
3.  The rows ofA can be sorted inO(mn) time whenm n and inO(mn(1 + lg(n/m))) time whenm <>. This result allows us to solve the of (S) on the number of combinations of row permutations possible for a totally monotone array would imply an (lgS) lower bound on the time necessary to sort the array's rows in a linear decision tree model.)
4.  In Subsection 4.2 we applied our algorithm for sorting the rows of a totally monotone array to the neighbor-ranking problem for the vertices of a convex polygonP. We then extended this technique to arbitrary point sets. It remains open whether our two selection algorithms for totally monotone arrays, which we also applied to the vertices of a convex polygon, can likewise be applied to arbitrary point sets.
An earlier version of this paper appeared inProceedings of the 1st Annual ACM-SIAM Symposium on Discrete Algorithms, pages 494–502, January 1990. Portions of the paper also appeared in Dina Kravets' S.M. thesis [Kr]. The work of D. Kravets was supported in part by the Air Force under Contract OSR-86-0076, the Defense Advanced Research Projects Agency under Contract N00014-89-J-1988, and the Army under Contract DAAL-03-86-K-0171. J. K. Park's work was supported in part by the Defense Advanced Research Projects Agency under Contract N00014-87-K-0825, the Office of Naval Research under Contract N00014-86-K-0593, and an NSF Graduate Fellowship.  相似文献   

9.
In the present paper a new exponentially fitted one-step method is given for the numerical treatment of the initial value problemy (n)=f(x, y, y′, ..., y (n?1)),y (j) (x 0)=y 0 (j) j=0, 1, ...n?1. The method is given by a local linearisation off(x, y, y′, ..., y (n?1)). Using new functions the solution of a special linear differential equation of then-th order with constant coefficients is transformed in such a way so that it no longer contains numerical singularities. The efficiency of the method is demonstrated by several numerical stiff-examples.  相似文献   

10.
We present an algorithm for computingL 1 shortest paths among polygonal obstacles in the plane. Our algorithm employs the “continuous Dijkstra” technique of propagating a “wavefront” and runs in timeO(E logn) and spaceO(E), wheren is the number of vertices of the obstacles andE is the number of “events.” By using bounds on the density of certain sparse binary matrices, we show thatE =O(n logn), implying that our algorithm is nearly optimal. We conjecture thatE =O(n), which would imply our algorithm to be optimal. Previous bounds for our problem were quadratic in time and space. Our algorithm generalizes to the case of fixed orientation metrics, yielding anO(n??1/2 log2 n) time andO(n??1/2) space approximation algorithm for finding Euclidean shortest paths among obstacles. The algorithm further generalizes to the case of many sources, allowing us to compute anL 1 Voronoi diagram for source points that lie among a collection of polygonal obstacles.  相似文献   

11.
A closed interval is an ordered pair of real numbers [xy], with x ? y. The interval [xy] represents the set {i ∈ Rx ? i ? y}. Given a set of closed intervals I={[a1,b1],[a2,b2],…,[ak,bk]}, the Interval-Merging Problem is to find a minimum-cardinality set of intervals M(I)={[x1,y1],[x2,y2],…,[xj,yj]}, j ? k, such that the real numbers represented by equal those represented by . In this paper, we show the problem can be solved in O(d log d) sequential time, and in O(log d) parallel time using O(d) processors on an EREW PRAM, where d is the number of the endpoints of I. Moreover, if the input is given as a set of sorted endpoints, then the problem can be solved in O(d) sequential time, and in O(log d) parallel time using O(d/log d) processors on an EREW PRAM.  相似文献   

12.
J. Katajainen 《Computing》1988,40(2):147-161
The following geometrical proximity concepts are discussed: relative closeness and geographic closeness. Consider a setV={v 1,v 2, ...,v n } of distinct points in atwo-dimensional space. The pointv j is said to be arelative neighbour ofv i ifd p (v i ,v j )≤max{d p (v j ,v k ),d p (v j ,v k )} for allv k V, whered p denotes the distance in theL p metric, 1≤p≤∞. After dividing the space around the pointv i into eight sectors (regions) of equal size, a closest point tov i in some region is called anoctant (region, orgeographic) neighbour ofv i. For anyL p metric, a relative neighbour ofv i is always an octant neighbour in some region atv i. This gives a direct method for computing all relative neighbours, i.e. for establishing therelative neighbourhood graph ofV. For every pointv i ofV, first search for the octant neighbours ofv i in each region, and then for each octant neighbourv j found check whether the pointv j is also a relative neighbour ofv i. In theL p metric, 1<p<∞, the total number of octant neighbours is shown to be θ(n) for any set ofn points; hence, even a straightforward implementation of the above method runs in θn 2) time. In theL 1 andL metrics the method can be refined to a θ(n logn+m) algorithm, wherem is the number of relative neighbours in the output,n-1≤mn(n-1). TheL 1 (L ) algorithm is optimal within a constant factor.  相似文献   

13.
Given a real number sequence A=(a1,a2,…,an), an average lower bound L, and an average upper bound U, the Average-Constrained Maximum-Sum Segment problem is to locate a segment A(i,j)=(ai,ai+1,…,aj) that maximizes i?k?jak subject to . In this paper, we give an O(n)-time algorithm for the case where the average upper bound is ineffective, i.e., U=∞. On the other hand, we prove that the time complexity of the problem with an effective average upper bound is Ω(nlogn) even if the average lower bound is ineffective, i.e., L=−∞.  相似文献   

14.
We prove that there is a polynomial time substitution (y1,…,yn):=g(x1,…,xk) with k?n such that whenever the substitution instance A(g(x1,…,xk)) of a 3DNF formula A(y1,…,yn) has a short resolution proof it follows that A(y1,…,yn) is a tautology. The qualification “short” depends on the parameters k and n.  相似文献   

15.
It is shown that the following modification of the Steffensen procedurex n+1=x n ?k s (x n )f(x n ) (f[x n ,x n ?f(x n )])?1 (n=0,1,...) withk s (x)=(1?z s (x))?1,z s (x)=f(x) 2f[x?f(x),x,x+f(x)]×(f[x,x?f(x)])?2 is quadratically convergent to the root of the equation \(f(x) = (x - \bar x)^p g(x) = 0(p > 0,g(\bar x) \ne 0)\) . Furthermore \(\mathop {\lim }\limits_{n \to \infty } k_s (x_n ) = p\) holds.  相似文献   

16.
LetA be a matrix with real entries and letj(i) be the index of the leftmost column containing the maximum value in rowi ofA.A is said to bemonotone ifi 1 >i 2 implies thatj(i 1) ≥J(i 2).A istotally monotone if all of its submatrices are monotone. We show that finding the maximum entry in each row of an arbitraryn xm monotone matrix requires Θ(m logn) time, whereas if the matrix is totally monotone the time is Θ(m) whenmn and is Θ(m(1 + log(n/m))) whenm<n. The problem of finding the maximum value within each row of a totally monotone matrix arises in several geometric algorithms such as the all-farthest-neighbors problem for the vertices of a convex polygon. Previously only the property of monotonicity, not total monotonicity, had been used within these algorithms. We use the Θ(m) bound on finding the maxima of wide totally monotone matrices to speed up these algorithms by a factor of logn.  相似文献   

17.
Given an n-vertex convex polygon, we show that a shortest Hamiltonian path visiting all vertices without imposing any restriction on the starting and ending vertices of the path can be found in O(nlogn) time and Θ(n) space. The time complexity increases to O(nlog2 n) for computing this path inside an n-vertex simple polygon. The previous best algorithms for these problems are quadratic in time and space. For our purposes, we reformulate the above shortest-path problems in terms of a dynamic programming scheme involving falling staircase anti-Monge weight-arrays, and, in addition, we provide an O(nlogn) time and Θ(n) space algorithm to solve the following one-dimensional dynamic programming recurrence $$E[i] = \min _{1\le j\le k}\min _{k\le i} \{V[k-1] + b(i,j) + c(j,k)\},\quad i=1, \dots,n,$$ where V[0] is known, V[k], for k=1,…,n, can be computed from E[k] in constant time, and B={b(i,j)} and C={c(j,k)} are known falling staircase anti-Monge weight-arrays of size n×n.  相似文献   

18.
A. Bachem  B. Korte 《Computing》1979,23(2):189-198
Given a nonnegative real (m, n) matrixA and positive vectorsu, v, then the biproportional constrained matrix problem is to find a nonnegative (m, n) matrixB such thatB=diag (x) A diag (y) holds for some vectorsx ∈ ? m andy ∈ ? n and the row (column) sums ofB equalu i (v j )i=1,...,m(j=1,..., n). A solution procedure (called the RAS-method) was proposed by Bacharach [1] to solve this problem. The main disadvantage of this algorithm is, that round-off errors slow down the convergence. Here we present a modified RAS-method which together with several other improvements overcomes this disadvantage.  相似文献   

19.
When objects are scattered at random in the plane or in space, some of them overlap to form clumps. It is the object of the present paper to study the asymptotic distribution of the number of clumps of given size and topological structure generated within the following model: Ifx 1, ...,x n are points in ? n andU=-U?? n is a symmetric set, then the pointsx i andx j are said tooverlap or rather to form aU-coincidence, ifx i ?x j U. Adjoining tox 1, ...,x n andU, the graphG(x 1, ...,x n ;U)?({1, ..., n}, {[i, j]:1≤ix i ?x j ∈U}), the so calledcoincidence-graph, we ask for the number of connected components of this graph isomorphic to a given graphH and call this numberL9x 1, ...x n ;U, H). In the paper, the asymptotic distribution ofL(...) under various assumptions about the distribution of the pointsx 1, ...,x n and the size ofU is studied. Depending on these assumptions, we prove that the asymptotic distribution ofL(...) is either Poisson or normal.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号