首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
Graph drawing research has been mostly oriented toward two-dimensional drawings. This paper describes an investigation of fundamental aspects of three-dimensional graph drawing. In particular we give three results concerning the space required for three-dimensional drawings. We show how to produce a grid drawing of an arbitraryn-vertex graph with all vertices located at integer grid points, in ann×2n×2n grid, such that no pair of edges cross. This grid size is optimal to within a constant. We also show how to convert an orthogonal two-dimensional drawing in anH×V integer grid to a three-dimensional drawing with volume. Using this technique we show, for example, that three-dimensional drawings of binary trees can be computed with volume . We give an algorithm for producing drawings of rooted trees in which thez-coordinate of a node represents the depth of the node in the tree; our algorithm minimizes thefootprint of the drawing, that is, the size of the projection in thexy plane. Finally, we list significant unsolved problems in algorithms for three-dimensional graph drawing. This work was performed as part of the Information Visualization Group(IVG) at the University of Newcastle. The IVG is supported in part by IBM Toronto Laboratory.  相似文献   

2.
A digital disc is defined as the set of all integer points inside of a given real disc. In this paper we show that there are no more than
different (up to translations) digital discs consisting of n points.  相似文献   

3.
4.
The aim of our research is to demonstrate the role of attractive intermolecular potential energy on normal pressure tensor of confined molecular fluids inside nanoslit pores of two structureless purely repulsive parallel walls in xy plane at z = 0 and z = H, in equilibrium with a bulk homogeneous fluid at the same temperature and at a uniform density. To achieve this we have derived the perturbation theory version of the normal pressure tensor of confined inhomogeneous fluids in nanoslit pores:
$ P_{ZZ} = kT\rho \left( {Z_{1} } \right) + \pi kT\rho \left( {Z_{1} } \right)\int\limits_{ - d}^{0} {\rho \left( {Z_{2} } \right)} Z_{2}^{2} g_{Z,H} (d){\text{d}}Z_{2} - \frac{1}{2}\iint {\int\limits_{0}^{2\pi } {\phi^{\prime } \left( {\vec{r}_{2} } \right)\rho \left( {Z_{1} } \right)\rho \left( {Z_{2} } \right)g_{Z,H} (r_{2} )} }{\frac{{Z_{2}^{2} }}{{(R_{2}^{2} + Z_{2}^{2} )^{{\frac{1}{2}}} }}}R_{2} {\text{d}}R_{2} {\text{d}}Z_{2} {\text{d}}\Uptheta ;\quad \left| {\overset{\lower0.5em\hbox{$ P_{ZZ} = kT\rho \left( {Z_{1} } \right) + \pi kT\rho \left( {Z_{1} } \right)\int\limits_{ - d}^{0} {\rho \left( {Z_{2} } \right)} Z_{2}^{2} g_{Z,H} (d){\text{d}}Z_{2} - \frac{1}{2}\iint {\int\limits_{0}^{2\pi } {\phi^{\prime } \left( {\vec{r}_{2} } \right)\rho \left( {Z_{1} } \right)\rho \left( {Z_{2} } \right)g_{Z,H} (r_{2} )} }{\frac{{Z_{2}^{2} }}{{(R_{2}^{2} + Z_{2}^{2} )^{{\frac{1}{2}}} }}}R_{2} {\text{d}}R_{2} {\text{d}}Z_{2} {\text{d}}\Uptheta ;\quad \left| {\overset{\lower0.5em\hbox{  相似文献   

5.
We investigate the arithmetic formula complexity of the elementary symmetric polynomials Skn{S^k_n} . We show that every multilinear homogeneous formula computing Skn{S^k_n} has size at least kW(logk)n{k^{\Omega(\log k)}n} , and that product-depth d multilinear homogeneous formulas for Skn{S^k_n} have size at least 2W(k1/d)n{2^{\Omega(k^{1/d})}n} . Since Sn2n{S^{n}_{2n}} has a multilinear formula of size O(n 2), we obtain a superpolynomial separation between multilinear and multilinear homogeneous formulas. We also show that Skn{S^k_n} can be computed by homogeneous formulas of size kO(logk)n{k^{O(\log k)}n} , answering a question of Nisan and Wigderson. Finally, we present a superpolynomial separation between monotone and non-monotone formulas in the noncommutative setting, answering a question of Nisan.  相似文献   

6.
We generalize the recent relative loss bounds for on-line algorithms where the additional loss of the algorithm on the whole sequence of examples over the loss of the best expert is bounded. The generalization allows the sequence to be partitioned into segments, and the goal is to bound the additional loss of the algorithm over the sum of the losses of the best experts for each segment. This is to model situations in which the examples change and different experts are best for certain segments of the sequence of examples. In the single segment case, the additional loss is proportional to log n, where n is the number of experts and the constant of proportionality depends on the loss function. Our algorithms do not produce the best partition; however the loss bound shows that our predictions are close to those of the best partition. When the number of segments is k+1 and the sequence is of length &ell, we can bound the additional loss of our algorithm over the best partition by . For the case when the loss per trial is bounded by one, we obtain an algorithm whose additional loss over the loss of the best partition is independent of the length of the sequence. The additional loss becomes , where L is the loss of the best partitionwith k+1 segments. Our algorithms for tracking the predictions of the best expert aresimple adaptations of Vovk's original algorithm for the single best expert case. As in the original algorithms, we keep one weight per expert, and spend O(1) time per weight in each trial.  相似文献   

7.
We consider distributed broadcasting in radio networks, modeled as undirected graphs, whose nodes have no information on the topology of the network, nor even on their immediate neighborhood. For randomized broadcasting, we give an algorithm working in expected time in n-node radio networks of diameter D, which is optimal, as it matches the lower bounds of Alon et al. [1] and Kushilevitz and Mansour [16]. Our algorithm improves the best previously known randomized broadcasting algorithm of Bar-Yehuda, Goldreich and Itai [3], running in expected time . (In fact, our result holds also in the setting of n-node directed radio networks of radius D.) For deterministic broadcasting, we show the lower bound on broadcasting time in n-node radio networks of diameter D. This implies previously known lower bounds of Bar-Yehuda, Goldreich and Itai [3] and Bruschi and Del Pinto [5], and is sharper than any of them in many cases. We also give an algorithm working in time , thus shrinking - for the first time - the gap between the upper and the lower bound on deterministic broadcasting time to a logarithmic factor. Received: 1 August 2003, Accepted: 18 March 2005, Published online: 15 June 2005 Dariusz R. Kowalski: This work was done during the stay of Dariusz Kowalski at the Research Chair in Distributed Computing of the Université du Québec en Outaouais, as a postdoctoral fellow. Research supported in part by KBN grant 4T11C04425. Andrzej Pelc: Research of Andrzej Pelc was supported in part by NSERC discovery grant and by the Research Chair in Distributed Computing of the Université du Québec en Outaouais.  相似文献   

8.
A lagrangian for a k-essence field is constructed for a constant scalar potential, and its form is determined when the scale factor is very small as compared to the present epoch but very large as compared to the inflationary epoch. This means that one is already in an expanding and flat universe. The form is similar to that of an oscillator with time-dependent frequency. Expansion is naturally built into the theory with the existence of growing classical solutions of the scale factor. The formalism allows one to estimate the temperature fluctuations of the background radiation at these early stages (as compared to the present epoch) of the Universe. If the temperature is T a at time t a and T b at time t b (t b > t a ), then, for small times, the probability evolution for the logarithm of the inverse temperature can be estimated as
$ P\left( {b,a} \right) = \left| {\left\langle {\ln \left( {{1 \mathord{\left/ {\vphantom {1 {T_b }}} \right. \kern-\nulldelimiterspace} {T_b }}} \right),t_b } \right.} \right|\left. {\left. {\ln \left( {{1 \mathord{\left/ {\vphantom {1 {T_a }}} \right. \kern-\nulldelimiterspace} {T_a }}} \right),t_a } \right\rangle } \right|^2 \approx \left( {\frac{{3m_{Pl}^2 }} {{\pi ^2 \left( {t_b - t_a } \right)^3 }}} \right)\left( {\ln T_a } \right)^2 \left( {\ln Tb} \right)^2 \left( {1 - 3\gamma \left( {t_a + t_b } \right)} \right) $ P\left( {b,a} \right) = \left| {\left\langle {\ln \left( {{1 \mathord{\left/ {\vphantom {1 {T_b }}} \right. \kern-\nulldelimiterspace} {T_b }}} \right),t_b } \right.} \right|\left. {\left. {\ln \left( {{1 \mathord{\left/ {\vphantom {1 {T_a }}} \right. \kern-\nulldelimiterspace} {T_a }}} \right),t_a } \right\rangle } \right|^2 \approx \left( {\frac{{3m_{Pl}^2 }} {{\pi ^2 \left( {t_b - t_a } \right)^3 }}} \right)\left( {\ln T_a } \right)^2 \left( {\ln Tb} \right)^2 \left( {1 - 3\gamma \left( {t_a + t_b } \right)} \right)   相似文献   

9.
We present new baby steps/giant steps algorithms of asymptotically fast running time for dense matrix problems. Our algorithms compute the determinant, characteristic polynomial, Frobenius normal form and Smith normal form of a dense n × n matrix A with integer entries in and bit operations; here denotes the largest entry in absolute value and the exponent adjustment by +o(1) captures additional factors for positive real constants C1, C2, C3. The bit complexity results from using the classical cubic matrix multiplication algorithm. Our algorithms are randomized, and we can certify that the output is the determinant of A in a Las Vegas fashion. The second category of problems deals with the setting where the matrix A has elements from an abstract commutative ring, that is, when no divisions in the domain of entries are possible. We present algorithms that deterministically compute the determinant, characteristic polynomial and adjoint of A with n3.2+o(1) and O(n2.697263) ring additions, subtractions and multiplications.To B. David Saunders on the occasion of his 60th birthday  相似文献   

10.
In this paper we study quadrature formulas of the types (1) $$\int\limits_{ - 1}^1 {(1 - x^2 )^{\lambda - 1/2} f(x)dx = C_n^{ (\lambda )} \sum\limits_{i = 1}^n f (x_{n,i} ) + R_n \left[ f \right]} ,$$ (2) $$\int\limits_{ - 1}^1 {(1 - x^2 )^{\lambda - 1/2} f(x)dx = A_n^{ (\lambda )} \left[ {f\left( { - 1} \right) + f\left( 1 \right)} \right] + K_n^{ (\lambda )} \sum\limits_{i = 1}^n f (\bar x_{n,i} ) + \bar R_n \left[ f \right]} ,$$ with 0<λ<1, and we obtain inequalities for the degreeN of their polynomial exactness. By using such inequalities, the non-existence of (1), with λ=1/2,N=n+1 ifn is even andN=n ifn is odd, is directly proved forn=8 andn≥10. For the same value λ=1/2 andN=n+3 ifn is evenN=n+2 ifn is odd, the formula (2) does not exist forn≥12. Some intermediary results regarding the first zero and the corresponding Christoffel number of ultraspherical polynomialP n (λ) (x) are also obtained.  相似文献   

11.
A version of binary cascades iterative refinement (LSBCIR) for solving linear least squares problem min x b-Ax2,A(m*n),m>n=rank(A), to a prescribed accuracy ε>0 is proposed and investigated. The time cost of the process in the sequential computation is of order $$mn^2 M(t_0 ) + mnM\left( {\left\lceil {\log _2 /\varepsilon } \right\rceil } \right)$$ , wheret 0 is a basic mantissa length andM(t)=Kt 2 is the time cost of two numbers multiplication infl(t).  相似文献   

12.
We show in this note that the equation αx1 + #x22EF; +αxp?ACβy1 + α +βyq where + is an AC operator and αx stands for x+...+x (α times), has exactly $$\left( { - 1} \right)^{p + q} \sum\limits_{i = 0}^p {\sum\limits_{j = 0}^q {\left( { - 1} \right)^{1 + 1} \left( {\begin{array}{*{20}c} p \\ i \\ \end{array} } \right)\left( {\begin{array}{*{20}c} q \\ j \\ \end{array} } \right)} 2^{\left( {\alpha + \begin{array}{*{20}c} {j - 1} \\ \alpha \\ \end{array} } \right)\left( {\beta + \begin{array}{*{20}c} {i - 1} \\ \beta \\ \end{array} } \right)} } $$ minimal unifiers if gcd(α, β)=1.  相似文献   

13.
We present efficient algorithms for computing very sparse low distortion spanners in distributed networks and prove some non-trivial lower bounds on the tradeoff between time, sparseness, and distortion. All of our algorithms assume a synchronized distributed network, where relatively short messages may be communicated in each time step. Our first result is a fast distributed algorithm for finding an ${O(2^{{\rm log}^{*} n} {\rm log} n)}We present efficient algorithms for computing very sparse low distortion spanners in distributed networks and prove some non-trivial lower bounds on the tradeoff between time, sparseness, and distortion. All of our algorithms assume a synchronized distributed network, where relatively short messages may be communicated in each time step. Our first result is a fast distributed algorithm for finding an O(2log* n log n){O(2^{{\rm log}^{*} n} {\rm log} n)} -spanner with size O(n). Besides being nearly optimal in time and distortion, this algorithm appears to be the first that constructs an O(n)-size skeleton without requiring unbounded length messages or time proportional to the diameter of the network. Our second result is a new class of efficiently constructible (α, β)-spanners called Fibonacci spanners whose distortion improves with the distance being approximated. At their sparsest Fibonacci spanners can have nearly linear size, namely O(n(loglogn)f){O(n(\log \log n)^{\phi})} , where f = (1 + ?5)/2{\phi = (1 + \sqrt{5})/2} is the golden ratio. As the distance increases the multiplicative distortion of a Fibonacci spanner passes through four discrete stages, moving from logarithmic to log-logarithmic, then into a period where it is constant, tending to 3, followed by another period tending to 1. On the lower bound side we prove that many recent sequential spanner constructions have no efficient counterparts in distributed networks, even if the desired distortion only needs to be achieved on the average or for a tiny fraction of the vertices. In particular, any distance preservers, purely additive spanners, or spanners with sublinear additive distortion must either be very dense, slow to construct, or have very weak guarantees on distortion.  相似文献   

14.
H. H. Gonska  J. Meier 《Calcolo》1984,21(4):317-335
In 1972 D. D. Stancu introduced a generalization \(L_{mp} ^{< \alpha \beta \gamma > }\) of the classical Bernstein operators given by the formula $$L_{mp}< \alpha \beta \gamma > (f,x) = \sum\limits_{k = 0}^{m + p} {\left( {\begin{array}{*{20}c} {m + p} \\ k \\ \end{array} } \right)} \frac{{x^{(k, - \alpha )} \cdot (1 - x)^{(m + p - k, - \alpha )} }}{{1^{(m + p, - \alpha )} }}f\left( {\frac{{k + \beta }}{{m + \gamma }}} \right)$$ . Special cases of these operators had been investigated before by quite a number of authors and have been under investigation since then. The aim of the present paper is to prove general results for all positiveL mp <αβγ> 's as far as direct theorems involving different kinds of moduli of continuity are concerned. When applied to special cases considered previously, all our corollaries of the general theorems will be as good as or yield improvements of the known results. All estimates involving the second order modulus of continuity are new.  相似文献   

15.
In this paper we study quadrature formulas of the form $$\int\limits_{ - 1}^1 {(1 - x)^a (1 + x)^\beta f(x)dx = \sum\limits_{i = 0}^{r - 1} {[A_i f^{(i)} ( - 1) + B_i f^{(i)} (1)] + K_n (\alpha ,\beta ;r)\sum\limits_{i = 1}^n {f(x_{n,i} ),} } } $$ (α>?1, β>?1), with realA i ,B i ,K n and real nodesx n,i in (?1,1), valid for prolynomials of degree ≤2n+2r?1. In the first part we prove that there is validity for polynomials exactly of degree2n+2r?1 if and only if α=β=?1/2 andr=0 orr=1. In the second part we consider the problem of the existence of the formula $$\int\limits_{ - 1}^1 {(1 - x^2 )^{\lambda - {1 \mathord{\left/ {\vphantom {1 2}} \right. \kern-\nulldelimiterspace} 2}} f(x)dx = A_n f( - 1) + B_n f(1) + C\sum\limits_{i = 1}^n {f(x_{n,i} )} }$$ for polynomials of degree ≤n+2. Some numerical results are given when λ=1/2.  相似文献   

16.
This paper examine the Euler-Lagrange equations for the solution of the large deformation diffeomorphic metric mapping problem studied in Dupuis et al. (1998) and Trouvé (1995) in which two images I 0, I 1 are given and connected via the diffeomorphic change of coordinates I 0○ϕ−1=I 1 where ϕ=Φ1 is the end point at t= 1 of curve Φ t , t∈[0, 1] satisfying .Φ t =v t t ), t∈ [0,1] with Φ0=id. The variational problem takes the form
where ‖v t V is an appropriate Sobolev norm on the velocity field v t(·), and the second term enforces matching of the images with ‖·‖L 2 representing the squared-error norm.In this paper we derive the Euler-Lagrange equations characterizing the minimizing vector fields v t, t∈[0, 1] assuming sufficient smoothness of the norm to guarantee existence of solutions in the space of diffeomorphisms. We describe the implementation of the Euler equations using semi-lagrangian method of computing particle flows and show the solutions for various examples. As well, we compute the metric distance on several anatomical configurations as measured by ∫0 1v t V dt on the geodesic shortest paths.  相似文献   

17.
The aim of our research is to develop a theory, which can predict the behavior of confined fluids in nanoslit pores. The nanoslit pores studied in this work consist of two structureless and parallel walls in the xy plane located at z = 0 and z = H, in equilibrium with a bulk homogeneous fluid at the same temperature and at a given uniform bulk density. We have derived the following general equation for prediction of the normal pressure tensor P zz of confined inhomogeneous fluids in nanoslit pores:
$ P_{zz} = kT\rho \left( {r_{1z} } \right)\left[ {1 + \frac{1}{kT}\frac{{\partial \phi_{\text{ext}} }}{{\partial r_{1z} }}{\text{d}}r_{1z} } \right] - \frac{1}{2}\int\limits_{v} {\varphi^{\prime}(\vec{r}_{12} )\rho^{(2)} \left( {\overset{\lower0.5em\hbox{$ P_{zz} = kT\rho \left( {r_{1z} } \right)\left[ {1 + \frac{1}{kT}\frac{{\partial \phi_{\text{ext}} }}{{\partial r_{1z} }}{\text{d}}r_{1z} } \right] - \frac{1}{2}\int\limits_{v} {\varphi^{\prime}(\vec{r}_{12} )\rho^{(2)} \left( {\overset{\lower0.5em\hbox{  相似文献   

18.
Summary The k-th threshold function, T k n , is defined as: where x i{0,1} and the summation is arithmetic. We prove that any monotone network computing T 3/n(x 1,...,x n) contains at least 2.5n-5.5 gates.This research was supported by the Science and Engineering Research Council of Great Britain, UK  相似文献   

19.
P. Wynn 《Calcolo》1971,8(3):255-272
The transformation (*) $$\sum\limits_{\nu = 0}^\infty {t_\nu z^\nu \to } \sum\limits_{\nu = 0}^\infty {\left\{ {\sum\limits_{\tau = 0}^{h - 1} {z^\tau } \Delta ^\nu t_{h\nu + \tau } + \frac{{z^h }}{{1 - z}}\Delta ^\nu t_{h(\nu + 1)} } \right\}} \left( {\frac{{z^{h + 1} }}{{1 - z}}} \right)^\nu$$ whereh≥0 is an integer and Δ operates upon the coefficients {t v } of the series being transformed, is derived. Whenh=0, the above transformation is the generalised Euler transformation, of which (*) is itself a generalisation. Based upon the assumption that \(t_\nu = \int\limits_0^1 {\varrho ^\nu d\sigma (\varrho ) } (\nu = 0, 1,...)\) , where σ(?) is bounded and non-decreasing for 0≤?≤1 and subject to further restrictions, a convergence theory of (*) is given. Furthermore, the question as to when (*) functions as a convergence acceleration transformation is investigated. Also the optimal valne ofh to be taken is derived. A simple algorithm for constructing the partial sums of (*) is devised. Numerical illustrations relating to the case in whicht v =(v+1) ?1 (v=0,1,...) are given.  相似文献   

20.
We present several results related to the complexity-performance tradeoff in lossy compression. The first result shows that for a memoryless source with rate-distortion function R(D) and a bounded distortion measure, the rate-distortion point (R(D) + γ, D + ?) can be achieved with constant decompression time per (separable) symbol and compression time per symbol proportional to $\left( {{{\lambda _1 } \mathord{\left/ {\vphantom {{\lambda _1 } \varepsilon }} \right. \kern-0em} \varepsilon }} \right)^{{{\lambda _2 } \mathord{\left/ {\vphantom {{\lambda _2 } {\gamma ^2 }}} \right. \kern-0em} {\gamma ^2 }}}$ , where λ 1 and λ 2 are source dependent constants. The second result establishes that the same point can be achieved with constant decompression time and compression time per symbol proportional to $\left( {{{\rho _1 } \mathord{\left/ {\vphantom {{\rho _1 } \gamma }} \right. \kern-0em} \gamma }} \right)^{{{\rho _2 } \mathord{\left/ {\vphantom {{\rho _2 } {\varepsilon ^2 }}} \right. \kern-0em} {\varepsilon ^2 }}}$ . These results imply, for any function g(n) that increases without bound arbitrarily slowly, the existence of a sequence of lossy compression schemes of blocklength n with O(ng(n)) compression complexity and O(n) decompression complexity that achieve the point (R(D), D) asymptotically with increasing blocklength. We also establish that if the reproduction alphabet is finite, then for any given R there exists a universal lossy compression scheme with O(ng(n)) compression complexity and O(n) decompression complexity that achieves the point (R, D(R)) asymptotically for any stationary ergodic source with distortion-rate function D(·).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号