首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Given any [c], [a], [d] xxxxxxxxR/M such that [d] ≤ [a] ≤ [c], [a] is locally noncuppable between [c] and [d] if [d] < [a] ≤ [c] and [a] ∨ [b] < [c] for any [b] xxxxxxxxR/M such that [d] ≤ [b] < [c]. It will be shown that given any nonzero [c] xxxxxxxxR/M, there are [a], [d] xxxxxxxxR/M such that [d] < [a] ≤ [c] and [a] is locally noncuppable between [c] and [d].  相似文献   

2.
Sequence data for a group of species is often summarized by a distance matrix M where M[s,t] is the dissimilarity between the sequences of species s and t . An ordinal assertion is a statement of the form ``species a and b are as similar as species c and d ' and is supported by distance matrix M if M[a,b] ≤ M[c,d] . Recent preliminary research suggests that ordinal assertions can be used to reconstruct the evolutionary history of a group of species effectively. However, further research on the mathematical and algorithmic properties of ordinal assertions is needed to facilitate the development and assessment of inference methods that utilize ordinal assertions for reconstructing evolutionary histories. A (weighted ) ordinal representation of a distance matrix M is a (weighted) phylogeny T such that, for all species a , b , c , and d labeling T , d T (a,b) ≤ d T (c,d) if and only if M[a,b] ≤ M[c,d], where d T is the weighted path length when T is weighted, otherwise d T is the unweighted path length. Hence, an ordinal representation of M is a phylogeny that supports the same ordinal assertions supported by M , and so is the focus of our examination of the mathematical and algorithmic properties of ordinal assertions. As it turns out, ordinal representations are rich in structure. In this paper several results on weighted and unweighted ordinal representations are presented: — The unweighted ordinal representation of a distance matrix is unique. This generalizes the well-known result that no two phylogenies share the same distance matrix [10], [21]. — The unweighted ordinal representation of a distance matrix can be found in O(n 2 log 2 (n)) time. The algorithm presented improves upon an O(n 3 ) algorithm by Kannan and Warnow [13] that finds binary unweighted ordinal representations of distance matrices. — Under certain conditions, weighted ordinal representations can be found in polynomial time. Received May 11, 1997; revised March 13, 1998.  相似文献   

3.
In the study of cappable and noncappable properties of the recursively enumerable(r.e.)degrees.Lempp suggested a conjecture which asserts that for all r.e.degrees and b,if a ≮b then there exists an r.e.degree c such that c≤a and c≮b and c is cappable.We shall prove in this paper that this conjecture holds under the condition that a is high.Working below a high r.e.degree h,we show that for any r.e.degree b with h≮b,there exist r.e.degrees a0 and a1 and such that a0,a1≮b,a0,a1≤h,and a0 and a1 from a minimal pair.  相似文献   

4.
The main focus of this paper is a pair of new approximation algorithms for certain integer programs. First, for covering integer programs {min cx:Axb,0xd} where A has at most k nonzeroes per row, we give a k-approximation algorithm. (We assume A,b,c,d are nonnegative.) For any k≥2 and ε>0, if P≠NP this ratio cannot be improved to k−1−ε, and under the unique games conjecture this ratio cannot be improved to kε. One key idea is to replace individual constraints by others that have better rounding properties but the same nonnegative integral solutions; another critical ingredient is knapsack-cover inequalities. Second, for packing integer programs {max cx:Axb,0xd} where A has at most k nonzeroes per column, we give a (2k 2+2)-approximation algorithm. Our approach builds on the iterated LP relaxation framework. In addition, we obtain improved approximations for the second problem when k=2, and for both problems when every A ij is small compared to b i . Finally, we demonstrate a 17/16-inapproximability for covering integer programs with at most two nonzeroes per column.  相似文献   

5.
6.
Abstract. We introduce the polynomial time version, in short ≤ P T -introreducibility, of the notion of introreducibility studied in Recursion Theory. We give a simpler proof of the known fact that a set is ≤ P T -introreducible if and only if it is in P. Our proof generalizes to virtually all the computation bounded reducibilities ≤ r , showing that a set is ≤ r -introreducible if and only if it belongs to the minimum ≤ r -degree. It also holds for most unbounded reducibilities like ≤ m , ≤ c , ≤ d , ≤ p , ≤ tt , etc., but it does not hold for ≤ T . A very strong way for a set L to fail being ≤ r -introreducible is that L is not ≤ r -reducible to any coinfinite subset of L . We call such sets ≤ r -introimmune. It is known that ≤ T -introimmune sets exist but they are not arithmetical. In this paper we ask for which reducibilities ≤ r there exist arithmetical ≤ r -introimmune sets. We show that they exist for the reducibilities ≤ c and ≤ N m . Finally, we prove separation results between introimmunities.  相似文献   

7.
We say that the mutual information of a triple of binary strings a, b, c can be extracted if there exists a string d such that a, b, and c are independent given d, and d is simple conditional to each of the strings a, b, and c. It is proved that the mutual information between a, b, and c can be extracted if and only if the values of the conditional mutual informations I(a : b|c), I(a : c|b), and I(b : c|a) are negligible. The proof employs a non-Shannon-type information inequality (a generalization of the recently discovered Zhang–Yeung inequality).  相似文献   

8.
An axis-parallel k-dimensional box is a Cartesian product R 1×R 2×???×R k where R i (for 1≤ik) is a closed interval of the form [a i ,b i ] on the real line. For a graph G, its boxicity box?(G) is the minimum dimension k, such that G is representable as the intersection graph of (axis-parallel) boxes in k-dimensional space. The concept of boxicity finds applications in various areas such as ecology, operations research etc. A number of NP-hard problems are either polynomial time solvable or have much better approximation ratio on low boxicity graphs. For example, the max-clique problem is polynomial time solvable on bounded boxicity graphs and the maximum independent set problem for boxicity d graphs, given a box representation, has a $\lfloor 1+\frac{1}{c}\log n\rfloor^{d-1}An axis-parallel k-dimensional box is a Cartesian product R 1×R 2×⋅⋅⋅×R k where R i (for 1≤ik) is a closed interval of the form [a i ,b i ] on the real line. For a graph G, its boxicity box (G) is the minimum dimension k, such that G is representable as the intersection graph of (axis-parallel) boxes in k-dimensional space. The concept of boxicity finds applications in various areas such as ecology, operations research etc. A number of NP-hard problems are either polynomial time solvable or have much better approximation ratio on low boxicity graphs. For example, the max-clique problem is polynomial time solvable on bounded boxicity graphs and the maximum independent set problem for boxicity d graphs, given a box representation, has a ?1+\frac1clogn?d-1\lfloor 1+\frac{1}{c}\log n\rfloor^{d-1} approximation ratio for any constant c≥1 when d≥2. In most cases, the first step usually is computing a low dimensional box representation of the given graph. Deciding whether the boxicity of a graph is at most 2 itself is NP-hard.  相似文献   

9.
Hatem M. Bahig 《Computing》2006,78(2):161-172
An addition chain for a natural number n is a sequence 1=a 0<a 1< . . . <a r =n of numbers such that for each 0<ir, a i =a j +a k for some 0≤kj<i. An improvement by a factor of 2 in the generation of all minimal (or one) addition chains is achieved by finding sufficient conditions for star steps, computing what we will call nonstar lower bound in a minimal addition and omitting the sorting step.  相似文献   

10.
Two online algorithms for the ambulance systems   总被引:1,自引:1,他引:0       下载免费PDF全文
  相似文献   

11.
In this paper, we consider the implementation of a product c=A b, where A is N 1×N 3 band matrix with bandwidth ω and b is a vector of size N 3×1, on bidirectional and unidirectional linear systolic arrays (BLSA and ULSA, respectively). We distinguish the cases when the matrix bandwidth ω is 1≤ωN 3 and N 3ωN 1+N 3−1. A modification of the systolic array synthesis procedure based on data dependencies and space-time transformations of data dependency graph is proposed. The modification enables obtaining both BLSA and ULSA with an optimal number of processing elements (PEs) regardless of the matrix bandwidth. The execution time of the synthesized arrays has been minimized. We derive explicit formulas for the synthesis of these arrays. The performances of the designed arrays are discussed and compared to the performances of the arrays obtained by the standard design procedure.  相似文献   

12.
《国际计算机数学杂志》2012,89(3-4):225-244
Several transitive relations of geometrical objects (like inclusion of intervals on a line or polygons in the plain), which are important in VLSI design applications, can be translated into the dominance relation a dominates b iff (ab and a j b j for j = 1,…d) of points a = (a 1,...,a d ),b = (b 1,…b d ) in R d by representing the objects as points in a suitable way. If only the transitive reduction (see [7]) of the given relation is required and not all the implications by transitivity, one can restrict oneself to the direct dominances in the corresponding point set N; here a dominates b directly means that a dominates b and there is no—with respect to dominance—intermediate c in N (see [5]). To estimate the advantage of this restriction, information about the numbers of dominant and directly dominant pairs in a set of n points is required, both numbers essentially depending upon how the points are distributed in R d . In this paper we assume the n points in question to be identically and independently distributed; then we can expect q·n·(n–1) dominance pairs. For a certain class of distributions including the uniform distribution we prove the theorem, that the expected number of direct dominance pairs is asymptotically equal to 1/(d?1)! · n1n d ? 1(n). Hence algorithms which compute only the direct dominances instead of all dominances are worth to be considered.  相似文献   

13.
Abstract

The influence of the luminance of the gap between display elements of flat panel displays (FPDs) on perceived contrast was investigated. Twelve black-on-white FPDs, differing systematically with respect to foreground, background, and gap luminance, were simulated in an experiment. Twelve subjects rated each simulation on u scale, measuring several aspects of image quality, and performed a search task with each simulated FPD. The aims of the research were (a) to validate and assess the reliability of the rating scale items concerning contrast; (b) to relate subjective to objective measures; (c) to find out if ratings improve if raters perform a task with the rated objects; and (d) to evaluate a metric for expressing FPD contrast that we recently proposed. It is concluded that (a) the scale items are reliable if the rated objects vary on the property under concern; several items consistently measured subjective contrast; (b) subjective and objective contrast were strongly related in a linear fashion; (c) without actually using the stimuli in a working task, raters were capable of producing reliable and valid ratings; and (d) the proposed effective luminance modulation (Mr ) metric did, but ordinary luminance modulation did not correspond to perceived contrast. Based on this latter finding we recommend that an alternative contrast measurement procedure based on the (Mr ) metric is further validated for wide gaps and negative polarity displays.  相似文献   

14.
Katz  Nielsen  Segal 《Algorithmica》2008,36(1):59-73
   Abstract. We show how to maintain efficiently a minimum piercing set for a set S of intervals on the line, under insertions and deletions to/from S. A linear-size dynamic data structure is presented, which enables us to compute a new minimum piercing set following an insertion or deletion in time O(c( S) log |S|), where c (S) is the size of the new minimum piercing set. We also show how to maintain a piercing set for S of size at most (1+ɛ)c (S), for 0 < ɛ ≤ 1 , in
((log |S|)/ɛ) amortized time per update. We then apply these results to obtain efficient solutions to the following three problems: (i) the shooter location problem, (ii) computing a minimum piercing set for arcs on a circle, and (iii) dynamically maintaining a box cover for a d -dimensional point set.  相似文献   

15.
In this paper we investigate the problem of approximating the fraction of truth assignments that satisfy a Boolean formula with some restricted form of DNF under distributions with limited independence between random variables. LetF be a DNF formula onn variables withm clauses in which each literal appears at most once. We prove that ifD is [k logm]-wise independent, then |Pr D [F]-Pr U [F]| ≤ , whereU denotes the uniform distribution and Pr D [F] denotes the probability thatF is satisfied by a truth assignment chosen according to distributionD (similarly for Pr U [F]). Using the result, we also derive the following: For formulas satisfying the restriction described above and for any constantc, there exists a probability distributionD, with size polynomial in logn andm, such that |Pr D [F] - Pr U [F]| ≤c holds.  相似文献   

16.
In (1993, Annals of Pure and Applied Logic, 62, 207–263),Kaddah pointed out that there are two d.c.e. degrees a,b forminga minimal pair in the d.c.e. degrees, but not in the degrees. Kaddah's; result shows thatLachlan's; theorem, stating that the infima of two c.e. degreesin the c.e. degrees and in the degrees coincide, cannot be generalized to the d.c.e. degrees. In this article, we apply Kaddah's; idea to show that thereare two d.c.e. degrees c,d such that c cups d to 0', and capsd to 0 in the d.c.e. degrees, but not in the degrees. As a consequence, the diamond embedding{0,c,d,0'} is different from the one first constructed by Downeyin 1989 in [5]. To obtain this, we will construct c.e. degreesa,b, d.c.e. degrees c > a,d > b and a non-zero -c.e. degreee c,d such that (i) a,b form a minimal pair, (ii) a isolatesc, and (iii) b isolates d. From this, we can have that c,d forma minimal pair in the d.c.e. degrees, and Kaddah's; result followsimmediately. In our construction, we apply Kaddah's; originalidea to make e below both c and d. Our construction allows usto separate the minimal pair argument (ab = 0), the splittingof 0' (cd = 0'), and the non-minimal pair of c,d (in the degrees), into several parts, to avoiddirect conflicts that could be involved if only c,d and e areconstructed. We also point out that our construction allowsus to make a,b above (and hence c,d) high.  相似文献   

17.
A ] and an interval vector [b]. If all A∈[A] are H-matrices with positive diagonal elements, these methods are all convergent to the same interval vector [x *]. This interval vector includes the solution x of the linear complementarity problem defined by any fixed A∈[A] and any fixed b∈[b]. If all A∈[A] are M-matrices, then we will show, that [x *] is optimal in a precisely defined sense. We also consider modifications of those methods, which under certain assumptions on the starting vector deliver nested sequences converging to [x *]. We close our paper with some examples which illustrate our theoretical results. Received October 7, 2002; revised April 15, 2003 Published online: June 23, 2003 RID="*" ID="*" Dedicated to U. Kulisch on the occasion of his 70th birthday. We are grateful to the referee who has given a series of valuable comments.  相似文献   

18.
《国际计算机数学杂志》2012,89(10):2202-2211
Let G be a graph, and let a, b, k be integers with 0≤ab, k≥0. An [a, b]-factor of graph G is defined as a spanning subgraph F of G such that ad F (x)≤b for each xV(G). Then a graph G is called an (a, b, k)-critical graph if after deleting any k vertices of G the remaining graph of G has an [a, b]-factor. In this article, a sufficient condition is given, which is a neighborhood condition for a graph G to be an (a, b, k)-critical graph.  相似文献   

19.
A closed interval is an ordered pair of real numbers [xy], with x ? y. The interval [xy] represents the set {i ∈ Rx ? i ? y}. Given a set of closed intervals I={[a1,b1],[a2,b2],…,[ak,bk]}, the Interval-Merging Problem is to find a minimum-cardinality set of intervals M(I)={[x1,y1],[x2,y2],…,[xj,yj]}, j ? k, such that the real numbers represented by equal those represented by . In this paper, we show the problem can be solved in O(d log d) sequential time, and in O(log d) parallel time using O(d) processors on an EREW PRAM, where d is the number of the endpoints of I. Moreover, if the input is given as a set of sorted endpoints, then the problem can be solved in O(d) sequential time, and in O(log d) parallel time using O(d/log d) processors on an EREW PRAM.  相似文献   

20.
Two new families of asymmetric quantum codes are constructed in this paper. The first one is derived from the Calderbank-Shor-Steane (CSS) construction applied to classical Reed-Solomon (RS) codes, providing quantum codes with parameters [[Nl(q l −1), Kl(q l −2d + c + 1), d z d/d x ≥ (dc)]] q , where q is a prime power and d > c + 1, c ≥ 1, l ≥ 1 are integers. The second family is derived from the CSS construction applied to classical generalized RS codes, generating quantum codes with parameters [[N = mn, K = m(2kn + c), d z d/d x ≥ (dc)]] q , where q is a prime power, 1 < k < n < 2k + cq m , k = nd + 1, and n, d > c + 1, c ≥ 1, m ≥ 1 are integers. Although the second proposed construction generalizes the first one, the techniques developed in both constructions are slightly different. These new codes have parameters better than or comparable to the ones available in the literature. Additionally, the proposed codes can be utilized in quantum channels having great asymmetry, that is, quantum channels in which the probability of occurrence of phase-shift errors is large when compared to the probability of occurrence of qudit-flip errors.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号