首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
A collection of T1,T2,…,TkT1,T2,,Tk of unrooted, leaf labelled (phylogenetic) trees, all with different leaf sets, is said to be compatible   if there exists a tree TT such that each tree TiTi can be obtained from TT by deleting leaves and contracting edges. Determining compatibility is NP-hard, and the fastest algorithm to date has worst case complexity of around Ω(nk)Ω(nk) time, nn being the number of leaves. Here, we present an O(nf(k))O(nf(k)) algorithm, proving that compatibility of unrooted phylogenetic trees is fixed parameter tractable   (FPT) with respect to the number kk of trees.  相似文献   

3.
The ΔΔ-timed uniform consensus is a stronger variant of the traditional consensus and it satisfies the following additional property: every correct process terminates its execution within a constant time ΔΔΔ-timeliness), and no two processes decide differently (uniformity). In this paper, we consider the ΔΔ-timed uniform consensus problem in presence of fcfc crash processes and ftft timing-faulty processes, and propose a ΔΔ-timed uniform consensus algorithm. The proposed algorithm is adaptive in the following sense: it solves the ΔΔ-timed uniform consensus when at least ft+1ft+1 correct processes exist in the system. If the system has less than ft+1ft+1 correct processes, the algorithm cannot solve the ΔΔ-timed uniform consensus. However, as long as ft+1ft+1 processes are non-crashed, the algorithm solves (non-timed) uniform consensus. We also investigate the maximum number of faulty processes that can be tolerated. We show that any ΔΔ-timed uniform consensus algorithm tolerating up to ftft timing-faulty processes requires that the system has at least ft+1ft+1 correct processes. This impossibility result implies that the proposed algorithm attains the maximum resilience about the number of faulty processes. We also show that any ΔΔ-timed uniform consensus algorithm tolerating up to ftft timing-faulty processes cannot solve the (non-timed) uniform consensus when the system has less than ft+1ft+1 non-crashed processes. This impossibility result implies that our algorithm attains the maximum adaptiveness.  相似文献   

4.
5.
We define a self-map Pal:F2F2Pal:F2F2 of the free group on two generators a,ba,b, using automorphisms of F2F2 that form a group isomorphic to the braid group B3B3. The map PalPal restricts to de Luca’s right iterated palindromic closure on the submonoid generated by a,ba,b. We show that PalPal is continuous for the profinite topology on F2F2; it is the unique continuous extension of de Luca’s right iterated palindromic closure to F2F2. The values of PalPal are palindromes and coincide with the elements g∈F2gF2 such that abgabg and bagbag are conjugate.  相似文献   

6.
7.
We present algorithmic lower bounds on the size sdsd of the largest independent sets of vertices in random dd-regular graphs, for each fixed d≥3d3. For instance, for d=3d=3 we prove that, for graphs on nn vertices, sd≥0.43475nsd0.43475n with probability approaching one as nn tends to infinity.  相似文献   

8.
9.
Question/Answer games (Q/A games for short) are a generalization of the Rényi–Ulam game and they are a model for information extraction in parallel. A Q/A game, G=(D,s,(q1,…,qk))G=(D,s,(q1,,qk)), is played on a directed acyclic graph, D=(V,E)D=(V,E), with a distinguished start vertex ss. In the iith round, Paul selects a set, Qi⊆VQiV, of at most qiqi non-terminal vertices. Carole responds by choosing an outgoing edge from each vertex in QiQi. At the end of kk rounds, Paul wins if Carole’s answers define a unique path from the root to one of the terminal vertices in DD.  相似文献   

10.
Let G=(V,E)G=(V,E) be a simple undirected graph with a set VV of vertices and a set EE of edges. Each vertex v∈VvV has a demand d(v)∈Z+d(v)Z+ and a cost c(v)∈R+c(v)R+, where Z+Z+ and R+R+ denote the set of nonnegative integers and the set of nonnegative reals, respectively. The source location problem with vertex-connectivity requirements in a given graph GG requires finding a set SS of vertices minimizing vSc(v)vSc(v) such that there are at least d(v)d(v) pairwise vertex-disjoint paths from SS to vv for each vertex v∈V−SvVS. It is known that if there exists a vertex v∈VvV with d(v)≥4d(v)4, then the problem is NP-hard even in the case where every vertex has a uniform cost. In this paper, we show that the problem can be solved in O(|V|4log2|V|)O(|V|4log2|V|) time if d(v)≤3d(v)3 holds for each vertex v∈VvV.  相似文献   

11.
We study the problem of decomposing the vertex set VV of a graph into two nonempty parts V1,V2V1,V2 which induce subgraphs where each vertex v∈V1vV1 has degree at least a(v)a(v) inside V1V1 and each v∈V2vV2 has degree at least b(v)b(v) inside V2V2. We give a polynomial-time algorithm for graphs with bounded treewidth which decides if a graph admits a decomposition, and gives such a decomposition if it exists. This result and its variants are then applied to designing polynomial-time approximation schemes for planar graphs where a decomposition does not necessarily exist but the local degree conditions should be met for as many vertices as possible.  相似文献   

12.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

13.
We consider the following basic question: a source node wishes to stream an ordered sequence of packets to a collection of receivers, which are in KK clusters. A node may send a packet to another node in its own cluster in one time step and to a node in a different cluster in TcTc time steps (Tc>1)(Tc>1). Each cluster has two special nodes. We assume that the source and the special nodes in each cluster have a higher capacity and thus can send multiple packets at each step, while all other nodes can both send and receive a packet at each step. We construct two (intra-cluster) data communication schemes, one based on multi-trees (using a collection of dd-ary interior-disjoint trees) and the other based on hypercubes. The multi-tree scheme sustains streaming within a cluster with O(dlogN)O(dlogN) maximum playback delay and O(dlogN)O(dlogN) size buffers, while communicating with O(d)O(d) neighbors, where NN is the maximum size of any cluster. We also show that this protocol is optimal when d=2d=2 or 3. The hypercube scheme sustains streaming within a cluster, with O(log2(N))O(log2(N)) maximum playback delay and O(1)O(1) size buffers, while communicating with O(log(N))O(log(N)) neighbors, for arbitrary NN. In addition, we extend our multi-tree scheme to work when receivers depart and arrive over time. We also evaluate our dynamic schemes using simulations.  相似文献   

14.
15.
We investigate a periodic version of the Benjamin-Ono (BO) equation associated with a discrete Laplacian. We find some special solutions to this equation, and calculate the values of the first two integrals of motion I1I1 and I2I2 corresponding to these solutions. It is found that there exists a strong resemblance between them and the spectra for the Macdonald qq-difference operators. To better understand the connection between these classical and quantum integrable systems, we consider the special degenerate case corresponding to q=0q=0 in more detail. Namely, we give general solutions to this degenerate periodic BO, obtain explicit formulas representing all the integrals of motions InIn (n=1,2,…n=1,2,), and successfully identify it with the eigenvalues of Macdonald operators in the limit q→0q0, i.e. the limit where Macdonald polynomials tend to the Hall–Littlewood polynomials.  相似文献   

16.
17.
Orthogonal packing problems are natural multidimensional generalizations of the classical bin packing problem and knapsack problem and occur in many different settings. The input consists of a set I={r1,…,rn}I={r1,,rn} of dd-dimensional rectangular items ri=(ai,1,…,ai,d)ri=(ai,1,,ai,d) and a space QQ. The task is to pack the items in an orthogonal and non-overlapping manner without using rotations into the given space. In the strip packing setting the space QQ is given by a strip of bounded basis and unlimited height. The objective is to pack all items into a strip of minimal height. In the knapsack packing setting the given space QQ is a single, usually unit sized bin and the items have associated profits pipi. The goal is to maximize the profit of a selection of items that can be packed into the bin.  相似文献   

18.
Given a graph GG, an integer kk, and a demand set D={(s1,t1),…,(sl,tl)}D={(s1,t1),,(sl,tl)}, the kk-Steiner Forest problem finds a forest in graph GG to connect at least kk demands in DD such that the cost of the forest is minimized. This problem was proposed by Hajiaghayi and Jain in SODA’06. Thereafter, using a Lagrangian relaxation technique, Segev et al. gave the first approximation algorithm to this problem in ESA’06, with performance ratio O(n2/3logl)O(n2/3logl). We give a simpler and faster approximation algorithm to this problem with performance ratio O(n2/3logk)O(n2/3logk) via greedy approach, improving the previously best known ratio in the literature.  相似文献   

19.
20.
In this paper we discuss models and methods for solving the rooted distance constrained minimum spanning tree problem which is defined as follows: given a graph G=(V,E)G=(V,E) with node set V={0,1,…,n}V={0,1,,n} and edge set EE, two integer weights, a cost cece and a delay wewe associated with each edge ee of EE, and a natural (time limit) number HH, we wish to find a spanning tree TT of the graph with minimum total cost and such that the unique path from a specified root node, node 0, to any other node has total delay not greater than HH. This problem generalizes the well known hop-constrained spanning tree problem and arises in the design of centralized networks with quality of service constraints and also in package shipment with service guarantee constraints. We present three theoretically equivalent modeling approaches, a column generation scheme, a Lagrangian relaxation combined with subgradient optimization procedure, both based on a path formulation of the problem, and a shortest path (compact) reformulation of the problem which views the underlying subproblem as defined in a layered extended graph. We present results for complete graph instances with up to 40 nodes. Our results indicate that the layered graph path reformulation model is still quite good when the arc weights are reasonably small. Lagrangian relaxation combined with subgradient optimization procedure appears to work much better than column generation and seems to be a quite reasonable approach to the problem for large weight, and even small weight, instances.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号