首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
This paper aims at investigating properties of homomorphisms which preserve the bordered words. The bordered words are classified into d1d1-words and d2d2-words, where the length of the proper border of d2d2-word is greater than half of it. Some characterizations of d1d1-word-preserving homomorphism are studied. Some relationships among d-primitivity-preserving homomorphisms, d1d1-word-preserving homomorphisms, and d2d2-word-preserving homomorphisms are investigated. We show that every d-primitivity-preserving homomorphism is d1d1-word-preserving and every d1d1-word-preserving homomorphism is d2d2-word-preserving.  相似文献   

3.
4.
The local bb-function bf,p(s)bf,p(s) of an nn-variate polynomial f∈C[x]fC[x] (x=(x1,…,xn)x=(x1,,xn)) at a point p∈CnpCn is constant on each stratum of a stratification of CnCn. We propose a new method for computing such a stratification and bf,p(s)bf,p(s) on each stratum. In the existing method proposed in Oaku (1997b), a primary ideal decomposition of an ideal in C[x,s]C[x,s] is needed and our experiment shows that the primary decomposition can be a bottleneck for computing the stratification. In our new method, the computation can be done by just computing ideal quotients and examining inclusions of algebraic sets. The precise form of a stratum can be obtained by computing the decomposition of the radicals of the ideals in C[x]C[x] defining the stratum. We also introduce various techniques for improving the practical efficiency of the implementation and we show results of computations for some examples.  相似文献   

5.
6.
7.
For a set TT of nn points (terminals) in the plane, a Manhattan network   on TT is a network N(T)=(V,E)N(T)=(V,E) with the property that its edges are horizontal or vertical segments connecting points in V⊇TVT and for every pair of terminals, the network N(T)N(T) contains a shortest l1l1-path between them. A minimum Manhattan network   on TT is a Manhattan network of minimum possible length. The problem of finding minimum Manhattan networks has been introduced by Gudmundsson, Levcopoulos, and Narasimhan [J. Gudmundsson, C. Levcopoulos, G. Narasimhan, Approximating a minimum Manhattan network, Nordic Journal of Computing 8 (2001) 219–232. Proc. APPROX’99, 1999, pp. 28–37] and its complexity status is unknown. Several approximation algorithms (with factors 8, 4, and 3) have been proposed; recently Kato, Imai, and Asano [R. Kato, K. Imai, T. Asano, An improved algorithm for the minimum Manhattan network problem, ISAAC’02, in: LNCS, vol. 2518, 2002, pp. 344–356] have given a factor 2-approximation algorithm, however their correctness proof is incomplete. In this paper, we propose a rounding 2-approximation algorithm based on an LP-formulation of the minimum Manhattan network problem.  相似文献   

8.
Recently, Universum data that does not belong to any class of the training data, has been applied for training better classifiers. In this paper, we address a novel boosting algorithm called UUAdaBoost that can improve the classification performance of AdaBoost with Universum data. UUAdaBoost chooses a function by minimizing the loss for labeled data and Universum data. The cost function is minimized by a greedy, stagewise, functional gradient procedure. Each training stage of UUAdaBoost is fast and efficient. The standard AdaBoost weights labeled samples during training iterations while UUAdaBoost gives an explicit weighting scheme for Universum samples as well. In addition, this paper describes the practical conditions for the effectiveness of Universum learning. These conditions are based on the analysis of the distribution of ensemble predictions over training samples. Experiments on handwritten digits classification and gender classification problems are presented. As exhibited by our experimental results, the proposed method can obtain superior performances over the standard AdaBoost by selecting proper Universum data.  相似文献   

9.
Motivated by the famous 3n+13n+1 conjecture, we call a mapping from ZZ to ZZresidue-class-wise affine   if there is a positive integer mm such that it is affine on residue classes (mod mm). This article describes a collection of algorithms and methods for computation in permutation groups and monoids formed by residue-class-wise affine mappings.  相似文献   

10.
Given a graph GG, an integer kk, and a demand set D={(s1,t1),…,(sl,tl)}D={(s1,t1),,(sl,tl)}, the kk-Steiner Forest problem finds a forest in graph GG to connect at least kk demands in DD such that the cost of the forest is minimized. This problem was proposed by Hajiaghayi and Jain in SODA’06. Thereafter, using a Lagrangian relaxation technique, Segev et al. gave the first approximation algorithm to this problem in ESA’06, with performance ratio O(n2/3logl)O(n2/3logl). We give a simpler and faster approximation algorithm to this problem with performance ratio O(n2/3logk)O(n2/3logk) via greedy approach, improving the previously best known ratio in the literature.  相似文献   

11.
The ΔΔ-timed uniform consensus is a stronger variant of the traditional consensus and it satisfies the following additional property: every correct process terminates its execution within a constant time ΔΔΔ-timeliness), and no two processes decide differently (uniformity). In this paper, we consider the ΔΔ-timed uniform consensus problem in presence of fcfc crash processes and ftft timing-faulty processes, and propose a ΔΔ-timed uniform consensus algorithm. The proposed algorithm is adaptive in the following sense: it solves the ΔΔ-timed uniform consensus when at least ft+1ft+1 correct processes exist in the system. If the system has less than ft+1ft+1 correct processes, the algorithm cannot solve the ΔΔ-timed uniform consensus. However, as long as ft+1ft+1 processes are non-crashed, the algorithm solves (non-timed) uniform consensus. We also investigate the maximum number of faulty processes that can be tolerated. We show that any ΔΔ-timed uniform consensus algorithm tolerating up to ftft timing-faulty processes requires that the system has at least ft+1ft+1 correct processes. This impossibility result implies that the proposed algorithm attains the maximum resilience about the number of faulty processes. We also show that any ΔΔ-timed uniform consensus algorithm tolerating up to ftft timing-faulty processes cannot solve the (non-timed) uniform consensus when the system has less than ft+1ft+1 non-crashed processes. This impossibility result implies that our algorithm attains the maximum adaptiveness.  相似文献   

12.
13.
The security of the .NET programming model is studied from the standpoint of fully abstract compilation of C?C?. A number of failures of full abstraction are identified, and fixes described. The most serious problems have recently been fixed for version 2.0 of the .NET Common Language Runtime.  相似文献   

14.
15.
A collection of T1,T2,…,TkT1,T2,,Tk of unrooted, leaf labelled (phylogenetic) trees, all with different leaf sets, is said to be compatible   if there exists a tree TT such that each tree TiTi can be obtained from TT by deleting leaves and contracting edges. Determining compatibility is NP-hard, and the fastest algorithm to date has worst case complexity of around Ω(nk)Ω(nk) time, nn being the number of leaves. Here, we present an O(nf(k))O(nf(k)) algorithm, proving that compatibility of unrooted phylogenetic trees is fixed parameter tractable   (FPT) with respect to the number kk of trees.  相似文献   

16.
The twisted cube is an important variation of the hypercube. It possesses many desirable properties for interconnection networks. In this paper, we study fault-tolerant embedding of paths in twisted cubes. Let TQn(V,E)TQn(V,E) denote the n-dimensional twisted cube. We prove that a path of length l   can be embedded between any two distinct nodes with dilation 1 for any faulty set F⊂V(TQn)∪E(TQn)FV(TQn)E(TQn) with |F|?n-3|F|?n-3 and any integer l   with 2n-1-1?l?|V(TQn-F)|-12n-1-1?l?|V(TQn-F)|-1 (n?3n?3). This result is optimal in the sense that the embedding has the smallest dilation 1. The result is also complete in the sense that the two bounds on path length l   and faulty set size |F||F| for a successful embedding are tight. That is, the result does not hold if l?2n-1-2l?2n-1-2 or |F|?n-2|F|?n-2. We also extend the result on (n-3)(n-3)-Hamiltonian connectivity of TQnTQn in the literature.  相似文献   

17.
Motivated by recent applications of wireless sensor networks in monitoring infrastructure networks, we address the problem of optimal coverage of infrastructure networks using sensors whose sensing performance decays with distance. We show that this problem can be formulated as a continuous p-median problem on networks. The literature has addressed the discrete p-median problem   on networks and in continuum domains, and the continuous pp-median problem in continuum domains extensively. However, in-depth analysis of the continuous pp-median problem on networks has been lacking. With the sensing performance model that decays with distance, each sensor covers a region equivalent to its Voronoi partition on the network in terms of the shortest path distance metric. Using Voronoi partitions, we define a directional partial derivative of the coverage metric with respect to a sensor’s location. We then propose a gradient descent algorithm to obtain a locally optimal solution with guaranteed convergence. The quality of an optimal solution depends on the choice of the initial configuration of sensors. We obtain an initial configuration using two approaches: by solving the discrete pp-median problem on a lumped   network and by random sampling. We consider two methods of random sampling: uniform sampling and D2D2-sampling. The first approach with the initial solution of the discrete pp-median problem leads to the best coverage performance for large networks, but at the cost of high running time. We also observe that the gradient descent on the initial solution with the D2D2-sampling method yields a solution that is within at most 7% of the previous solution and with much shorter running time.  相似文献   

18.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

19.
In this work, we describe a simple and efficient construction of a large subset S   of FpFp, where p   is a prime, such that the set A(S)A(S) for any non-identity affine map A   over FpFp has small intersection with S.  相似文献   

20.
We study a Networked Control System architecture which uses a communication network in the controller–actuator links. The network is affected by packet dropouts and allows access to only one plant input node at each time instant. This limits control performance significantly. To mitigate these limitations we propose a control and network protocol co-design method. Succinctly, the underlying features of the proposed method are as follows: a sequence of predicted optimal control values over a finite horizon, for an optimally chosen input node, is obtained using Model Predictive Control ideas; the entire   resulting sequence is sent to the chosen input node; a smart actuator is used to store the predictions received and apply them accordingly. We show that if the number of consecutive packet dropouts is uniformly bounded, then partial nonlinear gain ?2?2 stability and also a more traditional linear gain ?2?2 stability can be ensured via appropriate choice of design parameters and the right assumptions. Whilst our results apply to general nonlinear discrete-time multiple input plants affected by exogenous disturbances, for a disturbance-free case we prove that Global Asymptotic Stability follows from our main result. Moreover, we show that by imposing stronger assumptions, Input-to-State Stability is achievable as well. Finally we demonstrate the potential of the proposed method via simulations.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号