首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We discuss the uniform computational complexity of the derivatives of C-functions in the model of Ko and Friedman (Ko, Complexity Theory of Real Functions, Birkhäuser, Basel, 1991; Ko, Friedman, Theor. Comput. Sci. 20 (1982) 323–352). We construct a polynomial time computable real function gC[−1,1] such that the sequence {|g(n)(0)|}n∈N is not bounded by any recursive function. On the other hand, we show that if fC[−1,1] is polynomial time computable and the sequence of the derivatives of f is uniformly polynomially bounded, i.e., |f(n)(x)| is bounded by 2p(n) for all x∈[−1,1] for some polynomial p, then the sequence {f(n)}n∈N is uniformly polynomial time computable.  相似文献   

2.
3.
This paper analyzes the average number of nodes expanded by A1 as a function of the accuracy of its heuristic estimates, by treating the errors h1 - h as random variables whose distribution may vary over the nodes in the graph. The search model consists of an m-ary tree with unit branch costs and a unique goal state situated at a distance N from the root.The main result states that if the typical error grows like φ(h1) then the mean complexity of A1 grows approximately like G(N)exp[(N)], where c is a positive constant and G(N) is O(N2). Thus, a necessary and sufficient condition for maintaining polynomial search complexity is that A1 be guided by heuristics with logarithmic precision, e.g. φ(N) = (log N)k. A1 is shown to make much greater use of its heuristic knowledge than a backtracking procedure would under similar conditions.  相似文献   

4.
First, on any sequence of real numbers (xλ), λ ? [? Λ1 + Λ] ? Z, the pseudo probability Pr(x, x′) of the event xλ?[x, x′[ is defined to be the limit when Λ → ∞ of the ratio of the number of xλ?[x, x′[ to the total number of xλ. The a.d.f. (asymptotic distribution function) of the sequence is then defined by F(x) = Pr(? ∞, x); it possesses the properties of a d.f. (distribution function). Consequently, what is said below applies equally to a sequence of r.v. (random variables) or to a sequence of p.r.v. (pseudorandom variables) consisting of a sequence (nxλ), n ? [? N, + N] ? Z of sequences nxλ, λ ? [? Λ, + Λ] ? Z.A weyl's polynomial ?n(λ) is a polynomial such that one of its coefficieints other than ?(0) is irrational. Then any sequence, the fractional part of ?n(λ), λ ? [? Λ, + Λ] ? Z, is asymptotically equidistributed on [0, 1].A property is given which permits the construction of a sequence (nxλ), n ? [? N, + N] ? Z of pseudostochastically independent sequences nxλ, λ ? [? Λ, + Λ] ? Z.It is known that setting Yn = F(? 1)(Xn), it is possible to transform any sequence of r.v. Xn  相似文献   

5.
The number of required deques for sorting all sequences of n items in a parallel or series network of deques is considered. It is shown that the optimal number of required deques is O(n12) for a parallel network, while it is O(log n) for a series network. These orders, O(n12) and O(log n), also remain valid for the networks of restricted deques.  相似文献   

6.
The problem of estimating the number of markets (or plants) to serve a set of sources in a given geographical area was considered. Markets were located so as to minimize total assembly cost which was considered a linear function of the weighted Euclidean distances between sources and markets. The following predictive function Cm was proposed for estimating the minimum total assembly cost for a given number of markets: Cm = C1 ?(m?1m)k(MM ? 1)k(C1 ? CM),m = 1, 2, 3, …, M where m = number of markets being located. M = maximum number of potential market sites. C1 = minimum assembly cost when only one market is located. CM = minimum assembly cost when all M markets are located. k = an undetermined constant which specifies the shape of the function.The validity of the Cm function and the range of the k constant were determined by computer Monte Carlo experimentation. The constant k, to a sufficient degree of approximation and ordinary use, was found independent of the number of sources and their distribution. A general economic location co  相似文献   

7.
This study addresses the problem of achieving higher-level multi-fault restoration in wavelength division multiplexing (WDM) networks with no wavelength conversion capability. A heuristic scheme, designated as the Directional Cycle Decomposition Algorithm (DCDA), is developed to maximize the number of tolerable faults utilizing only 100% redundancy in WDM networks without wavelength conversion. The redundancy is calculated as the required spare capacity over the given working capacity. The process of identifying the maximum number of tolerable faults is modeled as a constrained ring cover set problem. DCDA decomposes this problem into three steps and has an overall computational complexity of O(∣E∣∣V∣(C + 1) + E∣(C2 + 1)), where ∣V∣, ∣E∣ and C represent the number of vertices, the number of edges in the graph and the number of cycles in the cycle cover, respectively. The evaluation results reveal that the average number of tolerable simultaneous faults increases considerably under DCDA and the maximum number of tolerable simultaneous faults approaches the optimal solution provided by the brute-force method. DCDA facilitates an improved best-effort multi-fault restorability for a variety of planar and non-planar network topologies. An analytical method is proposed to facilitate a rapid estimation of the multi-fault restorability in a network using DCDA without the need for experimental evaluations. In addition, an approximation method is developed to obtain an estimate of the multi-fault restorability directly from DCDA without the requirement for a detailed knowledge of the network topology and restoration routes. The results show that the average errors in the approximated restorability values obtained using this method range from 0.12% (New Jersey) to 1.58% (Cost 239).  相似文献   

8.
The model most frequently used for evaluating the behavior of game-searching methods consists of a uniform tree of height h and a branching degree d, where the terminal positions are assigned random, independent and identically distributed values. This paper highlights some curious properties of such trees when h is very large and examines their implications on the complexity of various game-searching methods.If the terminal positions are assigned a WIN-LOSS status with the probabilities P0 and 1 ? P0, respectively, then the root node is almost a sure MIN or a sure LOSS, depending on whether P0 is higher or lower than some fixed-point probability P1(d). When the terminal positions are assigned continuous real values, the minimax value of the root node converges rapidly to a unique predetermined value v1, which is the (1 ? P1)-fractile of the terminal distribution.Exploiting these properties we show that a game with WIN-LOSS terminals can be solved by examining, on the average, O[(d)h2] terminal positions if positions if P0 ≠ P1 and O[(P1(1 ? P1))h] positions if P0 = P1, the former performance being optimal for all search algorithms. We further show that a game with continuous terminal values can be evaluated by examining an average of O[(P1(1 ? P1))h] positions, and that this is a lower bound for all directional algorithms. Games with discrete terminal values can, in almost all cases, be evaluated by examining an average of O[(d)h2] terminal positions. This performance is optimal and is also achieved by the ALPHA-BETA procedure.  相似文献   

9.
We consider the damped second-order system Mu? + C/.u + Ku = F(t) (M, C, K symmetric, positive definite n × n matrices) by conversion to an equivalent first-order system
IOOMddtO?KI?Cuu?+oF(t)
We demonstrate that an algorithm proposed by Fairweather for the implementation of the (2, 2) Padé approximation of the exponential matrix for approximating the solution of homogeneous first-order systems extends advantageously to this case, yielding an unconditionally stable fourth-order scheme with the feature that the approximating equations decouple. As a result we are required only to solve one symmetric complex n × n system of linear algebraic equations at each time step, with a fixed matrix which may be decomposed into triangular factors at the outset. We also consider iterative schemes involving only real, positive definite, symmetric n × n matrices. Numerical results are included.  相似文献   

10.
11.
Every t(n)-time bounded RAM (assuming the logarithmic cost measure) can be simulated by a t(n)/log t(n)-space bounded Turing machine and every t(n)-time bounded Turing machine with d-dimensional tapes by a t(n)5log1t(n)/log t(n)-space bounded machine, where n is the length of the input. A class E of storage structures which generalizes multidimensional tapes is defined. Every t(n)-time bounded Turing machine whose storage structures are in E can be simulated by a t(n) loglog t(n)/log t(n)-space bounded Turing machine.  相似文献   

12.
R.E. Rink 《Automatica》1973,9(2):251-255
The performance limitations on the linear control of a linear plant, due to the presence of a feedback channel with finite information capacity, are considered in this paper. This situation may arise in such diverse applications as (a) the remote control of a plant, using a digital data link for feedback, (b) where quantization errors and bit errors of a digital controller may be modelled as occurring in a noisy digital channel in cascade with an ideal controller, and (c) in human-operator modelling, where the sensory feedback channels are characterized by fixed information capacity due to neural noise. The principle result obtained is that, given the state-dimension n of the plant and the channel capacity ?, reliability function E(R), and block encoding time T> >1C, the optimum data-rate R satisfies the equation 2R=nE(R). This rate provides the optimum tradeoff between the effects of quantization errors and message errors. It is seen that RoptC as n becomes large, but that good channel performance is retained provided that > >nT.  相似文献   

13.
14.
This paper presents a new feature extraction method for classifying a texture image into one of the l possible classes Ci, i=1,…,l. It is assumed that the given M × M image characterized by a set of intensity levels, {y(s1,S2), 0≤ss,s2M?1}, is a realization of an underlying random field model, known as the Simultaneous Autoregressive Model (SAR). This model is characterized by a set of parameters φ whose probability density function pi(φ), depends on the class to which the image belongs. First it is shown that the maximum likelihood estimate (M.L.E.) φ1, of φ is an appropriate feature vector for classification purposes. The optimum Bayes classifier which minimizes the average probability of classification error, is then designed using φ1. Finally the efficiency of the feature vector is demonstrated through experimental results obtained with some natural texture data and a simpler quadratic mean classifier.  相似文献   

15.
This paper describes an a.c. network analysis program designed for R/gm/C networks which contain up to 4 nodes, including the reference (ground) node. It gives the transfer function A(f) = VoutVin for specified frequency f. either as single-frequency points or as multiple-frequency sweep. It also gives the band-edge (3 dB) frequencies and poles zeros of the transfer function. The network is specified by entering component values and node numbers associated with each component. The program is segmented in two parts, each of 224 HP-67/97 program steps: part 1 deals with internal computation of the polynomial coefficients of the network, while part 2 computes and displays the output parameters. The program is of interest to Electrical Engineering students, particularly those who are studying the basics of linear circuit analysis and design.  相似文献   

16.
The principal result of this paper is a “positive relativization” of the open question “P = ?NP ? co-NP.” That is, the nondeterministic polynomial time-bounded oracle Turing machine endowed with designated accepting states and with designated rejecting states is considered, and suitable restrictions R of this device are developed such that P = NP ? co-NP if and only if for every oracle D, P(D) = NPR(D), where NPR(D) is the class of languages L?NP(D) that are accepted by oracle machines operating with restrictions R. Positive relativizations are obtained for the P = ? U ? co - U and U = ? NP questions also, where U is the class of languages L in NP accepted by nondeterministic machines that operate in polynomial time and that have for each input at most one accepting computation. The restrictions developed here are “qualitative” in the sense that they restrict the form and pattern of access to the oracle. In contrast, a previous paper [3] developed quantitative relativizations-the number of distinct queries to the oracle is restricted-but no quantitative positive relativization of P = ? NP ? co-NP is known.  相似文献   

17.
When selecting from, or sorting, a file stored on a read-only tape and the internal storage is rather limited, several passes of the input tape may be required. We study the relation between the amount of internal storage available and the number of passes required to select the Kth highest of N inputs. We show, for example, that to find the median in two passes requires at least ω(N12) and at most O(N12log N) internal storage. For probabilistic methods, θ(N12) internal storage is necessary and sufficient for a single pass method which finds the median with arbitrarily high probability.  相似文献   

18.
19.
An upper bound is obtained on the mean-square error involved when a real-valued non-band-limited nonstationary random process x(t) is approximated by the sampling expansion
n=?∞x(nT)sinπ(t?nT)/Tπ(t?nT)/T
for some T > 0. When the process x(t) is band-limited over [?12T, 12T], this error bound reduces to zero.  相似文献   

20.
A one-way preset Turing machine with base L is a nondeterministic on-line Turing machine with one working tape preset to a member of L. FINITEREVERSAL(L) (FINITEVISIT (L)) is the class of languages accepted by one-way preset Turing machines with bases in L which are limited to a finite number of reversals (visits). For any full semiAFL L, FINITEREVERSAL (L) is the closure of L under homomorphic replication or, equivalently, the closure of L under iteration of controls on linear context-free grammars while FINITEVISIT (L) is the result of applying controls from L to absolutely parallel grammars or, equivalently, the closure of L under deterministic two-way finite state transductions. If L is a full AFL with L ≠ FINITEVISIT(L), then FINITEREVERSAL(L) ≠ FINITEVISIT(L). In particular, for one-way checking automata, k + 1 reversals are more powerful than k reversals, k + 1 visits are more powerful than k visits, k visits and k + 1 reversals are incomparable and there are languages definable within 3 visits but no finite number of reversals. Finite visit one-way checking automaton languages can be accepted by nondeterministic multitape Turing machines in space log2n. Results on finite visit checking automata provide another proof that not all context-free languages can be accepted by one-way nonerasing stack automata.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号