首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
This paper deals with the existence and search for properly edge-colored paths/trails between two, not necessarily distinct, vertices ss and tt in an edge-colored graph from an algorithmic perspective. First we show that several versions of the s−tst path/trail problem have polynomial solutions including the shortest path/trail case. We give polynomial algorithms for finding a longest properly edge-colored path/trail between ss and tt for a particular class of graphs and characterize edge-colored graphs without properly edge-colored closed trails. Next, we prove that deciding whether there exist kk pairwise vertex/edge disjoint properly edge-colored s−tst paths/trails in a cc-edge-colored graph GcGc is NP-complete even for k=2k=2 and c=Ω(n2)c=Ω(n2), where nn denotes the number of vertices in GcGc. Moreover, we prove that these problems remain NP-complete for cc-edge-colored graphs containing no properly edge-colored cycles and c=Ω(n)c=Ω(n). We obtain some approximation results for those maximization problems together with polynomial results for some particular classes of edge-colored graphs.  相似文献   

4.
We study the state complexity of certain simple languages. If AA is an alphabet of kk letters, then a kk-language   is a nonempty set of words of length kk, that is, a uniform language of length kk. We show that the minimal state complexity of a kk-language is k+2k+2, and the maximal, (kk−1−1)/(k−1)+2k+1(kk11)/(k1)+2k+1. We prove constructively that, for every ii between the minimal and maximal bounds, there is a language of state complexity ii. We introduce a class of automata accepting sets of words that are permutations of AA; these languages define a complete hierarchy of complexities between k2−k+3k2k+3 and 2k+12k+1. The languages of another class of automata, based on kk-ary trees, define a complete hierarchy of complexities between 2k+12k+1 and (kk−1−1)/(k−1)+2k+1(kk11)/(k1)+2k+1. This provides new examples of uniform languages of maximal complexity.  相似文献   

5.
We show how to support efficient back traversal in a unidirectional list, using small memory and with essentially no slowdown in forward steps. Using O(lgn)O(lgn) memory for a list of size nn, the ii’th back-step from the farthest point reached so far takes O(lgi)O(lgi) time in the worst case, while the overhead per forward step is at most ?? for arbitrary small constant ?>0?>0. An arbitrary sequence of forward and back steps is allowed. A full trade-off between memory usage and time per back-step is presented: kk vs. kn1/kkn1/k and vice versa. Our algorithms are based on a novel pebbling technique which moves pebbles on a virtual binary, or n1/kn1/k-ary, tree that can only be traversed in a pre-order fashion.  相似文献   

6.
7.
Matroid theory gives us powerful techniques for understanding combinatorial optimization problems and for designing polynomial-time algorithms. However, several natural matroid problems, such as 3-matroid intersection, are NP-hard. Here we investigate these problems from the parameterized complexity point of view: instead of the trivial nO(k)nO(k) time brute force algorithm for finding a kk-element solution, we try to give algorithms with uniformly polynomial (i.e., f(k)⋅nO(1)f(k)nO(1)) running time. The main result is that if the ground set of a represented linear matroid is partitioned into blocks of size ??, then we can determine in randomized time f(k,?)⋅nO(1)f(k,?)nO(1) whether there is an independent set that is the union of kk blocks. As a consequence, algorithms with similar running time are obtained for other problems such as finding a kk-element set in the intersection of ?? matroids, or finding kk terminals in a network such that each of them can be connected simultaneously to the source by ?? disjoint paths.  相似文献   

8.
We prove an explicit bound on the radius of a ball centered at the origin which is guaranteed to contain all bounded connected components of a semi-algebraic set S⊂RkSRk defined by a weak sign condition involving ss polynomials in Z[X1,…,Xk]Z[X1,,Xk] having degrees at most dd, and whose coefficients have bitsizes at most ττ. Our bound is an explicit function of s,d,ks,d,k and ττ, and does not contain any undetermined constants. We also prove a similar bound on the radius of a ball guaranteed to intersect every connected component of SS (including the unbounded components). While asymptotic bounds of the form 2τdO(k)2τdO(k) on these quantities were known before, some applications require bounds which are explicit and which hold for all values of s,d,ks,d,k and ττ. The bounds proved in this paper are of this nature.  相似文献   

9.
The present paper investigates two-parameter families of spheres in R3R3 and their corresponding two-dimensional surfaces ΦΦ in R4R4. Considering a rational surface ΦΦ in R4R4, the envelope surface ΨΨ of the corresponding family of spheres in R3R3 is typically non-rational. Using a classical sphere-geometric approach, we prove that the envelope surface ΨΨ and its offset surfaces admit rational parameterizations if and only if ΦΦ is a rational sub-variety of a rational isotropic hyper-surface in R4R4. The close relation between the envelope surfaces ΨΨ and rational offset surfaces in R3R3 is elaborated in detail. This connection leads to explicit rational parameterizations for all rational surfaces ΦΦ in R4R4 whose corresponding two-parameter families of spheres possess envelope surfaces admitting rational parameterizations. Finally we discuss several classes of surfaces sharing this property.  相似文献   

10.
In this paper we focus on the minimal deterministic finite automaton SkSk that recognizes the set of suffixes of a word ww up to kk errors. As first result we give a characterization of the Nerode’s right-invariant congruence that is associated with SkSk. This result generalizes the classical characterization described in [A. Blumer, J. Blumer, D. Haussler, A. Ehrenfeucht, M. Chen, J. Seiferas, The smallest automaton recognizing the subwords of a text, Theoretical Computer Science, 40, 1985, 31–55]. As second result we present an algorithm that makes use of SkSk to accept in an efficient way the language of all suffixes of ww up to kk errors in every window of size rr of a text, where rr is the repetition index of ww. Moreover, we give some experimental results on some well-known words, like prefixes of Fibonacci and Thue-Morse words. Finally, we state a conjecture and an open problem on the size and the construction of the suffix automaton with mismatches.  相似文献   

11.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

12.
The most natural and perhaps most frequently used method for testing membership of an individual tuple in a conjunctive query is based on searching trees of partial solutions, or search-trees. We investigate the question of evaluating conjunctive queries with a time-bound guarantee that is measured as a function of the size of the optimal search-tree. We provide an algorithm that, given a database DD, a conjunctive query QQ, and a tuple aa, tests whether Q(a)Q(a) holds in DD in time bounded by a polynomial in (sn)logk(sn)loglogn(sn)logk(sn)loglogn and nrnr, where nn is the size of the domain of the database, kk is the number of bound variables of the conjunctive query, ss is the size of the optimal search-tree, and rr is the maximum arity of the relations. In many cases of interest, this bound is significantly smaller than the nO(k)nO(k) bound provided by the naive search-tree method. Moreover, our algorithm has the advantage of guaranteeing the bound for any given conjunctive query. In particular, it guarantees the bound for queries that admit an equivalent form that is much easier to evaluate, even when finding such a form is an NP-hard task. Concrete examples include the conjunctive queries that can be non-trivially folded into a conjunctive query of bounded size or bounded treewidth. All our results translate to the context of constraint-satisfaction problems via the well-publicized correspondence between both frameworks.  相似文献   

13.
Given a digraph DD, the Minimum Leaf Out-Branching problem (MinLOB) is the problem of finding in DD an out-branching with the minimum possible number of leaves, i.e., vertices of out-degree 0. We prove that MinLOB is polynomial-time solvable for acyclic digraphs. In general, MinLOB is NP-hard and we consider three parameterizations of MinLOB. We prove that two of them are NP-complete for every value of the parameter, but the third one is fixed-parameter tractable (FPT). The FPT parameterization is as follows: given a digraph DD of order nn and a positive integral parameter kk, check whether DD contains an out-branching with at most n−knk leaves (and find such an out-branching if it exists). We find a problem kernel of order O(k2)O(k2) and construct an algorithm of running time O(2O(klogk)+n6)O(2O(klogk)+n6), which is an ‘additive’ FPT algorithm. We also consider transformations from two related problems, the minimum path covering and the maximum internal out-tree problems into MinLOB, which imply that some parameterizations of the two problems are FPT as well.  相似文献   

14.
We consider orthogonal drawings of a plane graph GG with specified face areas. For a natural number kk, a kk-gonal drawing of GG is an orthogonal drawing such that the boundary of GG is drawn as a rectangle and each inner face is drawn as a polygon with at most kk corners whose area is equal to the specified value. In this paper, we show that every slicing graph GG with a slicing tree TT and a set of specified face areas admits a 10-gonal drawing DD such that the boundary of each slicing subgraph that appears in TT is also drawn as a polygon with at most 10 corners. Such a drawing DD can be found in linear time.  相似文献   

15.
Let EE be a nonsupersingular elliptic curve over the finite field with pnpn elements. We present a deterministic algorithm that computes the zeta function and hence the number of points of such a curve EE in time quasi-quadratic in nn. An older algorithm having the same time complexity uses the canonical lift of EE, whereas our algorithm uses rigid cohomology combined with a deformation approach. An implementation in small odd characteristic turns out to give very good results.  相似文献   

16.
Given a simple polygon PP of nn vertices, the watchman route problem   asks for a shortest (closed) route inside PP such that each point in the interior of PP can be seen from at least one point along the route. In this paper, we present a simple, linear-time algorithm for computing a watchman route of length at most two times that of the shortest watchman route. The best known algorithm for computing a shortest watchman route takes O(n4logn)O(n4logn) time, which is too complicated to be suitable in practice.  相似文献   

17.
The software package Qcompiler (Chen and Wang 2013) provides a general quantum compilation framework, which maps any given unitary operation into a quantum circuit consisting of a sequential set of elementary quantum gates. In this paper, we present an extended software OptQC  , which finds permutation matrices PP and QQ for a given unitary matrix UU such that the number of gates in the quantum circuit of U=QTPTUPQU=QTPTUPQ is significantly reduced, where UU is equivalent to UU up to a permutation and the quantum circuit implementation of each matrix component is considered separately. We extend further this software package to make use of high-performance computers with a multiprocessor architecture using MPI. We demonstrate its effectiveness in reducing the total number of quantum gates required for various unitary operators.  相似文献   

18.
19.
We consider a two-edge connected, undirected graph G=(V,E)G=(V,E), with nn nodes and mm non-negatively real weighted edges, and a single source shortest paths tree (SPT) TT of GG rooted at an arbitrary node rr. If an edge in TT is temporarily removed, it makes sense to reconnect the nodes disconnected from the root by adding a single non-tree edge, called a swap edge  , instead of rebuilding a new optimal SPT from scratch. In the past, several optimality criteria have been considered to select a best possible swap edge. In this paper we focus on the most prominent one, that is the minimization of the average distance between the root and the disconnected nodes. To this respect, we present an O(mlog2n)O(mlog2n) time and O(m)O(m) space algorithm to find a best swap edge for every edge of TT, thus improving for m=o(n2/log2n)m=o(n2/log2n) the previously known O(n2)O(n2) time and space complexity algorithm.  相似文献   

20.
Let F(x,y)F(x,y) be a polynomial over a field KK and mm a nonnegative integer. We call a polynomial gg over KK an mm-near solution of F(x,y)F(x,y) if there exists a c∈KcK such that F(x,g)=cxmF(x,g)=cxm, and the number cc is called an mm-value of F(x,y)F(x,y) corresponding to gg. In particular, cc can be 0. Hence, by viewing F(x,y)=0F(x,y)=0 as a polynomial equation over K[x]K[x] with variable yy, every solution of the equation F(x,y)=0F(x,y)=0 in K[x]K[x] is also an mm-near solution. We provide an algorithm that gives all mm-near solutions of a given polynomial F(x,y)F(x,y) over KK, and this algorithm is polynomial time reducible to solving one variable equations over KK. We introduce approximate solutions to analyze the algorithm. We also give some interesting properties of approximate solutions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号