共查询到20条相似文献,搜索用时 49 毫秒
1.
2.
3.
4.
5.
Wenjie Li Zhenkun Zhang Hailing Liu Jinjiang Yuan 《Information Processing Letters》2012,112(12):503-508
This paper studies the online scheduling of equal-length jobs with incompatible families on multiple batch machines which can process the jobs from a common family in batches, where each batch has a capacity b with in the unbounded batching and in the bounded batching. Each job J has an equal-length integral processing time , an integral release time , an integral deadline and a real weight . The goal is to determine a preemptive schedule with restart which maximizes the weighted number of early jobs. When , we show that a simple greedy online algorithm has a competitive ratio 2, and establish the lower bound . This means that the greedy algorithm is of the best possible for . When p is any positive integer, we provide an online algorithm of competitive ratio for both and . This is the first online algorithm for the problem with a constant competitive ratio. 相似文献
6.
7.
8.
Hong-Jian Lai Hao Li Ping Li Yanting Liang Senmei Yao 《Information Processing Letters》2011,111(23-24):1085-1088
Jaeger in 1984 conjectured that every -edge-connected graph has a mod -orientation. It has also been conjectured that every -edge-connected graph is mod -contractible. In [Z.-H. Chen, H.-J. Lai, H. Lai, Nowhere zero flows in line graphs, Discrete Math. 230 (2001) 133–141], it has been proved that if G has a nowhere-zero 3-flow and the minimum degree of G is at least 4, then also has a nowhere-zero 3-flow. In this paper, we prove that the above conjectures on line graphs would imply the truth of the conjectures in general, and we also prove that if G has a mod -orientation and , then also has a mod -orientation, which extends a result in Chen et al. (2001) [2]. 相似文献
9.
We give the first representation-independent hardness results for PAC learning intersections of halfspaces, a central concept class in computational learning theory. Our hardness results are derived from two public-key cryptosystems due to Regev, which are based on the worst-case hardness of well-studied lattice problems. Specifically, we prove that a polynomial-time algorithm for PAC learning intersections of halfspaces (for a constant ) in n dimensions would yield a polynomial-time solution to - (unique shortest vector problem). We also prove that PAC learning intersections of low-weight halfspaces would yield a polynomial-time quantum solution to - and - (shortest vector problem and shortest independent vector problem, respectively). Our approach also yields the first representation-independent hardness results for learning polynomial-size depth-2 neural networks and polynomial-size depth-3 arithmetic circuits. 相似文献
10.
Raphael Yuster 《Information Processing Letters》2011,111(21-22):1057-1061
We present an algorithm that finds, for each vertex of an undirected graph, a shortest cycle containing it. While for directed graphs this problem reduces to the All-Pairs Shortest Paths problem, this is not known to be the case for undirected graphs.We present a truly sub-cubic randomized algorithm for the undirected case. Given an undirected graph with n vertices and integer weights in , it runs in time where is the exponent of matrix multiplication. As a by-product, our algorithm can be used to determine which vertices lie on cycles of length at most t in time. For the case of bounded real edge weights, a variant of our algorithm solves the problem up to an additive error of ? in time. 相似文献
11.
12.
13.
Jesse Kamp Anup Rao Salil Vadhan David Zuckerman 《Journal of Computer and System Sciences》2011,77(1):191-220
We give polynomial-time, deterministic randomness extractors for sources generated in small space, where we model space s sources on as sources generated by width branching programs. Specifically, there is a constant such that for any , our algorithm extracts bits that are exponentially close to uniform (in variation distance) from space s sources with min-entropy δn, where . Previously, nothing was known for , even for space 0. Our results are obtained by a reduction to the class of total-entropy independent sources. This model generalizes both the well-studied models of independent sources and symbol-fixing sources. These sources consist of a set of r independent smaller sources over , where the total min-entropy over all the smaller sources is k. We give deterministic extractors for such sources when k is as small as , for small enough ?. 相似文献
14.
15.
16.
17.
18.
19.
20.
William Gasarch James Glenn Clyde P. Kruskal 《Journal of Computer and System Sciences》2008,74(4):628-655
There has been much work on the following question: given n, how large can a subset of be that has no arithmetic progressions of length 3. We call such sets 3-free. Most of the work has been asymptotic. In this paper we sketch applications of large 3-free sets, present techniques to find large 3-free sets of for , and give empirical results obtained by coding up those techniques. In the sequel we survey the known techniques for finding large 3-free sets of for large n, discuss variants of them, and give empirical results obtained by coding up those techniques and variants. 相似文献