首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
The focus of the present paper is on providing a local deterministic algorithm for colouring the edges of Yao-like   subgraphs of Unit Disk Graphs. These are geometric graphs such that for some positive integers l,kl,k the following property holds at each node vv: if we partition the unit circle centered at vv into 2k2k equally sized wedges then each wedge can contain at most ll points different from vv. We assume that the nodes are location aware, i.e. they know their Cartesian coordinates in the plane. The algorithm presented is local in the sense that each node can receive information emanating only from nodes which are at most a constant (depending on kk and ll, but not on the size of the graph) number of hops (measured in the original underlying Unit Disk Graph) away from it, and hence the algorithm terminates in a constant number of steps. The number of colours used is 2kl+12kl+1 and this is optimal for local algorithms (since the maximal degree is 2kl2kl and a colouring with 2kl2kl colours can only be constructed by a global algorithm), thus showing that in this class of graphs the price for locality is only one additional colour.  相似文献   

3.
4.
We consider the problem of maximizing the mean-variance utility function of nn assets. Associated with a change in an asset's holdings from its current or target value is a transaction cost. These must be accounted for in practical problems. A straightforward way of doing so results in a 3n3n-dimensional optimization problem with 3n3n additional constraints. This higher dimensional problem is computationally expensive to solve. We present an algorithm for solving the 3n3n-dimensional problem by modifying an active set quadratic programming (QP) algorithm to solve the 3n3n-dimensional problem as an nn-dimensional problem accounting for the transaction costs implicitly rather than explicitly. The method is based on deriving the optimality conditions for the higher dimensional problem solely in terms of lower dimensional quantities and requires substantially less computational effort than any active set QP algorithm applied directly on a 3n3n-dimensional problem.  相似文献   

5.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

6.
Solomonoff’s central result on induction is that the prediction of a universal semimeasure MM converges rapidly and with probability 1 to the true sequence generating predictor μμ, if the latter is computable. Hence, MM is eligible as a universal sequence predictor in the case of unknown μμ. Despite some nearby results and proofs in the literature, the stronger result of convergence for all (Martin-Löf) random sequences remained open. Such a convergence result would be particularly interesting and natural, since randomness can be defined in terms of MM itself. We show that there are universal semimeasures MM which do not converge to μμ on all μμ-random sequences, i.e. we give a partial negative answer to the open problem. We also provide a positive answer for some non-universal semimeasures. We define the incomputable measure DD as a mixture over all computable measures and the enumerable semimeasure WW as a mixture over all enumerable nearly measures. We show that WW converges to DD and DD to μμ on all random sequences. The Hellinger distance measuring closeness of two distributions plays a central role.  相似文献   

7.
This paper concerns construction of additive stretched spanners with few edges for nn-vertex graphs having a tree-decomposition into bags of diameter at most δδ, i.e., the tree-length δδ graphs. For such graphs we construct additive 2δ2δ-spanners with O(δn+nlogn)O(δn+nlogn) edges, and additive 4δ4δ-spanners with O(δn)O(δn) edges. This provides new upper bounds for chordal graphs for which δ=1δ=1. We also show a lower bound, and prove that there are graphs of tree-length δδ for which every multiplicative δδ-spanner (and thus every additive (δ−1)(δ1)-spanner) requires Ω(n1+1/Θ(δ))Ω(n1+1/Θ(δ)) edges.  相似文献   

8.
9.
The present paper investigates two-parameter families of spheres in R3R3 and their corresponding two-dimensional surfaces ΦΦ in R4R4. Considering a rational surface ΦΦ in R4R4, the envelope surface ΨΨ of the corresponding family of spheres in R3R3 is typically non-rational. Using a classical sphere-geometric approach, we prove that the envelope surface ΨΨ and its offset surfaces admit rational parameterizations if and only if ΦΦ is a rational sub-variety of a rational isotropic hyper-surface in R4R4. The close relation between the envelope surfaces ΨΨ and rational offset surfaces in R3R3 is elaborated in detail. This connection leads to explicit rational parameterizations for all rational surfaces ΦΦ in R4R4 whose corresponding two-parameter families of spheres possess envelope surfaces admitting rational parameterizations. Finally we discuss several classes of surfaces sharing this property.  相似文献   

10.
We consider orthogonal drawings of a plane graph GG with specified face areas. For a natural number kk, a kk-gonal drawing of GG is an orthogonal drawing such that the boundary of GG is drawn as a rectangle and each inner face is drawn as a polygon with at most kk corners whose area is equal to the specified value. In this paper, we show that every slicing graph GG with a slicing tree TT and a set of specified face areas admits a 10-gonal drawing DD such that the boundary of each slicing subgraph that appears in TT is also drawn as a polygon with at most 10 corners. Such a drawing DD can be found in linear time.  相似文献   

11.
We present algorithmic lower bounds on the size sdsd of the largest independent sets of vertices in random dd-regular graphs, for each fixed d≥3d3. For instance, for d=3d=3 we prove that, for graphs on nn vertices, sd≥0.43475nsd0.43475n with probability approaching one as nn tends to infinity.  相似文献   

12.
Motivated by the famous 3n+13n+1 conjecture, we call a mapping from ZZ to ZZresidue-class-wise affine   if there is a positive integer mm such that it is affine on residue classes (mod mm). This article describes a collection of algorithms and methods for computation in permutation groups and monoids formed by residue-class-wise affine mappings.  相似文献   

13.
14.
We define an operation called transposition on words of fixed length. This operation arises naturally when the letters of a word are considered as entries of a matrix. Words that are invariant with respect to transposition are of special interest. It turns out that transposition invariant words have a simple interpretation by means of elementary group theory. This leads us to investigate some properties of the ring of integers modulo nn and primitive roots. In particular, we show that there are infinitely many prime numbers pp with a primitive root dividing p+1p+1 and infinitely many prime numbers pp without a primitive root dividing p+1p+1. We also consider the orbit of a word under transposition.  相似文献   

15.
This paper deals with the existence and search for properly edge-colored paths/trails between two, not necessarily distinct, vertices ss and tt in an edge-colored graph from an algorithmic perspective. First we show that several versions of the s−tst path/trail problem have polynomial solutions including the shortest path/trail case. We give polynomial algorithms for finding a longest properly edge-colored path/trail between ss and tt for a particular class of graphs and characterize edge-colored graphs without properly edge-colored closed trails. Next, we prove that deciding whether there exist kk pairwise vertex/edge disjoint properly edge-colored s−tst paths/trails in a cc-edge-colored graph GcGc is NP-complete even for k=2k=2 and c=Ω(n2)c=Ω(n2), where nn denotes the number of vertices in GcGc. Moreover, we prove that these problems remain NP-complete for cc-edge-colored graphs containing no properly edge-colored cycles and c=Ω(n)c=Ω(n). We obtain some approximation results for those maximization problems together with polynomial results for some particular classes of edge-colored graphs.  相似文献   

16.
Slimmed fat-trees have recently been proposed and deployed to reduce costs in High Performance Computing (HPC) clusters. While existing static routing schemes such as destination-mod-k (D-mod-k) routing are load-balanced and effective for full bisection bandwidth fat-trees, they incur significant load imbalance in many slimmed fat-trees. In this work, we propose a static load balanced routing scheme, called Round-Robin Routing (RRRRRR), for 22- and 33-level extended generalized fat-trees (XGFTs), which represent many fat-tree variations including slimmed fat-trees. RRRRRR achieves near perfect load-balancing for any such XGFT in that links at the same level of a tree carry traffic from almost the same number of source–destination pairs. Our evaluation results indicate that on many slimmed fat-trees, RRRRRR is significantly better than D-mod-k for dense traffic patterns due to its better load-balancing property, but performs worse for sparse patterns. We develop a combined routing scheme that enjoys the strengths of both RRRRRR and D-mod-k by using RRRRRR in conjunction with D-mod-k. The combined routing is a robust load-balanced routing scheme for slimmed fat-trees: it performs similar to D-mod-k for sparse traffic patterns and to RRRRRR for dense patterns.  相似文献   

17.
Let F(x,y)F(x,y) be a polynomial over a field KK and mm a nonnegative integer. We call a polynomial gg over KK an mm-near solution of F(x,y)F(x,y) if there exists a c∈KcK such that F(x,g)=cxmF(x,g)=cxm, and the number cc is called an mm-value of F(x,y)F(x,y) corresponding to gg. In particular, cc can be 0. Hence, by viewing F(x,y)=0F(x,y)=0 as a polynomial equation over K[x]K[x] with variable yy, every solution of the equation F(x,y)=0F(x,y)=0 in K[x]K[x] is also an mm-near solution. We provide an algorithm that gives all mm-near solutions of a given polynomial F(x,y)F(x,y) over KK, and this algorithm is polynomial time reducible to solving one variable equations over KK. We introduce approximate solutions to analyze the algorithm. We also give some interesting properties of approximate solutions.  相似文献   

18.
We investigate the group key management problem for broadcasting applications. Previous work showed that, in handling key updates, batch rekeying can be more cost effective than individual rekeying. One model for batch rekeying is to assume that every user has probability pp of being replaced by a new user during a batch period with the total number of users unchanged. Under this model, it was recently shown that an optimal key tree can be constructed in linear time when pp is a constant and in O(n4)O(n4) time when p→0p0. In this paper, we investigate more efficient algorithms for the case p→0p0, i.e., when membership changes are sparse. We design an O(n)O(n) heuristic algorithm for the sparse case and show that it produces a nearly 2-approximation to the optimal key tree. Simulation results show that its performance is even better in practice. We also design a refined heuristic algorithm and show that it achieves an approximation ratio of 1+?1+? for any fixed ?>0?>0 and nn, as p→0p0. Finally, we give another approximation algorithm for any p∈(0,0.693)p(0,0.693) which is shown to be quite good by our simulations.  相似文献   

19.
In this paper we provide an explicit way to compute asymptotically almost sure upper bounds on the bisection width of random dd-regular graphs, for any value of dd. The upper bounds are obtained from the analysis of the performance of a randomized greedy algorithm to find bisections of dd-regular graphs. We provide bounds for 5≤d≤125d12. We also give empirical values of the size of the bisection found by the algorithm for some small values of dd and compare them with numerical approximations of our theoretical bounds. Our analysis also gives asymptotic lower bounds for the size of the maximum bisection.  相似文献   

20.
The replication number   of a branching program is the minimum number RR such that along every accepting computation at most RR variables are tested more than once; the sets of variables re-tested along different computations may be different. For every branching program, this number lies between 00 (read-once programs) and the total number nn of variables (general branching programs). The best results so far were exponential lower bounds on the size of branching programs with R=o(n/logn)R=o(n/logn). We improve this to R≤?nR?n for a constant ?>0?>0. This also gives an alternative and simpler proof of an exponential lower bound for (1+?)n(1+?)n time branching programs for a constant ?>0?>0. We prove these lower bounds for quadratic functions of Ramanujan graphs.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号