首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 49 毫秒
1.
2.
3.
4.
5.
This paper studies the online scheduling of equal-length jobs with incompatible families on multiple batch machines which can process the jobs from a common family in batches, where each batch has a capacity b with b= in the unbounded batching and b< in the bounded batching. Each job J has an equal-length integral processing time p>0, an integral release time r(J)?0, an integral deadline d(J)?0 and a real weight w(J)?0. The goal is to determine a preemptive schedule with restart which maximizes the weighted number of early jobs. When p=1, we show that a simple greedy online algorithm has a competitive ratio 2, and establish the lower bound 2?1/b. This means that the greedy algorithm is of the best possible for b=. When p is any positive integer, we provide an online algorithm of competitive ratio 3+22 for both b= and b<. This is the first online algorithm for the problem with a constant competitive ratio.  相似文献   

6.
7.
8.
Jaeger in 1984 conjectured that every (4p)-edge-connected graph has a mod (2p+1)-orientation. It has also been conjectured that every (4p+1)-edge-connected graph is mod (2p+1)-contractible. In [Z.-H. Chen, H.-J. Lai, H. Lai, Nowhere zero flows in line graphs, Discrete Math. 230 (2001) 133–141], it has been proved that if G has a nowhere-zero 3-flow and the minimum degree of G is at least 4, then L(G) also has a nowhere-zero 3-flow. In this paper, we prove that the above conjectures on line graphs would imply the truth of the conjectures in general, and we also prove that if G has a mod (2p+1)-orientation and δ(G)?4p, then L(G) also has a mod (2p+1)-orientation, which extends a result in Chen et al. (2001) [2].  相似文献   

9.
We give the first representation-independent hardness results for PAC learning intersections of halfspaces, a central concept class in computational learning theory. Our hardness results are derived from two public-key cryptosystems due to Regev, which are based on the worst-case hardness of well-studied lattice problems. Specifically, we prove that a polynomial-time algorithm for PAC learning intersections of n? halfspaces (for a constant ?>0) in n dimensions would yield a polynomial-time solution to O?(n1.5)-uSVP (unique shortest vector problem). We also prove that PAC learning intersections of n? low-weight halfspaces would yield a polynomial-time quantum solution to O?(n1.5)-SVP and O?(n1.5)-SIVP (shortest vector problem and shortest independent vector problem, respectively). Our approach also yields the first representation-independent hardness results for learning polynomial-size depth-2 neural networks and polynomial-size depth-3 arithmetic circuits.  相似文献   

10.
We present an algorithm that finds, for each vertex of an undirected graph, a shortest cycle containing it. While for directed graphs this problem reduces to the All-Pairs Shortest Paths problem, this is not known to be the case for undirected graphs.We present a truly sub-cubic randomized algorithm for the undirected case. Given an undirected graph with n vertices and integer weights in 1,,M, it runs in O?(Mn(ω+3)/2) time where ω<2.376 is the exponent of matrix multiplication. As a by-product, our algorithm can be used to determine which vertices lie on cycles of length at most t in O?(Mnωt) time. For the case of bounded real edge weights, a variant of our algorithm solves the problem up to an additive error of ? in O?(n(ω+6)/3) time.  相似文献   

11.
12.
13.
We give polynomial-time, deterministic randomness extractors for sources generated in small space, where we model space s sources on {0,1}n as sources generated by width 2s branching programs. Specifically, there is a constant η>0 such that for any ζ>n?η, our algorithm extracts m=(δ?ζ)n bits that are exponentially close to uniform (in variation distance) from space s sources with min-entropy δn, where s=Ω(ζ3n). Previously, nothing was known for δ?1/2, even for space 0. Our results are obtained by a reduction to the class of total-entropy independent sources. This model generalizes both the well-studied models of independent sources and symbol-fixing sources. These sources consist of a set of r independent smaller sources over {0,1}?, where the total min-entropy over all the smaller sources is k. We give deterministic extractors for such sources when k is as small as polylog(r), for small enough ?.  相似文献   

14.
15.
16.
17.
18.
19.
20.
There has been much work on the following question: given n, how large can a subset of {1,,n} be that has no arithmetic progressions of length 3. We call such sets 3-free. Most of the work has been asymptotic. In this paper we sketch applications of large 3-free sets, present techniques to find large 3-free sets of {1,,n} for n?250, and give empirical results obtained by coding up those techniques. In the sequel we survey the known techniques for finding large 3-free sets of {1,,n} for large n, discuss variants of them, and give empirical results obtained by coding up those techniques and variants.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号