首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
Let F(x,y)F(x,y) be a polynomial over a field KK and mm a nonnegative integer. We call a polynomial gg over KK an mm-near solution of F(x,y)F(x,y) if there exists a c∈KcK such that F(x,g)=cxmF(x,g)=cxm, and the number cc is called an mm-value of F(x,y)F(x,y) corresponding to gg. In particular, cc can be 0. Hence, by viewing F(x,y)=0F(x,y)=0 as a polynomial equation over K[x]K[x] with variable yy, every solution of the equation F(x,y)=0F(x,y)=0 in K[x]K[x] is also an mm-near solution. We provide an algorithm that gives all mm-near solutions of a given polynomial F(x,y)F(x,y) over KK, and this algorithm is polynomial time reducible to solving one variable equations over KK. We introduce approximate solutions to analyze the algorithm. We also give some interesting properties of approximate solutions.  相似文献   

2.
3.
We consider a variant of Gold’s learning paradigm where a learner receives as input nn different languages (in the form of one text where all input languages are interleaved). Our goal is to explore the situation when a more “coarse” classification of input languages is possible, whereas more refined classification is not. More specifically, we answer the following question: under which conditions, a learner, being fed nn different languages, can produce mm grammars covering all input languages, but cannot produce kk grammars covering input languages for any k>mk>m. We also consider a variant of this task, where each of the output grammars may not cover more than rr input languages. Our main results indicate that the major factor affecting classification capabilities is the difference n−mnm between the number nn of input languages and the number mm of output grammars. We also explore the relationship between classification capabilities for smaller and larger groups of input languages. For the variant of our model with the upper bound on the number of languages allowed to be represented by one output grammar, for classes consisting of disjoint languages, we found complete picture of relationship between classification capabilities for different parameters nn (the number of input languages), mm (number of output grammars), and rr (bound on the number of languages represented by each output grammar). This picture includes a combinatorial characterization of classification capabilities for the parameters n,m,rn,m,r of certain types.  相似文献   

4.
5.
The most effective way to maximize the lifetime of a wireless sensor network (WSN) is to allocate initial energy to sensors such that they exhaust their energy at the same time. The lifetime of a WSN as well as an optimal initial energy allocation are determined by a network design. The main contribution of the paper is to show that the lifetime of a WSN can be maximized by an optimal network design. We represent the network lifetime as a function of the number mm of annuli and show that mm has significant impact on network lifetime. We prove that if the energy consumed by data transmission is proportional to dα+cdα+c, where dd is the distance of data transmission and αα and cc are some constants, then for a circular area of interest with radius RR, the optimal number of annuli that maximizes the network lifetime is m=R((α−1)/c)1/αm=R((α1)/c)1/α for an arbitrary sensor density function.  相似文献   

6.
We present algorithmic lower bounds on the size sdsd of the largest independent sets of vertices in random dd-regular graphs, for each fixed d≥3d3. For instance, for d=3d=3 we prove that, for graphs on nn vertices, sd≥0.43475nsd0.43475n with probability approaching one as nn tends to infinity.  相似文献   

7.
In this paper we provide an explicit way to compute asymptotically almost sure upper bounds on the bisection width of random dd-regular graphs, for any value of dd. The upper bounds are obtained from the analysis of the performance of a randomized greedy algorithm to find bisections of dd-regular graphs. We provide bounds for 5≤d≤125d12. We also give empirical values of the size of the bisection found by the algorithm for some small values of dd and compare them with numerical approximations of our theoretical bounds. Our analysis also gives asymptotic lower bounds for the size of the maximum bisection.  相似文献   

8.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

9.
We show how to compute Hong’s bound for the absolute positiveness of a polynomial in dd variables with maximum degree δδ in O(nlogdn)O(nlogdn) time, where nn is the number of non-zero coefficients. For the univariate case, we give a linear time algorithm. As a consequence, the time bounds for the continued fraction algorithm for real root isolation improve by a factor of δδ.  相似文献   

10.
11.
Assume that a program pp on input aa outputs bb. We are looking for a shorter program qq having the same property (q(a)=bq(a)=b). In addition, we want qq to be simple conditional to pp (this means that the conditional Kolmogorov complexity K(q|p)K(q|p) is negligible). In the present paper, we prove that sometimes there is no such program qq, even in the case when the complexity of pp is much bigger than K(b|a)K(b|a). We give three different constructions that use the game approach, probabilistic arguments and algebraic arguments, respectively.  相似文献   

12.
13.
We formalize paper fold (origami) by graph rewriting. Origami construction is abstractly described by a rewriting system (O,?)(O,?), where OO is the set of abstract origamis and ?? is a binary relation on OO, that models fold  . An abstract origami is a structure (Π,∽,?)(Π,,?), where ΠΠ is a set of faces constituting an origami, and ∽ and ?? are binary relations on ΠΠ, each representing adjacency and superposition relations between the faces.  相似文献   

14.
We give a polynomial time reduction from the vector scheduling problem (VS) to the generalized load balancing problem (GLB). This reduction gives the first non-trivial online algorithm for VS where vectors come in an online fashion. The online algorithm is very simple in that each vector only needs to minimize the Lln(md)Lln(md) norm of the resulting load when it comes, where mm is the number of partitions and dd is the dimension of vectors. It has an approximation bound of elog(md)elog(md), which is in O(ln(md))O(ln(md)), so it also improves the O(ln2d)O(ln2d) bound of the existing polynomial time algorithm for VS. Additionally, the reduction shows that GLB does not have constant approximation algorithms that run in polynomial time unless P=NPP=NP.  相似文献   

15.
Motivated by the famous 3n+13n+1 conjecture, we call a mapping from ZZ to ZZresidue-class-wise affine   if there is a positive integer mm such that it is affine on residue classes (mod mm). This article describes a collection of algorithms and methods for computation in permutation groups and monoids formed by residue-class-wise affine mappings.  相似文献   

16.
We consider a two-edge connected, undirected graph G=(V,E)G=(V,E), with nn nodes and mm non-negatively real weighted edges, and a single source shortest paths tree (SPT) TT of GG rooted at an arbitrary node rr. If an edge in TT is temporarily removed, it makes sense to reconnect the nodes disconnected from the root by adding a single non-tree edge, called a swap edge  , instead of rebuilding a new optimal SPT from scratch. In the past, several optimality criteria have been considered to select a best possible swap edge. In this paper we focus on the most prominent one, that is the minimization of the average distance between the root and the disconnected nodes. To this respect, we present an O(mlog2n)O(mlog2n) time and O(m)O(m) space algorithm to find a best swap edge for every edge of TT, thus improving for m=o(n2/log2n)m=o(n2/log2n) the previously known O(n2)O(n2) time and space complexity algorithm.  相似文献   

17.
We consider time-space tradeoffs for static data structure problems in the cell probe model with word size 1 (the bit probe model). In this model, the goal is to represent nn-bit data with s=n+rs=n+r bits such that queries (of a certain type) about the data can be answered by reading at most tt bits of the representation. Ideally, we would like to keep both ss and tt small, but there are tradeoffs between the values of ss and tt that limit the possibilities of keeping both parameters small.  相似文献   

18.
This paper deals with the existence and search for properly edge-colored paths/trails between two, not necessarily distinct, vertices ss and tt in an edge-colored graph from an algorithmic perspective. First we show that several versions of the s−tst path/trail problem have polynomial solutions including the shortest path/trail case. We give polynomial algorithms for finding a longest properly edge-colored path/trail between ss and tt for a particular class of graphs and characterize edge-colored graphs without properly edge-colored closed trails. Next, we prove that deciding whether there exist kk pairwise vertex/edge disjoint properly edge-colored s−tst paths/trails in a cc-edge-colored graph GcGc is NP-complete even for k=2k=2 and c=Ω(n2)c=Ω(n2), where nn denotes the number of vertices in GcGc. Moreover, we prove that these problems remain NP-complete for cc-edge-colored graphs containing no properly edge-colored cycles and c=Ω(n)c=Ω(n). We obtain some approximation results for those maximization problems together with polynomial results for some particular classes of edge-colored graphs.  相似文献   

19.
20.
The claw finding problem has been studied in terms of query complexity as one of the problems closely connected to cryptography. Given two functions, ff and gg, with domain sizes NN and MM(N≤M)(NM), respectively, and the same range, the goal of the problem is to find xx and yy such that f(x)=g(y)f(x)=g(y). This problem has been considered in both quantum and classical settings in terms of query complexity. This paper describes an optimal algorithm that uses quantum walk to solve this problem. Our algorithm can be slightly modified to solve the more general problem of finding a tuple consisting of elements in the two function domains that has a prespecified property. It can also be generalized to find a claw of kk functions for any constant integer k>1k>1, where the domain sizes of the functions may be different.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号