首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

2.
We describe O(n)O(n) time algorithms for finding the minimum weighted dominating induced matching of chordal, dually chordal, biconvex, and claw-free graphs. For the first three classes, we prove tight O(n)O(n) bounds on the maximum number of edges that a graph having a dominating induced matching may contain. By applying these bounds, and employing existing O(n+m)O(n+m) time algorithms we show that they can be reduced to O(n)O(n) time. For claw-free graphs, we describe a variation of the existing algorithm for solving the unweighted version of the problem, which decreases its complexity from O(n2)O(n2) to O(n)O(n), while additionally solving the weighted version. The same algorithm can be easily modified to count the number of DIM's of the given graph.  相似文献   

3.
A collection of T1,T2,…,TkT1,T2,,Tk of unrooted, leaf labelled (phylogenetic) trees, all with different leaf sets, is said to be compatible   if there exists a tree TT such that each tree TiTi can be obtained from TT by deleting leaves and contracting edges. Determining compatibility is NP-hard, and the fastest algorithm to date has worst case complexity of around Ω(nk)Ω(nk) time, nn being the number of leaves. Here, we present an O(nf(k))O(nf(k)) algorithm, proving that compatibility of unrooted phylogenetic trees is fixed parameter tractable   (FPT) with respect to the number kk of trees.  相似文献   

4.
5.
We aim at finding the best possible seed values when computing a1/pa1/p using the Newton–Raphson iteration in a given interval. A natural choice of the seed value would be the one that best approximates the expected result. It turns out that in most cases, the best seed value can be quite far from this natural choice. When we evaluate a monotone function f(a)f(a) in the interval [amin,amax][amin,amax], by building the sequence xnxn defined by the Newton–Raphson iteration, the natural choice consists in choosing x0x0 equal to the arithmetic mean of the endpoint values. This minimizes the maximum possible distance between x0x0 and f(a)f(a). And yet, if we perform nn iterations, what matters is to minimize the maximum possible distance between xnxn and f(a)f(a). In several examples, the value of the best starting point varies rather significantly with the number of iterations.  相似文献   

6.
7.
In this paper we study the computational complexity of the following optimization problem: given a graph G=(V,E)G=(V,E), we wish to find a tree T such that (1) the degree of each internal node of T   is at least 3 and at most ΔΔ, (2) the leaves of T are exactly the elements of V, and (3) the number of errors, that is, the symmetric difference between E   and {{u,v}:u,v{{u,v}:u,v are leaves of T   and dT(u,v)≤k}dT(u,v)k}, is as small as possible, where dT(u,v)dT(u,v) denotes the distance between uu and vv in tree T  . We show that this problem is NP-hard for all fixed constants Δ,k≥3Δ,k3.  相似文献   

8.
9.
In this paper we discuss models and methods for solving the rooted distance constrained minimum spanning tree problem which is defined as follows: given a graph G=(V,E)G=(V,E) with node set V={0,1,…,n}V={0,1,,n} and edge set EE, two integer weights, a cost cece and a delay wewe associated with each edge ee of EE, and a natural (time limit) number HH, we wish to find a spanning tree TT of the graph with minimum total cost and such that the unique path from a specified root node, node 0, to any other node has total delay not greater than HH. This problem generalizes the well known hop-constrained spanning tree problem and arises in the design of centralized networks with quality of service constraints and also in package shipment with service guarantee constraints. We present three theoretically equivalent modeling approaches, a column generation scheme, a Lagrangian relaxation combined with subgradient optimization procedure, both based on a path formulation of the problem, and a shortest path (compact) reformulation of the problem which views the underlying subproblem as defined in a layered extended graph. We present results for complete graph instances with up to 40 nodes. Our results indicate that the layered graph path reformulation model is still quite good when the arc weights are reasonably small. Lagrangian relaxation combined with subgradient optimization procedure appears to work much better than column generation and seems to be a quite reasonable approach to the problem for large weight, and even small weight, instances.  相似文献   

10.
11.
12.
Given a capacitated undirected graph G=(V,E)G=(V,E) with a set of terminals K⊂VKV, a mimicking network   is a smaller graph H=(VH,EH)H=(VH,EH) which contains the set of terminals K   and for every bipartition [U,K−U][U,KU] of the terminals, the cost of the minimum cut separating U   from K−UKU in G is exactly equal to the cost of the minimum cut separating U   from K−UKU in H.  相似文献   

13.
In this paper we show a new method for calculating the nucleolus by solving a unique minimization linear program with O(4n)O(4n) constraints whose coefficients belong to {−1,0,1}{1,0,1}. We discuss the need of having all these constraints and empirically prove that they can be reduced to O(kmax2n)O(kmax2n), where kmax is a positive integer comparable with the number of players. A computational experience shows the applicability of our method over (pseudo)random transferable utility cooperative games with up to 18 players.  相似文献   

14.
15.
We introduce a general notion of miniaturization of a problem that comprises the different miniaturizations of concrete problems considered so far. We develop parts of the basic theory of miniaturizations. Using the appropriate logical formalism, we show that the miniaturization of a definable problem in W[t]W[t] lies in W[t]W[t], too. In particular, the miniaturization of the dominating set problem is in W[2]W[2]. Furthermore, we investigate the relation between f(k)·no(k)f(k)·no(k) time and subexponential time algorithms for the dominating set problem and for the clique problem.  相似文献   

16.
Consider sets S of hypercubes of side 2 in the discrete n-dimensional torus of side 4 with the property that every possible hypercube of side 2 has a nonempty intersection with some hypercube in S. The problem of minimizing the size of S is studied in two settings, depending on whether intersections between hypercubes in S are allowed or not. If intersections are not allowed, then one is asking for the smallest size of a non-extensible packing S  ; this size is denoted by f(n)f(n). If intersections are allowed, then the structure S is called a blocking set. The smallest size of a blocking set S   is denoted by h(n)h(n). By computer-aided techniques, it is shown that f(5)=12f(5)=12, f(6)=16f(6)=16, h(6)=15h(6)=15 and h(7)≤23h(7)23. Also, non-extensible packings as well as blocking sets of certain small sizes are classified for n≤6n6. There is a direct connection between these problems and a covering problem originating from the football pools.  相似文献   

17.
The twisted cube is an important variation of the hypercube. It possesses many desirable properties for interconnection networks. In this paper, we study fault-tolerant embedding of paths in twisted cubes. Let TQn(V,E)TQn(V,E) denote the n-dimensional twisted cube. We prove that a path of length l   can be embedded between any two distinct nodes with dilation 1 for any faulty set F⊂V(TQn)∪E(TQn)FV(TQn)E(TQn) with |F|?n-3|F|?n-3 and any integer l   with 2n-1-1?l?|V(TQn-F)|-12n-1-1?l?|V(TQn-F)|-1 (n?3n?3). This result is optimal in the sense that the embedding has the smallest dilation 1. The result is also complete in the sense that the two bounds on path length l   and faulty set size |F||F| for a successful embedding are tight. That is, the result does not hold if l?2n-1-2l?2n-1-2 or |F|?n-2|F|?n-2. We also extend the result on (n-3)(n-3)-Hamiltonian connectivity of TQnTQn in the literature.  相似文献   

18.
Given a simple polygon PP of nn vertices, the watchman route problem   asks for a shortest (closed) route inside PP such that each point in the interior of PP can be seen from at least one point along the route. In this paper, we present a simple, linear-time algorithm for computing a watchman route of length at most two times that of the shortest watchman route. The best known algorithm for computing a shortest watchman route takes O(n4logn)O(n4logn) time, which is too complicated to be suitable in practice.  相似文献   

19.
We propose to study a problem that arises naturally from both Topological Numbering of Directed Acyclic Graphs, and Additive Coloring (also known as Lucky Labeling). Let D be a digraph and f   a labeling of its vertices with positive integers; denote by S(v)S(v) the sum of labels over all neighbors of each vertex v. The labeling f is called topological additive numbering   if S(u)<S(v)S(u)<S(v) for each arc (u,v)(u,v) of the digraph. The problem asks to find the minimum number k for which D   has a topological additive numbering with labels belonging to {1,…,k}{1,,k}, denoted by ηt(D)ηt(D).  相似文献   

20.
A hash function is a mapping from a key universe U   to a range of integers, i.e., h:U?{0,1,…,m−1}h:U?{0,1,,m1}, where m is the range's size. A perfect hash function   for some set S⊆USU is a hash function that is one-to-one on S  , where m≥|S|m|S|. A minimal perfect hash function   for some set S⊆USU is a perfect hash function with a range of minimum size, i.e., m=|S|m=|S|. This paper presents a construction for (minimal) perfect hash functions that combines theoretical analysis, practical performance, expected linear construction time and nearly optimal space consumption for the data structure. For n keys and m=n   the space consumption ranges from 2.62n+o(n)2.62n+o(n) to 3.3n+o(n)3.3n+o(n) bits, and for m=1.23nm=1.23n it ranges from 1.95n+o(n)1.95n+o(n) to 2.7n+o(n)2.7n+o(n) bits. This is within a small constant factor from the theoretical lower bounds of 1.44n1.44n bits for m=n   and 0.89n0.89n bits for m=1.23nm=1.23n. We combine several theoretical results into a practical solution that has turned perfect hashing into a very compact data structure to solve the membership problem when the key set S is static and known in advance. By taking into account the memory hierarchy we can construct (minimal) perfect hash functions for over a billion keys in 46 min using a commodity PC. An open source implementation of the algorithms is available at http://cmph.sf.net under the GNU Lesser General Public License (LGPL).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号