首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 578 毫秒
1.
2.
We consider a variant of Gold’s learning paradigm where a learner receives as input nn different languages (in the form of one text where all input languages are interleaved). Our goal is to explore the situation when a more “coarse” classification of input languages is possible, whereas more refined classification is not. More specifically, we answer the following question: under which conditions, a learner, being fed nn different languages, can produce mm grammars covering all input languages, but cannot produce kk grammars covering input languages for any k>mk>m. We also consider a variant of this task, where each of the output grammars may not cover more than rr input languages. Our main results indicate that the major factor affecting classification capabilities is the difference n−mnm between the number nn of input languages and the number mm of output grammars. We also explore the relationship between classification capabilities for smaller and larger groups of input languages. For the variant of our model with the upper bound on the number of languages allowed to be represented by one output grammar, for classes consisting of disjoint languages, we found complete picture of relationship between classification capabilities for different parameters nn (the number of input languages), mm (number of output grammars), and rr (bound on the number of languages represented by each output grammar). This picture includes a combinatorial characterization of classification capabilities for the parameters n,m,rn,m,r of certain types.  相似文献   

3.
This paper deals with the existence and search for properly edge-colored paths/trails between two, not necessarily distinct, vertices ss and tt in an edge-colored graph from an algorithmic perspective. First we show that several versions of the s−tst path/trail problem have polynomial solutions including the shortest path/trail case. We give polynomial algorithms for finding a longest properly edge-colored path/trail between ss and tt for a particular class of graphs and characterize edge-colored graphs without properly edge-colored closed trails. Next, we prove that deciding whether there exist kk pairwise vertex/edge disjoint properly edge-colored s−tst paths/trails in a cc-edge-colored graph GcGc is NP-complete even for k=2k=2 and c=Ω(n2)c=Ω(n2), where nn denotes the number of vertices in GcGc. Moreover, we prove that these problems remain NP-complete for cc-edge-colored graphs containing no properly edge-colored cycles and c=Ω(n)c=Ω(n). We obtain some approximation results for those maximization problems together with polynomial results for some particular classes of edge-colored graphs.  相似文献   

4.
The claw finding problem has been studied in terms of query complexity as one of the problems closely connected to cryptography. Given two functions, ff and gg, with domain sizes NN and MM(N≤M)(NM), respectively, and the same range, the goal of the problem is to find xx and yy such that f(x)=g(y)f(x)=g(y). This problem has been considered in both quantum and classical settings in terms of query complexity. This paper describes an optimal algorithm that uses quantum walk to solve this problem. Our algorithm can be slightly modified to solve the more general problem of finding a tuple consisting of elements in the two function domains that has a prespecified property. It can also be generalized to find a claw of kk functions for any constant integer k>1k>1, where the domain sizes of the functions may be different.  相似文献   

5.
We consider time-space tradeoffs for static data structure problems in the cell probe model with word size 1 (the bit probe model). In this model, the goal is to represent nn-bit data with s=n+rs=n+r bits such that queries (of a certain type) about the data can be answered by reading at most tt bits of the representation. Ideally, we would like to keep both ss and tt small, but there are tradeoffs between the values of ss and tt that limit the possibilities of keeping both parameters small.  相似文献   

6.
Fraenkel and Simpson [A.S. Fraenkel, J. Simpson, How many squares can a string contain? J. Combin. Theory Ser. A 82 (1998) 112–120] proved that the number of squares in a word of length nn is bounded by 2n2n. In this note we improve this bound to 2n−Θ(logn)2nΘ(logn). Based on the numerical evidence, the conjectured bound is nn.  相似文献   

7.
We show how to compute Hong’s bound for the absolute positiveness of a polynomial in dd variables with maximum degree δδ in O(nlogdn)O(nlogdn) time, where nn is the number of non-zero coefficients. For the univariate case, we give a linear time algorithm. As a consequence, the time bounds for the continued fraction algorithm for real root isolation improve by a factor of δδ.  相似文献   

8.
The replication number   of a branching program is the minimum number RR such that along every accepting computation at most RR variables are tested more than once; the sets of variables re-tested along different computations may be different. For every branching program, this number lies between 00 (read-once programs) and the total number nn of variables (general branching programs). The best results so far were exponential lower bounds on the size of branching programs with R=o(n/logn)R=o(n/logn). We improve this to R≤?nR?n for a constant ?>0?>0. This also gives an alternative and simpler proof of an exponential lower bound for (1+?)n(1+?)n time branching programs for a constant ?>0?>0. We prove these lower bounds for quadratic functions of Ramanujan graphs.  相似文献   

9.
10.
The most natural and perhaps most frequently used method for testing membership of an individual tuple in a conjunctive query is based on searching trees of partial solutions, or search-trees. We investigate the question of evaluating conjunctive queries with a time-bound guarantee that is measured as a function of the size of the optimal search-tree. We provide an algorithm that, given a database DD, a conjunctive query QQ, and a tuple aa, tests whether Q(a)Q(a) holds in DD in time bounded by a polynomial in (sn)logk(sn)loglogn(sn)logk(sn)loglogn and nrnr, where nn is the size of the domain of the database, kk is the number of bound variables of the conjunctive query, ss is the size of the optimal search-tree, and rr is the maximum arity of the relations. In many cases of interest, this bound is significantly smaller than the nO(k)nO(k) bound provided by the naive search-tree method. Moreover, our algorithm has the advantage of guaranteeing the bound for any given conjunctive query. In particular, it guarantees the bound for queries that admit an equivalent form that is much easier to evaluate, even when finding such a form is an NP-hard task. Concrete examples include the conjunctive queries that can be non-trivially folded into a conjunctive query of bounded size or bounded treewidth. All our results translate to the context of constraint-satisfaction problems via the well-publicized correspondence between both frameworks.  相似文献   

11.
Let D=K[X]D=K[X] be a ring of Ore polynomials over a field KK and let a partition of the set of indeterminates into pp disjoint subsets be fixed. Considering DD as a filtered ring with the natural pp-dimensional filtration, we introduce a special type of reduction in a free DD-module and develop the corresponding Gröbner basis technique (in particular, we obtain a generalization of the Buchberger Algorithm). Using such a modification of the Gröbner basis method, we prove the existence of a Hilbert-type dimension polynomial in pp variables associated with a finitely generated filtered DD-module, give a method of computation and describe invariants of such a polynomial. The results obtained are applied in differential algebra where the classical theorems on differential dimension polynomials are generalized to the case of differential structures with several basic sets of derivation operators.  相似文献   

12.
We prove that a polynomial f∈R[x,y]fR[x,y] with tt non-zero terms, restricted to a real line y=ax+by=ax+b, either has at most 6t−46t4 zeros or vanishes over the whole line. As a consequence, we derive an alternative algorithm for deciding whether a linear polynomial y−ax−b∈K[x,y]yaxbK[x,y] divides a lacunary polynomial f∈K[x,y]fK[x,y], where KK is a real number field. The number of bit operations performed by the algorithm is polynomial in the number of non-zero terms of ff, in the logarithm of the degree of ff, in the degree of the extension K/QK/Q and in the logarithmic height of aa, bb and ff.  相似文献   

13.
We present a new positive lower bound for the minimum value taken by a polynomial PP with integer coefficients in kk variables over the standard simplex of RkRk, assuming that PP is positive on the simplex. This bound depends only on the number of variables kk, the degree dd and the bitsize ττ of the coefficients of PP and improves all the previous bounds for arbitrary polynomials which are positive over the simplex.  相似文献   

14.
15.
16.
17.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

18.
This paper mathematically analyzes the integral generalized policy iteration (I-GPI) algorithms applied to a class of continuous-time linear quadratic regulation (LQR) problems with the unknown system matrix AA. GPI is the general idea of interacting policy evaluation and policy improvement steps of policy iteration (PI), for computing the optimal policy. We first introduce the update horizon ??, and then show that (i) all of the I-GPI methods with the same ?? can be considered equivalent and that (ii) the value function approximated in the policy evaluation step monotonically converges to the exact one as ?→∞?. This reveals the relation between the computational complexity and the update (or time) horizon of I-GPI as well as between I-PI and I-GPI in the limit ?→∞?. We also provide and discuss two modes of convergence of I-GPI; I-GPI behaves like PI in one mode, and in the other mode, it performs like value iteration for discrete-time LQR and infinitesimal GPI (?→0?0). From these results, a new classification of the integral reinforcement learning is formed with respect to ??. Two matrix inequality conditions for stability, the region of local monotone convergence, and data-driven (adaptive) implementation methods are also provided with detailed discussion. Numerical simulations are carried out for verification and further investigations.  相似文献   

19.
We study the state complexity of certain simple languages. If AA is an alphabet of kk letters, then a kk-language   is a nonempty set of words of length kk, that is, a uniform language of length kk. We show that the minimal state complexity of a kk-language is k+2k+2, and the maximal, (kk−1−1)/(k−1)+2k+1(kk11)/(k1)+2k+1. We prove constructively that, for every ii between the minimal and maximal bounds, there is a language of state complexity ii. We introduce a class of automata accepting sets of words that are permutations of AA; these languages define a complete hierarchy of complexities between k2−k+3k2k+3 and 2k+12k+1. The languages of another class of automata, based on kk-ary trees, define a complete hierarchy of complexities between 2k+12k+1 and (kk−1−1)/(k−1)+2k+1(kk11)/(k1)+2k+1. This provides new examples of uniform languages of maximal complexity.  相似文献   

20.
For a field kk with an automorphism σσ and a derivation δδ, we introduce the notion of Liouvillian solutions of linear difference–differential systems {σ(Y)=AY,δ(Y)=BY}{σ(Y)=AY,δ(Y)=BY} over kk and characterize the existence of Liouvillian solutions in terms of the Galois group of the systems. In the forthcoming paper, we will propose an algorithm for deciding if linear difference–differential systems of prime order have Liouvillian solutions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号