首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

2.
We prove that a polynomial f∈R[x,y]fR[x,y] with tt non-zero terms, restricted to a real line y=ax+by=ax+b, either has at most 6t−46t4 zeros or vanishes over the whole line. As a consequence, we derive an alternative algorithm for deciding whether a linear polynomial y−ax−b∈K[x,y]yaxbK[x,y] divides a lacunary polynomial f∈K[x,y]fK[x,y], where KK is a real number field. The number of bit operations performed by the algorithm is polynomial in the number of non-zero terms of ff, in the logarithm of the degree of ff, in the degree of the extension K/QK/Q and in the logarithmic height of aa, bb and ff.  相似文献   

3.
Dimensional analysis yields a new scaling formula for the Linpack benchmark. The computational power r(p0,q0)r(p0,q0) on a set of processors decomposed into a (p0,q0)(p0,q0) grid determines the computational power r(p,q)r(p,q) on a set of processors decomposed into a (p,q)(p,q) grid by the formula r(p,q)=(p/p0)α(q/q0)βr(p0,q0)r(p,q)=(p/p0)α(q/q0)βr(p0,q0). The two scaling parameters αα and ββ measure interprocessor communication overhead required by the algorithm. A machine that scales perfectly corresponds to α=β=1α=β=1; a machine that scales not at all corresponds to α=β=0α=β=0. We have determined the two scaling parameters by imposing a fixed-time constraint on the problem size such that the execution time remains constant as the number of processors changes. Results for a collection of machines confirm that the formula suggested by dimensional analysis is correct. Machines with the same values for these parameters are self-similar. They scale the same way even though the details of their specific hardware and software may be quite different.  相似文献   

4.
We investigate a periodic version of the Benjamin-Ono (BO) equation associated with a discrete Laplacian. We find some special solutions to this equation, and calculate the values of the first two integrals of motion I1I1 and I2I2 corresponding to these solutions. It is found that there exists a strong resemblance between them and the spectra for the Macdonald qq-difference operators. To better understand the connection between these classical and quantum integrable systems, we consider the special degenerate case corresponding to q=0q=0 in more detail. Namely, we give general solutions to this degenerate periodic BO, obtain explicit formulas representing all the integrals of motions InIn (n=1,2,…n=1,2,), and successfully identify it with the eigenvalues of Macdonald operators in the limit q→0q0, i.e. the limit where Macdonald polynomials tend to the Hall–Littlewood polynomials.  相似文献   

5.
We study four problems from the geometry of numbers, the shortest vector problem  (Svp)(Svp), the closest vector problem  (Cvp)(Cvp), the successive minima problem  (Smp)(Smp), and the shortest independent vectors problem   (SivpSivp). Extending and generalizing results of Ajtai, Kumar, and Sivakumar we present probabilistic single exponential time algorithms for all four problems for all ?p?p norms. The results on SmpSmp and SivpSivp are new for all norms. The results on SvpSvp and CvpCvp generalize previous results of Ajtai et al. for the Euclidean ?2?2 norm to arbitrary ?p?p norms. We achieve our results by introducing a new lattice problem, the generalized shortest vector problem   (GSvpGSvp). 1 We describe a single exponential time algorithm for GSvpGSvp. We also describe polynomial time reductions from Svp,Cvp,SmpSvp,Cvp,Smp, and SivpSivp to GSvpGSvp, establishing single exponential time algorithms for the four classical lattice problems. This approach leads to a unified algorithmic treatment of the lattice problems Svp,Cvp,SmpSvp,Cvp,Smp, and SivpSivp.  相似文献   

6.
A collection of T1,T2,…,TkT1,T2,,Tk of unrooted, leaf labelled (phylogenetic) trees, all with different leaf sets, is said to be compatible   if there exists a tree TT such that each tree TiTi can be obtained from TT by deleting leaves and contracting edges. Determining compatibility is NP-hard, and the fastest algorithm to date has worst case complexity of around Ω(nk)Ω(nk) time, nn being the number of leaves. Here, we present an O(nf(k))O(nf(k)) algorithm, proving that compatibility of unrooted phylogenetic trees is fixed parameter tractable   (FPT) with respect to the number kk of trees.  相似文献   

7.
8.
The most effective way to maximize the lifetime of a wireless sensor network (WSN) is to allocate initial energy to sensors such that they exhaust their energy at the same time. The lifetime of a WSN as well as an optimal initial energy allocation are determined by a network design. The main contribution of the paper is to show that the lifetime of a WSN can be maximized by an optimal network design. We represent the network lifetime as a function of the number mm of annuli and show that mm has significant impact on network lifetime. We prove that if the energy consumed by data transmission is proportional to dα+cdα+c, where dd is the distance of data transmission and αα and cc are some constants, then for a circular area of interest with radius RR, the optimal number of annuli that maximizes the network lifetime is m=R((α−1)/c)1/αm=R((α1)/c)1/α for an arbitrary sensor density function.  相似文献   

9.
10.
11.
Let F(x,y)F(x,y) be a polynomial over a field KK and mm a nonnegative integer. We call a polynomial gg over KK an mm-near solution of F(x,y)F(x,y) if there exists a c∈KcK such that F(x,g)=cxmF(x,g)=cxm, and the number cc is called an mm-value of F(x,y)F(x,y) corresponding to gg. In particular, cc can be 0. Hence, by viewing F(x,y)=0F(x,y)=0 as a polynomial equation over K[x]K[x] with variable yy, every solution of the equation F(x,y)=0F(x,y)=0 in K[x]K[x] is also an mm-near solution. We provide an algorithm that gives all mm-near solutions of a given polynomial F(x,y)F(x,y) over KK, and this algorithm is polynomial time reducible to solving one variable equations over KK. We introduce approximate solutions to analyze the algorithm. We also give some interesting properties of approximate solutions.  相似文献   

12.
This paper concerns construction of additive stretched spanners with few edges for nn-vertex graphs having a tree-decomposition into bags of diameter at most δδ, i.e., the tree-length δδ graphs. For such graphs we construct additive 2δ2δ-spanners with O(δn+nlogn)O(δn+nlogn) edges, and additive 4δ4δ-spanners with O(δn)O(δn) edges. This provides new upper bounds for chordal graphs for which δ=1δ=1. We also show a lower bound, and prove that there are graphs of tree-length δδ for which every multiplicative δδ-spanner (and thus every additive (δ−1)(δ1)-spanner) requires Ω(n1+1/Θ(δ))Ω(n1+1/Θ(δ)) edges.  相似文献   

13.
We aim at finding the best possible seed values when computing a1/pa1/p using the Newton–Raphson iteration in a given interval. A natural choice of the seed value would be the one that best approximates the expected result. It turns out that in most cases, the best seed value can be quite far from this natural choice. When we evaluate a monotone function f(a)f(a) in the interval [amin,amax][amin,amax], by building the sequence xnxn defined by the Newton–Raphson iteration, the natural choice consists in choosing x0x0 equal to the arithmetic mean of the endpoint values. This minimizes the maximum possible distance between x0x0 and f(a)f(a). And yet, if we perform nn iterations, what matters is to minimize the maximum possible distance between xnxn and f(a)f(a). In several examples, the value of the best starting point varies rather significantly with the number of iterations.  相似文献   

14.
In this paper we discuss models and methods for solving the rooted distance constrained minimum spanning tree problem which is defined as follows: given a graph G=(V,E)G=(V,E) with node set V={0,1,…,n}V={0,1,,n} and edge set EE, two integer weights, a cost cece and a delay wewe associated with each edge ee of EE, and a natural (time limit) number HH, we wish to find a spanning tree TT of the graph with minimum total cost and such that the unique path from a specified root node, node 0, to any other node has total delay not greater than HH. This problem generalizes the well known hop-constrained spanning tree problem and arises in the design of centralized networks with quality of service constraints and also in package shipment with service guarantee constraints. We present three theoretically equivalent modeling approaches, a column generation scheme, a Lagrangian relaxation combined with subgradient optimization procedure, both based on a path formulation of the problem, and a shortest path (compact) reformulation of the problem which views the underlying subproblem as defined in a layered extended graph. We present results for complete graph instances with up to 40 nodes. Our results indicate that the layered graph path reformulation model is still quite good when the arc weights are reasonably small. Lagrangian relaxation combined with subgradient optimization procedure appears to work much better than column generation and seems to be a quite reasonable approach to the problem for large weight, and even small weight, instances.  相似文献   

15.
In this paper we study energy-aware scheduling that trades energy consumption against a traditional performance measure of delay. We use the power-rate function f(x)=c+xαf(x)=c+xα for x>0x>0 and f(0)=0f(0)=0 to model the power consumption, where c>0c>0 represents the base power. We give a definition of a rate-adaptive version of the Weighted Fair Queueing scheduling algorithm, and prove its energy consumption is within a bounded factor of the best possible when the algorithm guarantees the classic end-to-end delay for every connection.  相似文献   

16.
We study the problem of decomposing the vertex set VV of a graph into two nonempty parts V1,V2V1,V2 which induce subgraphs where each vertex v∈V1vV1 has degree at least a(v)a(v) inside V1V1 and each v∈V2vV2 has degree at least b(v)b(v) inside V2V2. We give a polynomial-time algorithm for graphs with bounded treewidth which decides if a graph admits a decomposition, and gives such a decomposition if it exists. This result and its variants are then applied to designing polynomial-time approximation schemes for planar graphs where a decomposition does not necessarily exist but the local degree conditions should be met for as many vertices as possible.  相似文献   

17.
18.
19.
We investigate the group key management problem for broadcasting applications. Previous work showed that, in handling key updates, batch rekeying can be more cost effective than individual rekeying. One model for batch rekeying is to assume that every user has probability pp of being replaced by a new user during a batch period with the total number of users unchanged. Under this model, it was recently shown that an optimal key tree can be constructed in linear time when pp is a constant and in O(n4)O(n4) time when p→0p0. In this paper, we investigate more efficient algorithms for the case p→0p0, i.e., when membership changes are sparse. We design an O(n)O(n) heuristic algorithm for the sparse case and show that it produces a nearly 2-approximation to the optimal key tree. Simulation results show that its performance is even better in practice. We also design a refined heuristic algorithm and show that it achieves an approximation ratio of 1+?1+? for any fixed ?>0?>0 and nn, as p→0p0. Finally, we give another approximation algorithm for any p∈(0,0.693)p(0,0.693) which is shown to be quite good by our simulations.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号