共查询到20条相似文献,搜索用时 15 毫秒
1.
The random constraint satisfaction problem(CSP)instances generated by Model RB have been widely used in the field of CSP and have some nice features.In this paper,we consider two optimization versions of CSP,i.e.,the maximum constraint satisfaction problem(Max-CSP)and the minimum satisfaction problem(Min-CSP)of Model RB.The problem of the Max-CSP is how to find an assignment to all the variables such that the maximum number of constraints are satisfied and the problem of Min-CSP is how to find an assignment to all the variables such that the minimum number of constraints are satisfied.We use the first moment method to prove that when r2α(1/p-1)(or p2α/(2α+r)),an upper bound of Max-CSP can be derived.Similarly,we can prove that when r2α(1/p-1)(or p2α/(2α+r)),a lower bound of Min-CSP can be derived. 相似文献
2.
M. Sauerhoff 《Computational Complexity》2001,10(2):155-178
In this paper, a simple technique which unifies the known approaches for proving lower bound results on the size of deterministic,
nondeterministic, and randomized OBDDs and kOBDDs is described.?As an application of this technique, a generic lower bound on the size of randomized OBDDs with bounded
error is established for a class of functions which has been studied in the literature on branching programs for a long time.
These functions have been called “k-stable” by Jukna. It follows that several standard functions are not contained in the analog of the class BPP for OBDDs.
Furthermore, exponential lower bounds on the size of randomized kOBDDs are presented.?It is well known that k-stable functions with large k are hard for deterministic read-once branching programs. This is no longer true in the randomized case. It is shown here
that a certain k-stable function due to Jukna, Razborov, Savicky, and Wegener has randomized branching programs of polynomial size, even with
zero error. It follows that for the analogs of these classes defined in terms of the size of read-once branching programs.
Received: September 3, 1998. 相似文献
3.
布尔函数的线路复杂下界问题与P=?NP问题有密切关系,若证明了NP中某问题的线路复杂度是非多项式的,则P≠NP。但证明了一个具体的布尔函数具有非线性的线路复杂度下界却是计算复杂性理论中最难的问题之一。迄今此问题的最好结果是由N.Blum于1894年给出的,他证明了一个布尔函数具有3n-3的线路复杂度下界。本文针对同一个布尔函数,给出一个更好的下界3n+1。 相似文献
4.
Esko Ukkonen 《Information Processing Letters》1985,20(2):99-103
It is shown that in many cases the trivial upper bound 2|G|k + 1 on the number of states of an LR(k) parser for a grammar G is too conservative. In particular, if G is not right-recursive, the canonical LR(k) parser for G has at most |Gk|G|·2|G| states. Examples of grammars with large LR(k) parsers are given. 相似文献
5.
Rudolf Fleischer 《Algorithmica》1994,11(2):104-115
Bottom-Up-Heapsort is a variant of Heapsort. Its worst-case complexity for the number of comparisons is known to be bounded from above by 3/2n logn+0(n), wheren is the number of elements to be sorted. There is also an example of a heap which needs 5/4n logn-0(n log logn) comparisons. We show in this paper that the upper bound is asymptotically tight, i.e., we prove for largen the existence of heaps which need at least 3/2n logn–O(n log logn) comparisons. This result also proves the old conjecture that the best case for classical Heapsort needs only asymptotic n logn + O(n log logn) comparisons.This work was supported by the ESPRIT II program of the EC under Contract No. 3075 (project ALCOM). 相似文献
6.
Based on Petersen graph, a new interconnection network, the RP(k) network, is devel-oped and the properties of the RP(k) network are investigated. The diameter of the RP(k) network is [ k/2] + 2 and its degree is 5. We prove that the diameter of the RP(k) network is much smaller than that of the 2-D Torus network when the number of nodes in interconnection networks is less than or equal to 300. In order to analyze the communication performance in a group of nodes, we propose the concepts of the optimal node groups and the diameter of the optimal node groups. We also show that the diameter of the optimal node groups in the RP(k) network is less than that in the 2-D Torus net-work. Especially when the number of nodes in an optimal node group is between 6 and 100, the diam-eter of the optimal node groups in the RP(k) network is half of that in the 2-D Torus network. Further-more based on the RP(k) network we design a set of routing algorithms which are point-to-point rout-ing, permutation routing, one-to-al 相似文献
7.
Stephan Heilbrunner 《Acta Informatica》1979,11(2):169-176
Summary Extended context free grammars are obtained by allowing regular expressions on the right hand sides of production rules of context free grammars. The LR(k) and LL(k) conditions are made applicable to these grammars by defining canonical transformations of extended grammars into context free grammars. 相似文献
8.
Ana Gàl 《Computational Complexity》2001,10(4):277-296
We give a characterization of span program size by a
combinatorial-algebraic measure. The measure we consider is a generalization
of a measure on covers which has been used to prove lower
bounds on formula size and has also been studied with respect to communication
complexity.?In the monotone case our new methods yield lower bounds for
the monotone span program complexity of explicit Boolean functions in
n variables over arbitrary fields, improving the previous lower bounds
on monotone span program size. Our characterization of span program
size implies that any matrix with superpolynomial separation between
its rank and cover number can be used to obtain superpolynomial lower
bounds on monotone span program size. We also identify a property
of bipartite graphs that is suficient for constructing Boolean functions
with large monotone span program complexity.
Received: September 30, 2000. 相似文献
9.
M. Bläser 《Computational Complexity》1999,8(3):203-226
We prove a lower bound of km + mn + k—m + n— 3 for the multiplicative complexity of the multiplication of -matrices with -matrices using the substitution method. Received: July 8, 1997. 相似文献
10.
《国际计算机数学杂志》2012,89(4):549-560
The Korteweg-de Vries (Kdv) equation has been generalized by Rosenau and Hyman [7] to a class of partial differential equations (PDEs) which has solitary wave solution with compact support. These solitary wave solutions are called compactons Compactons are solitary waves with the remarkable soliton property, that after colliding with other compactons, they reemerge with the same coherent shape. These particle like waves exhibit elastic collision that are similar to the soliton interaction associated with completely integrable systems. The point where two compactons collide are marked by a creation of low amplitude compacton-anticompacton pair. These equations have only a finite number of local conservation laws In this paper, an implicit finite difference method and a finite element method have been developed to solve the K(3,2) equation. Accuracy and stability of the methods have been studied. The analytical solution and the conserved quantities are used to assess the accuracy of the suggested methods. The umerical results have shown that this compacton exhibits true soliton behavior. 相似文献
11.
12.
Anton Nijholt 《Information Processing Letters》1982,15(3):97-101
In the literature various proofs of the inclusion of the class of LL(k) grammars into the class of LR(k) grammars can be found. Some of these proofs are not correct, others are informal, semi-formal or contain flaws. Some of them are correct but the proof is less straightforward than demonstrated here. 相似文献
13.
14.
Entanglement of formation and concurrence for mixed states 总被引:1,自引:0,他引:1
Xiuhong Gao Albeverio Sergio Kai Chen Shaoming Fei Xianqing Li-Jost 《Frontiers of Computer Science in China》2008,2(2):114-128
We review some results on analytical computations of the measures for quantum entanglement: entanglement of formation and
concurrence. We introduce some estimations of the lower bounds for the entanglement of formation in bipartite mixed states,
and of lower bounds for the concurrence in bipartite and tripartite systems. The results on lower bounds for the concurrence
are also generalized to arbitrary multipartite systems. 相似文献
15.
LIU Fangai LIU Zhiyong & ZHANG Yongsheng . The School of Information Management Shandong Normal University Jinan China . The National Natural Science Foundation of China Beijing China 《中国科学F辑(英文版)》2004,47(5):669-680
Copyright by Science in China Press 2004 Interconnection networks, as an important means in parallel processing systems, are investigated widely[1,2]. Recently a class of lower-degree networks is proposed[2—4]. In ref. [3] we have investigated a constant degree network, called RP(k) network. Com-pared with rings and 2-D mesh networks, the RP(k) network has many good properties. The RP(k) network has a much smaller diameter than that of 2-D meshes when the number of network nodes is less … 相似文献
16.
Effectiveness of customers’ loyalty programs has been the focal point of some recent studies. While empirical research shows mixed findings, analytical studies on the efficacy of loyalty programs are in their early stages. In this paper, we develop an analytical model on the profitability of loyalty programs in which customers’ valuations along with their satisfaction levels are incorporated as stochastic variables. The model consists of a revenue-maximizing firm selling a product through two periods. A loyalty reward is offered to two-period buyers in the form of an absolute-value discount on the price in the second period. The satisfaction level is represented by the difference between a customer’s original and post-purchase valuation. The formulation yields a stochastic programming problem with a nonlinear non-convex objective function. The problem is solved in terms of the model parameters. The results reveal that depending on the mean and variance of the satisfaction levels, the firm may be better off not to offer a loyalty reward. Specifically, if the mean of satisfaction levels turns out to be positive with a coefficient of variation less than a certain threshold, not adopting the loyalty program is optimal. 相似文献
17.
Agrawal D. Egecioglu O. Abbadi A. 《Parallel and Distributed Systems, IEEE Transactions on》1997,8(5):533-537
A generalization of the majority quorum for the solution of the distributed (k+1)-exclusion problem is proposed. This scheme produces a family of quorums of varying sizes and availabilities indexed by integral divisors r of k. The cases r=1 and r=k correspond to known majority based quorum generation algorithms MAJ and DIV, whereas intermediate values of r interpolate between these two extremes. A cost and availability analysis of the proposed methods is also presented. An interesting implication of this analysis is that in a reasonably reliable environment with a large number of sites, even protocols with low communication costs attain high availability 相似文献
18.
19.
James L. Elshoff 《Software》1976,6(4):505-525
A sample of 120 production PL/I programs from several commercial computing installations has been studied. Data about the programs in the sample have been extracted by a PL/I scanning program. The statistical results of the study are presented in this document The paper concentrates on statistical data and not on general conclusions. The data are only interpreted to the extent that it is not ill-defined and misleading. The data profile the use of basic PL/I elements and the structure of programs written in PL/I. The reader of this report will get a better understanding of how PL/I has been used in the commercial environment up to 1974. 相似文献