首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
We define a self-map Pal:F2F2Pal:F2F2 of the free group on two generators a,ba,b, using automorphisms of F2F2 that form a group isomorphic to the braid group B3B3. The map PalPal restricts to de Luca’s right iterated palindromic closure on the submonoid generated by a,ba,b. We show that PalPal is continuous for the profinite topology on F2F2; it is the unique continuous extension of de Luca’s right iterated palindromic closure to F2F2. The values of PalPal are palindromes and coincide with the elements g∈F2gF2 such that abgabg and bagbag are conjugate.  相似文献   

3.
4.
We aim at finding the best possible seed values when computing a1/pa1/p using the Newton–Raphson iteration in a given interval. A natural choice of the seed value would be the one that best approximates the expected result. It turns out that in most cases, the best seed value can be quite far from this natural choice. When we evaluate a monotone function f(a)f(a) in the interval [amin,amax][amin,amax], by building the sequence xnxn defined by the Newton–Raphson iteration, the natural choice consists in choosing x0x0 equal to the arithmetic mean of the endpoint values. This minimizes the maximum possible distance between x0x0 and f(a)f(a). And yet, if we perform nn iterations, what matters is to minimize the maximum possible distance between xnxn and f(a)f(a). In several examples, the value of the best starting point varies rather significantly with the number of iterations.  相似文献   

5.
6.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

7.
8.
This paper concerns construction of additive stretched spanners with few edges for nn-vertex graphs having a tree-decomposition into bags of diameter at most δδ, i.e., the tree-length δδ graphs. For such graphs we construct additive 2δ2δ-spanners with O(δn+nlogn)O(δn+nlogn) edges, and additive 4δ4δ-spanners with O(δn)O(δn) edges. This provides new upper bounds for chordal graphs for which δ=1δ=1. We also show a lower bound, and prove that there are graphs of tree-length δδ for which every multiplicative δδ-spanner (and thus every additive (δ−1)(δ1)-spanner) requires Ω(n1+1/Θ(δ))Ω(n1+1/Θ(δ)) edges.  相似文献   

9.
We present algorithmic lower bounds on the size sdsd of the largest independent sets of vertices in random dd-regular graphs, for each fixed d≥3d3. For instance, for d=3d=3 we prove that, for graphs on nn vertices, sd≥0.43475nsd0.43475n with probability approaching one as nn tends to infinity.  相似文献   

10.
Let F(x,y)F(x,y) be a polynomial over a field KK and mm a nonnegative integer. We call a polynomial gg over KK an mm-near solution of F(x,y)F(x,y) if there exists a c∈KcK such that F(x,g)=cxmF(x,g)=cxm, and the number cc is called an mm-value of F(x,y)F(x,y) corresponding to gg. In particular, cc can be 0. Hence, by viewing F(x,y)=0F(x,y)=0 as a polynomial equation over K[x]K[x] with variable yy, every solution of the equation F(x,y)=0F(x,y)=0 in K[x]K[x] is also an mm-near solution. We provide an algorithm that gives all mm-near solutions of a given polynomial F(x,y)F(x,y) over KK, and this algorithm is polynomial time reducible to solving one variable equations over KK. We introduce approximate solutions to analyze the algorithm. We also give some interesting properties of approximate solutions.  相似文献   

11.
We consider the following basic question: a source node wishes to stream an ordered sequence of packets to a collection of receivers, which are in KK clusters. A node may send a packet to another node in its own cluster in one time step and to a node in a different cluster in TcTc time steps (Tc>1)(Tc>1). Each cluster has two special nodes. We assume that the source and the special nodes in each cluster have a higher capacity and thus can send multiple packets at each step, while all other nodes can both send and receive a packet at each step. We construct two (intra-cluster) data communication schemes, one based on multi-trees (using a collection of dd-ary interior-disjoint trees) and the other based on hypercubes. The multi-tree scheme sustains streaming within a cluster with O(dlogN)O(dlogN) maximum playback delay and O(dlogN)O(dlogN) size buffers, while communicating with O(d)O(d) neighbors, where NN is the maximum size of any cluster. We also show that this protocol is optimal when d=2d=2 or 3. The hypercube scheme sustains streaming within a cluster, with O(log2(N))O(log2(N)) maximum playback delay and O(1)O(1) size buffers, while communicating with O(log(N))O(log(N)) neighbors, for arbitrary NN. In addition, we extend our multi-tree scheme to work when receivers depart and arrive over time. We also evaluate our dynamic schemes using simulations.  相似文献   

12.
Assume that a program pp on input aa outputs bb. We are looking for a shorter program qq having the same property (q(a)=bq(a)=b). In addition, we want qq to be simple conditional to pp (this means that the conditional Kolmogorov complexity K(q|p)K(q|p) is negligible). In the present paper, we prove that sometimes there is no such program qq, even in the case when the complexity of pp is much bigger than K(b|a)K(b|a). We give three different constructions that use the game approach, probabilistic arguments and algebraic arguments, respectively.  相似文献   

13.
14.
Let G=(V,E)G=(V,E) be a simple undirected graph with a set VV of vertices and a set EE of edges. Each vertex v∈VvV has a demand d(v)∈Z+d(v)Z+ and a cost c(v)∈R+c(v)R+, where Z+Z+ and R+R+ denote the set of nonnegative integers and the set of nonnegative reals, respectively. The source location problem with vertex-connectivity requirements in a given graph GG requires finding a set SS of vertices minimizing vSc(v)vSc(v) such that there are at least d(v)d(v) pairwise vertex-disjoint paths from SS to vv for each vertex v∈V−SvVS. It is known that if there exists a vertex v∈VvV with d(v)≥4d(v)4, then the problem is NP-hard even in the case where every vertex has a uniform cost. In this paper, we show that the problem can be solved in O(|V|4log2|V|)O(|V|4log2|V|) time if d(v)≤3d(v)3 holds for each vertex v∈VvV.  相似文献   

15.
The ΔΔ-timed uniform consensus is a stronger variant of the traditional consensus and it satisfies the following additional property: every correct process terminates its execution within a constant time ΔΔΔ-timeliness), and no two processes decide differently (uniformity). In this paper, we consider the ΔΔ-timed uniform consensus problem in presence of fcfc crash processes and ftft timing-faulty processes, and propose a ΔΔ-timed uniform consensus algorithm. The proposed algorithm is adaptive in the following sense: it solves the ΔΔ-timed uniform consensus when at least ft+1ft+1 correct processes exist in the system. If the system has less than ft+1ft+1 correct processes, the algorithm cannot solve the ΔΔ-timed uniform consensus. However, as long as ft+1ft+1 processes are non-crashed, the algorithm solves (non-timed) uniform consensus. We also investigate the maximum number of faulty processes that can be tolerated. We show that any ΔΔ-timed uniform consensus algorithm tolerating up to ftft timing-faulty processes requires that the system has at least ft+1ft+1 correct processes. This impossibility result implies that the proposed algorithm attains the maximum resilience about the number of faulty processes. We also show that any ΔΔ-timed uniform consensus algorithm tolerating up to ftft timing-faulty processes cannot solve the (non-timed) uniform consensus when the system has less than ft+1ft+1 non-crashed processes. This impossibility result implies that our algorithm attains the maximum adaptiveness.  相似文献   

16.
17.
18.
We consider the Rosenfeld–Gröbner algorithm for computing a regular decomposition of a radical differential ideal generated by a set of ordinary differential polynomials in nn indeterminates. For a set of ordinary differential polynomials FF, let M(F)M(F) be the sum of maximal orders of differential indeterminates occurring in FF. We propose a modification of the Rosenfeld–Gröbner algorithm, in which for every intermediate polynomial system FF, the bound M(F)?(n−1)!M(F0)M(F)?(n1)!M(F0) holds, where F0F0 is the initial set of generators of the radical ideal. In particular, the resulting regular systems satisfy the bound. Since regular ideals can be decomposed into characterizable components algebraically, the bound also holds for the orders of derivatives occurring in a characteristic decomposition of a radical differential ideal.  相似文献   

19.
Some time ago, Shpilrain and Yu reported an algorithm for deciding whether or not a polynomial p∈K[x,y]pK[x,y] is a coordinate, or, equivalently, whether or not a plane curve p(x,y)=0p(x,y)=0 is isomorphic to a line. Here KK is any constructible field of characteristic 0. In this paper, we show that their algorithm requires O(n2)O(n2) field operations, where nn is the degree of a given polynomial. We also show how their algorithm can be used to find a polynomial parametrization of a plane curve p(x,y)=0p(x,y)=0 which is isomorphic to a line. This requires O(n2log2n)O(n2log2n) field operations.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号