共查询到20条相似文献,搜索用时 0 毫秒
1.
Ekaterina Shemyakova 《Programming and Computer Software》2014,40(3):151-157
Factorable Laplace operators of the form L = ? x ? y + a? x + b? y + c, where the coefficients a, b, c are not necessarily constants, are considered. For these operators, the Darboux transformations \(L\xrightarrow{M}L_1\) , M ∈ K[? x ], defined by the intertwining relation NL = L 1 M are considered. It is shown that only the following cases are possible: either (1) M ∩ ker? x + b = {0} and L 1 is also factorable or (2) M ∩ ker? x + b contains a nonzero element. We prove that, in both cases, the Darboux transformation can be represented as a product of first-order Darboux transformations. For case (2), the proof is based on the fact that the Darboux transformation of operator L can be reduced to Darboux transformations of first-order operators. 相似文献
2.
An algorithm is provided for constructing an approximating transformation for a feedback linearizable system, and for a system that is not feedback linearizable. Instead of approximating the given nonlinear system, the authors approximate the transformation in a proper sense. They assume that the lead variables of a transformation have a certain form with unknown parameters, substitute these variables into the required equations, and determine the unknown parameters through linear algebraic equations. There is a tremendous savings in terms of number of equations and unknowns, and it is sometimes possible to find exact (or best possible) transformations in a surprisingly small number of steps 相似文献
3.
The paper puts forward a computer algebra algorithm to calculate parameters of toric compactification of ? n in which a given smooth toric variety can be embedded as a “skeleton of infinity.” Such a compactification of an affine space extends the well-known decomposition ? n = ? n ? ? n?1 ∞ . The implementation of the algorithm in the computer algebra system Maple is described. 相似文献
4.
5.
S. M. Selim 《Computers & Education》1982,6(4):323-332
A method for constructing a University faculty timetable is described. The method is a modification of Almond's method (Almond M. Comput J. 12, 215–217, 1969) which did not consider the undesired times for giving lectures, availability of lecturers, and their requests. Also, Almond's recording method can put the program in an unclosed loop because the course may be inserted in a period of a fixed course. These points are taken into consideration in the author's algorithm. 相似文献
6.
7.
The dominating set problem asks for a small subset D of nodes in a graph such that every node is either in D or adjacent to a node in D. This problem arises in a number of distributed network applications, where it is important to locate a small number of centers
in the network such that every node is nearby at least one center. Finding a dominating set of minimum size is NP-complete,
and the best known approximation is logarithmic in the maximum degree of the graph and is provided by the same simple greedy
approach that gives the well-known logarithmic approximation result for the closely related set cover problem. We describe
and analyze new randomized distributed algorithms for the dominating set problem that run in polylogarithmic time, independent
of the diameter of the network, and that return a dominating set of size within a logarithmic factor from optimal, with high
probability. In particular, our best algorithm runs in rounds with high probability, where n is the number of nodes, is one plus the maximum degree of any node, and each round involves a constant number of message exchanges among any two
neighbors; the size of the dominating set obtained is within of the optimal in expectation and within of the optimal with high probability. We also describe generalizations to the weighted case and the case of multiple covering
requirements.
Received: January 2002 / Accepted: August 2002
RID="*"
ID="*" Supported by NSF CAREER award NSF CCR-9983901
RID="*"
ID="*" Supported by NSF CAREER award NSF CCR-9983901 相似文献
8.
B. Gabutti 《Computing》1985,34(2):107-116
An algorithm for computing generalized Euler's transformations of series is established. In comparison with known algorithm, the number of the arithmetic operations results to be slightly reduced. Numerical comparisons with the ε-algorithm are displayed. 相似文献
9.
Suppose that two organizations with their own separate cryptosystems are put into a context in which they must communicate. An example might be two businesses—accustomed to using different commercial cryptosystems—which have recently merged. Each might mistrust the security of the other's cryptosystem. But neither could quarrel with a process which took their two cryptosystems and yielded a third cryptosystem which was demonstrably at least as strong as either of the original two. This paper constructs a practical working model of such a “least upper bound” of two cryptosystems. 相似文献
10.
《Computer Aided Geometric Design》1988,5(2):127-137
In this paper we consider the problem of constructing an interpolatory spline in tension that matches the convexity and monotonicity properties of the data. In this connection, an algorithm is presented relying on the asymptotic properties of the splines in tension and making use of the generalized Newton-Raphson methods developed by Ben-Israel. The numerical performance of the proposed algorithm is tested and discussed for several data sets. 相似文献
11.
Wes MasriAuthor Vitae Hiba Halabi Author Vitae 《Journal of Systems and Software》2011,84(7):1171-1190
The use of dynamic dependence analysis spans several areas of software research including software testing, debugging, fault localization, and security. Many of the techniques devised in these areas require the execution of large test suites in order to generate profiles that capture the dependences that occurred between given types of program elements. When the aim is to capture direct and indirect dependences between finely granular elements, such as statements and variables, this process becomes highly costly due to: (1) the large number of elements, and (2) the transitive nature of the indirect dependence relationship.The focus of this paper is on computing dynamic dependences between variables, i.e., dynamic information flow analysis or DIFA. First, because the problem of tracking dependences between statements, i.e., dynamic slicing, has already been addressed by numerous researchers. Second, because DIFA is a more difficult problem given that the number of variables in a program is unbounded. We present an algorithm that, in the context of test suite execution, leverages the already computed dependences to efficiently compute subsequent dependences within the same or later test runs. To evaluate our proposed algorithm, we conducted an empirical comparative study that contrasted it, with respect to efficiency, to three other algorithms: (1) a naïve basic algorithm, (2) a memoization based algorithm that does not leverage computed dependences from previous test runs, and (3) an algorithm that uses reduced ordered binary decision diagrams (roBDDs) to maintain and manage dependences. The results indicated that our new DIFA algorithm performed considerably better in terms of both runtime and memory consumption. 相似文献
12.
13.
Multimedia applications are usually resource intensive, have stringent quality of service requirements, and in many cases involve large groups of participants. Multicasting is poised to play an important role in future deployment of these applications. This paper focuses on developing delay-bounded, minimum-cost multicast trees, linking a source to a set of multicast destination nodes. The approach taken in this paper is efficient, flexible and unique in the sense that it cleverly limits its computation only to paths that originate at multicast nodes, thereby avoiding computing paths that exclusively link non-multicast nodes. The simulation results show that the multicast trees produced by the proposed heuristic are of lower cost than those produced by other well-known heuristics, including those which use an expensive k-shortest-paths procedure to minimize the cost of the multicast tree. Furthermore, the results show that, in comparison to other heuristics, the proposed scheme results in a significant reduction in the computation time required to build the multicast tree. 相似文献
14.
A critical issue in the applications of cognitive diagnosis models (CDMs) is how to construct a feasible test that achieves the optimal statistical performance for a given purpose. As it is hard to mathematically formulate the statistical performance of a CDM test based on the items used, exact algorithms are inapplicable to the problem. Existing test construction heuristics, however, suffer from either limited applicability or slow convergence. In order to efficiently approximate the optimal CDM test for different construction purposes, this paper proposes a novel test construction method based on ant colony optimization (ACO-TC). This method guides the test construction procedure with pheromone that represents previous construction experience and heuristic information that combines different item discrimination indices. Each test constructed is evaluated through simulation to ensure convergence towards the actual optimum. To further improve the search efficiency, an adaptation strategy is developed, which adjusts the design of heuristic information automatically according to the problem instance and the search stage. The effectiveness and efficiency of the proposed method is validated through a series of experiments with different conditions. Results show that compared with traditional test construction methods of CDMs, the proposed ACO-TC method can find a test with better statistical performance at a faster speed. 相似文献
15.
周小双 《计算机工程与应用》2010,46(16):48-51
以RM、RZ、R0三个蕴涵算子为基础,研究了11种形式的三I算法的解,并在此基础上给出了这11种解的同一形式:B*(y)=SUP{A*(x)∧φ(x,y)},其中φ:X×Y→[0,1]表示某一函数,而且φ(x,y)与EY的选取依赖蕴涵算子Ri的选取。 相似文献
16.
We describe an extension of Karmarkar's algorithm for linear programming that handles problems with unknown optimal value and generates primal and dual solutions with objective values converging to the common optimal primal and dual value. We also describe an implementation for the dense case and show how extreme point solutions can be obtained naturally, with little extra computation.Research supported in part by a fellowship from the Alfred P. Sloan Foundation and by NSF Grant ECS-15361. 相似文献
17.
We describe an extension of Karmarkar's algorithm for linear programming that handles problems with unknown optimal value and generates primal and dual solutions with objective values converging to the common optimal primal and dual value. We also describe an implementation for the dense case and show how extreme point solutions can be obtained naturally, with little extra computation. 相似文献
18.
V. A. Kostenko A. V. Plakunov 《Journal of Computer and Systems Sciences International》2013,52(6):928-937
A mathematical statement of the problem of building a schedule of data exchange over a channel with centralized control is presented. This problem arises in the design of real-time management information systems (MISs). Various approaches to the design of ant colony algorithms are analyzed, and experimental comparison of the proposed algorithm with greedy algorithms is performed. 相似文献
19.
Margreet Kuijper 《Systems & Control Letters》1997,31(4):225-233
It is known that the Berlekamp-Massey algorithm from information theory can be used to compute scalar minimal partial realizations. Recently, it has been interpreted in terms of exact modeling of behaviors. In this paper, we extend these results to the multivariable case. We put the behavioral theory of exact modeling to work in deriving an extension of the Berlekamp-Massey algorithm for computing multivariable minimal partial realizations. 相似文献
20.
R.J. Willis 《Computers & Operations Research》1985,12(2):163-168
An algorithm for generating activity-on-arrow network diagrams is presented that does not need a graph plotter for its application, and can print networks of practical size within reasonable computer time. Computational experience is reported. 相似文献