首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 390 毫秒
1.
2.
Assume that a program pp on input aa outputs bb. We are looking for a shorter program qq having the same property (q(a)=bq(a)=b). In addition, we want qq to be simple conditional to pp (this means that the conditional Kolmogorov complexity K(q|p)K(q|p) is negligible). In the present paper, we prove that sometimes there is no such program qq, even in the case when the complexity of pp is much bigger than K(b|a)K(b|a). We give three different constructions that use the game approach, probabilistic arguments and algebraic arguments, respectively.  相似文献   

3.
This paper is a sequel to “Computing diagonal form and Jacobson normal form of a matrix using Gröbner bases” (Levandovskyy and Schindelar, 2011). We present a new fraction-free algorithm for the computation of a diagonal form of a matrix over a certain non-commutative Euclidean domain over a computable field with the help of Gröbner bases. This algorithm is formulated in a general constructive framework of non-commutative Ore localizations of GG-algebras (OLGAs). We use the splitting of the computation of a normal form for matrices over Ore localizations into the diagonalization and the normalization processes. Both of them can be made fraction-free. For a given matrix MM over an OLGA RR, we provide a diagonalization algorithm to compute U,VU,V and DD with fraction-free entries such that UMV=DUMV=D holds and DD is diagonal. The fraction-free approach allows to obtain more information on the associated system of linear functional equations and its solutions, than the classical setup of an operator algebra with coefficients in rational functions. In particular, one can handle distributional solutions together with, say, meromorphic ones. We investigate Ore localizations of common operator algebras over K[x]K[x] and use them in the unimodularity analysis of transformation matrices U,VU,V. In turn, this allows to lift the isomorphism of modules over an OLGA Euclidean domain to a smaller polynomial subring of it. We discuss the relation of this lifting with the solutions of the original system of equations. Moreover, we prove some new results concerning normal forms of matrices over non-simple domains. Our implementation in the computer algebra system Singular:Plural follows the fraction-free strategy and shows impressive performance, compared with methods which directly use fractions. In particular, we experience a moderate swell of coefficients and obtain simple transformation matrices. Thus the method we propose is well suited for solving nontrivial practical problems.  相似文献   

4.
We consider orthogonal drawings of a plane graph GG with specified face areas. For a natural number kk, a kk-gonal drawing of GG is an orthogonal drawing such that the boundary of GG is drawn as a rectangle and each inner face is drawn as a polygon with at most kk corners whose area is equal to the specified value. In this paper, we show that every slicing graph GG with a slicing tree TT and a set of specified face areas admits a 10-gonal drawing DD such that the boundary of each slicing subgraph that appears in TT is also drawn as a polygon with at most 10 corners. Such a drawing DD can be found in linear time.  相似文献   

5.
Solomonoff’s central result on induction is that the prediction of a universal semimeasure MM converges rapidly and with probability 1 to the true sequence generating predictor μμ, if the latter is computable. Hence, MM is eligible as a universal sequence predictor in the case of unknown μμ. Despite some nearby results and proofs in the literature, the stronger result of convergence for all (Martin-Löf) random sequences remained open. Such a convergence result would be particularly interesting and natural, since randomness can be defined in terms of MM itself. We show that there are universal semimeasures MM which do not converge to μμ on all μμ-random sequences, i.e. we give a partial negative answer to the open problem. We also provide a positive answer for some non-universal semimeasures. We define the incomputable measure DD as a mixture over all computable measures and the enumerable semimeasure WW as a mixture over all enumerable nearly measures. We show that WW converges to DD and DD to μμ on all random sequences. The Hellinger distance measuring closeness of two distributions plays a central role.  相似文献   

6.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

7.
8.
Let F(x,y)F(x,y) be a polynomial over a field KK and mm a nonnegative integer. We call a polynomial gg over KK an mm-near solution of F(x,y)F(x,y) if there exists a c∈KcK such that F(x,g)=cxmF(x,g)=cxm, and the number cc is called an mm-value of F(x,y)F(x,y) corresponding to gg. In particular, cc can be 0. Hence, by viewing F(x,y)=0F(x,y)=0 as a polynomial equation over K[x]K[x] with variable yy, every solution of the equation F(x,y)=0F(x,y)=0 in K[x]K[x] is also an mm-near solution. We provide an algorithm that gives all mm-near solutions of a given polynomial F(x,y)F(x,y) over KK, and this algorithm is polynomial time reducible to solving one variable equations over KK. We introduce approximate solutions to analyze the algorithm. We also give some interesting properties of approximate solutions.  相似文献   

9.
10.
We define an operation called transposition on words of fixed length. This operation arises naturally when the letters of a word are considered as entries of a matrix. Words that are invariant with respect to transposition are of special interest. It turns out that transposition invariant words have a simple interpretation by means of elementary group theory. This leads us to investigate some properties of the ring of integers modulo nn and primitive roots. In particular, we show that there are infinitely many prime numbers pp with a primitive root dividing p+1p+1 and infinitely many prime numbers pp without a primitive root dividing p+1p+1. We also consider the orbit of a word under transposition.  相似文献   

11.
12.
We consider the Rosenfeld–Gröbner algorithm for computing a regular decomposition of a radical differential ideal generated by a set of ordinary differential polynomials in nn indeterminates. For a set of ordinary differential polynomials FF, let M(F)M(F) be the sum of maximal orders of differential indeterminates occurring in FF. We propose a modification of the Rosenfeld–Gröbner algorithm, in which for every intermediate polynomial system FF, the bound M(F)?(n−1)!M(F0)M(F)?(n1)!M(F0) holds, where F0F0 is the initial set of generators of the radical ideal. In particular, the resulting regular systems satisfy the bound. Since regular ideals can be decomposed into characterizable components algebraically, the bound also holds for the orders of derivatives occurring in a characteristic decomposition of a radical differential ideal.  相似文献   

13.
14.
We formalize paper fold (origami) by graph rewriting. Origami construction is abstractly described by a rewriting system (O,?)(O,?), where OO is the set of abstract origamis and ?? is a binary relation on OO, that models fold  . An abstract origami is a structure (Π,∽,?)(Π,,?), where ΠΠ is a set of faces constituting an origami, and ∽ and ?? are binary relations on ΠΠ, each representing adjacency and superposition relations between the faces.  相似文献   

15.
Let f(X,Y)∈Z[X,Y]f(X,Y)Z[X,Y] be an irreducible polynomial over QQ. We give a Las Vegas absolute irreducibility test based on a property of the Newton polytope of ff, or more precisely, of ff modulo some prime integer pp. The same idea of choosing a pp satisfying some prescribed properties together with LLLLLL is used to provide a new strategy for absolute factorization of f(X,Y)f(X,Y). We present our approach in the bivariate case but the techniques extend to the multivariate case. Maple computations show that it is efficient and promising as we are able to construct the algebraic extension containing one absolute factor of a polynomial of degree up to 400.  相似文献   

16.
We investigate the group key management problem for broadcasting applications. Previous work showed that, in handling key updates, batch rekeying can be more cost effective than individual rekeying. One model for batch rekeying is to assume that every user has probability pp of being replaced by a new user during a batch period with the total number of users unchanged. Under this model, it was recently shown that an optimal key tree can be constructed in linear time when pp is a constant and in O(n4)O(n4) time when p→0p0. In this paper, we investigate more efficient algorithms for the case p→0p0, i.e., when membership changes are sparse. We design an O(n)O(n) heuristic algorithm for the sparse case and show that it produces a nearly 2-approximation to the optimal key tree. Simulation results show that its performance is even better in practice. We also design a refined heuristic algorithm and show that it achieves an approximation ratio of 1+?1+? for any fixed ?>0?>0 and nn, as p→0p0. Finally, we give another approximation algorithm for any p∈(0,0.693)p(0,0.693) which is shown to be quite good by our simulations.  相似文献   

17.
We consider time-space tradeoffs for static data structure problems in the cell probe model with word size 1 (the bit probe model). In this model, the goal is to represent nn-bit data with s=n+rs=n+r bits such that queries (of a certain type) about the data can be answered by reading at most tt bits of the representation. Ideally, we would like to keep both ss and tt small, but there are tradeoffs between the values of ss and tt that limit the possibilities of keeping both parameters small.  相似文献   

18.
This paper deals with the existence and search for properly edge-colored paths/trails between two, not necessarily distinct, vertices ss and tt in an edge-colored graph from an algorithmic perspective. First we show that several versions of the s−tst path/trail problem have polynomial solutions including the shortest path/trail case. We give polynomial algorithms for finding a longest properly edge-colored path/trail between ss and tt for a particular class of graphs and characterize edge-colored graphs without properly edge-colored closed trails. Next, we prove that deciding whether there exist kk pairwise vertex/edge disjoint properly edge-colored s−tst paths/trails in a cc-edge-colored graph GcGc is NP-complete even for k=2k=2 and c=Ω(n2)c=Ω(n2), where nn denotes the number of vertices in GcGc. Moreover, we prove that these problems remain NP-complete for cc-edge-colored graphs containing no properly edge-colored cycles and c=Ω(n)c=Ω(n). We obtain some approximation results for those maximization problems together with polynomial results for some particular classes of edge-colored graphs.  相似文献   

19.
The aim of this paper is to investigate the possibility of solving a linear differential equation of degree nn by means of differential equations of degree less than or equal to a fixed dd, 1≤d<n1d<n. This paper recovers and extends work of G. Fano, M. F. Singer and E. Compoint. Representations of algebraic Lie algebras are the main tool.  相似文献   

20.
The claw finding problem has been studied in terms of query complexity as one of the problems closely connected to cryptography. Given two functions, ff and gg, with domain sizes NN and MM(N≤M)(NM), respectively, and the same range, the goal of the problem is to find xx and yy such that f(x)=g(y)f(x)=g(y). This problem has been considered in both quantum and classical settings in terms of query complexity. This paper describes an optimal algorithm that uses quantum walk to solve this problem. Our algorithm can be slightly modified to solve the more general problem of finding a tuple consisting of elements in the two function domains that has a prespecified property. It can also be generalized to find a claw of kk functions for any constant integer k>1k>1, where the domain sizes of the functions may be different.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号