共查询到20条相似文献,搜索用时 0 毫秒
1.
We study the question of which optimization problems can be
optimally or approximately solved by
greedy or greedy-like algorithms. For definiteness, we limit the present
discussion to some well-studied scheduling problems although
the underlying issues apply in a much more general setting.
Of course, the main benefit of greedy algorithms
lies in both their conceptual simplicity and their computational
efficiency. Based on the experience from online
competitive analysis, it seems plausible that we should
be able to derive approximation bounds for greedy-like
algorithms exploiting only the conceptual simplicity of these algorithms.
To this end, we need (and will provide) a precise definition of what we mean by greedy and greedy-like. 相似文献
2.
We present a framework for an automated
generation of exact search tree algorithms for NP-hard problems.
The purpose of our approach is twofold—rapid development and
improved upper bounds.
Many search tree algorithms for various problems
in the literature are based on complicated
case distinctions. Our approach may lead to a much
simpler process of developing and analyzing these algorithms.
Moreover, using the sheer computing power of machines it may also
lead to improved upper bounds on
search tree sizes (i.e., faster exact solving algorithms) in comparison
with previously developed hand-made search trees.
Among others, such an example is given with the NP-complete
Cluster Editing problem (also known as Correlation
Clustering on complete unweighted graphs), which asks for the minimum
number of edge additions and deletions to create a graph which is a
disjoint union of cliques. The
hand-made search tree
for Cluster Editing
had worst-case size O(2.27k), which now is improved to
O(1.92k) due to our new method.
(Herein, k denotes the number of edge modifications allowed.) 相似文献
3.
Sebastian Dörn 《Theory of Computing Systems》2009,45(3):613-628
We present quantum algorithms for the following matching problems in unweighted and weighted graphs with n vertices and m edges:
Our quantum algorithms are faster than the best known classical deterministic algorithms for the corresponding problems.
In particular, the second result solves an open question stated in a paper by Ambainis and Špalek (Proceedings of STACS’06,
pp. 172–183, 2006). 相似文献
• | Finding a maximal matching in general graphs in time . |
• | Finding a maximum matching in general graphs in time . |
• | Finding a maximum weight matching in bipartite graphs in time , where N is the largest edge weight. |
4.
贪婪算法与压缩感知理论 总被引:7,自引:0,他引:7
贪婪算法以其重建速度快、重建方法实现简便的特点在压缩感知(Compressed sensing, CS)理论中获得了广泛的应用. 本文首先介绍压缩感知的基本理论;然后,着重介绍现有几种重要的贪 婪重建算法,包括MP, OMP, IBOOMP, StOMP, SP, ROMP和CoSaMP等, 详细给出每种算法的数学框架和本质思想,着重从最优匹配原子的选择策略和残差信号的更新 方式这两个方面对各种算法进行对比分析,以限制等容常数为条件讨论各种算法在实现重建时的性能,包括重建时间、 重建的稳定性等;最后,通过模拟实验进一步验证了 各种算法的重建效果,同时模拟实验结果还进一步得出各种算法的重建效果与待重建信号 本身的稀疏度及测量次数这三者之间的关系,这也为新的更优算法的提出打下理论基础. 相似文献
5.
Abstract. Given a 2-edge-connected, real weighted graph G with n vertices and m edges, the 2-edge-connectivity augmentation problem is that of finding a minimum weight set of edges of G to be added to a spanning subgraph H of G to make it 2-edge-connected. While the general problem is NP-hard and 2 -approximable, in this paper we prove that it becomes polynomial time solvable if H is a depth-first search tree of G . More precisely, we provide an efficient algorithm for solving this special case which runs in O
(M · α(M,n)) time, where α is the classic inverse of Ackermann's function and M=m · α(m,n) . This algorithm has two main consequences: first, it provides a faster 2 -approximation algorithm for the general 2 -edge-connectivity augmentation problem; second, it solves in O
(m · α(m,n)) time the problem of restoring, by means of a minimum weight set of replacement edges, the 2 -edge-connectivity of a 2-edge-connected communication network undergoing a link failure. 相似文献
6.
航班时隙分配在空中交通管理领域中有着重要应用,考虑到在相同的延误时间情况下,不同类型的航班和不同的载客人数造成的综合损失差异,提出一种基于贪心法的航班分配算法。该算法在对航班进行排序的时候,在考虑到航空公司公平性的基础上,根据航班类型和载客数量,计算每架航班的优先级,然后根据当前可用时隙,以贪心法的规则找出优先级最高的航班,若有多个航班满足条件,则根据先来先服务原则进行选择,从而使经济损失和人员延误损失二者构成的综合损失最小化。算法仿真结果显示:该算法在很大程度上改进机场的运营效率,确保航空公司航班分配的公平性,维护航空公司及其服务对象的利益,具有一定的实用性和有效性。 相似文献
7.
In this paper we present deterministic parallel algorithms for the coarse-grained multicomputer (CGM) and bulk synchronous parallel (BSP) models for solving the following well-known graph problems: (1) list ranking, (2) Euler tour construction in a tree,
(3) computing the connected components and spanning forest, (4) lowest common ancestor preprocessing, (5) tree contraction
and expression tree evaluation, (6) computing an ear decomposition or open ear decomposition, and (7) 2-edge connectivity
and biconnectivity (testing and component computation). The algorithms require O(log p) communication rounds with linear sequential work per round (p = no. processors, N = total input size). Each processor creates, during the entire algorithm, messages of total size O(log (p) (N/p)) .
The algorithms assume that the local memory per processor (i.e., N/p ) is larger than p
ε
, for some fixed ε > 0 . Our results imply BSP algorithms with O(log p) supersteps, O(g log (p) (N/p)) communication time, and O(log (p) (N/p)) local computation time.
It is important to observe that the number of communication rounds/ supersteps obtained in this paper is independent of the problem size, and grows only logarithmically with respect to p . With growing problem size, only the sizes of the messages grow but the total number of messages remains unchanged. Due
to the considerable protocol overhead associated with each message transmission, this is an important property. The result
for Problem (1) is a considerable improvement over those previously reported. The algorithms for Problems (2)—(7) are the
first practically relevant parallel algorithms for these standard graph problems.
Received July 5, 2000; revised April 16, 2001. 相似文献
8.
9.
There has recently been a resurgence of interest in the shortest common superstring problem due to its important applications in molecular biology (e.g., recombination of DNA) and data compression. The problem
is NP-hard, but it has been known for some time that greedy algorithms work well for this problem. More precisely, it was
proved in a recent sequence of papers that in the worst case a greedy algorithm produces a superstring that is at most β times (2≤β≤ 4 ) worse than optimal. We analyze the problem in a probabilistic framework, and consider the optimal total overlap O
n
opt
and the overlap O
n
rg
produced by various greedy algorithms. These turn out to be asymptotically equivalent. We show that with high probability
, where n is the number of original strings and H is the entropy of the underlying alphabet. Our results hold under a condition that the lengths of all strings are not too
short.
Received November 1996; revised March 1997. 相似文献
10.
将多维背包问题的贪心变换和两种求解算法,用于求解具有重量和体积两个约束的背包问题,分别将物品按价值/重量、价值/体积比的凸组合和无穷范数的定义获得两组混合"性价比"权值向量,再以该混合"性价比"权值为依据构造两种贪心粒子群算法(wPSO,infPSO)。数值试验表明,算法wPSO、infPSO不仅大大优于现有粒子群算法,而且表现出优秀、稳定的搜索能力和快速定位最优解的搜索能力。 相似文献
11.
Recent work in dynamic graph algorithms has led to efficient algorithms for dynamic undirected graph problems such as connectivity. However, no efficient deterministic algorithms are known for the dynamic versions of
fundamental directed graph problems like strong connectivity and transitive closure, as well as some undirected graph problems such as maximum
matchings and cuts. We provide some explanation for this lack of success by presenting quadratic lower bounds on the certificate complexity of the seemingly difficult problems, in contrast to the known linear certificate complexity for the problems which have efficient dynamic algorithms.
In many applications of dynamic (di)graph problems, a certain form of lookahead is available. Specifically, we consider the problems of assembly planning in robotics and the maintenance of relations in
databases. These give rise to dynamic strong connectivity and dynamic transitive closure problems, respectively. We explain
why it is reasonable, and indeed natural and desirable, to assume that lookahead is available in these two applications. Exploiting
lookahead to circumvent their inherent complexity, we obtain efficient dynamic algorithms for strong connectivity and transitive
closure.
Received August 11, 1995; revised August 23, 1996. 相似文献
12.
图(Graph)在众多的科学领域和工程领域(如模式识别和计算机视觉)中具有广泛的应用 ,其具备 强大的信息表达能力。当图被用来表示物体结构时,衡量物体的相似程度将会被转化成计算两个图的相似度,这就是图匹配(Graph Matching)。近几十年来,对图匹配相关技术和算法的研究已经成为了研究领域内的一个重要课题,尤其是随着大数据时代的来临,图作为数据之间关系的一种表示形式,将会受到越来越多的关注。文中对图匹配技术的发展现状进行了综述,详细介绍了该技术的理论基础,梳理了解决图匹配问题的几种主流思路。最后,结合图匹配技术的一种具体应用对几种算法的性能进行了对比分析。 相似文献
13.
贪心算法求解k-median问题 总被引:1,自引:0,他引:1
文章讨论了用贪心算法解k-m edian问题以及其试验结果。首先提出了一个解k-m edian问题的简单贪心算法,然后对求解质量和求解的近似性能比进行了探讨。主要讨论了公制空间和非公制空间初始解的产生,用贪心算法解k-m edian问题以及全局最优解的计算。试验结果表明:贪心算法解公制空间的k-m edian问题效果要好于解非公制空间的k-m edian问题;用贪心算法解公制空间和非公制空间k-m edian问题都能得到较好的结果。 相似文献
14.
N. Lesh 《Information Processing Letters》2006,97(4):161-169
We introduce BubbleSearch, a general approach for extending priority-based greedy heuristics. Following the framework recently developed by Borodin et al., we consider priority algorithms, which sequentially assign values to elements in some fixed or adaptively determined order. BubbleSearch extends priority algorithms by selectively considering additional orders near an initial good ordering. While many notions of nearness are possible, we explore algorithms based on the Kendall-tau distance (also known as the BubbleSort distance) between permutations. Our contribution is to elucidate the BubbleSearch paradigm and experimentally demonstrate its effectiveness. 相似文献
15.
大规模数据下复杂网络的算法分析面临复杂度高的挑战,为此引入图稀疏的思想,在保持原始图性质的情况下以一定的精度在稀疏图上实现了高效的算法分析。图稀疏算法是一种保留顶点、对边稀疏采样的方法。按照相应算法分析所需要的原始图性质,提出图稀疏的边度量方式。文中系统回顾了4种边度量下的图稀疏采样方法:生成图稀疏、边连通图稀疏、聚类图稀疏、边传播性图稀疏,归纳了不同边度量方式下图稀疏的优缺点和适应性,并进一步讨论了动态图流稀疏化的最新研究进展。最后,总结了图稀疏领域有待解决的问题并展望了未来的研究方向。 相似文献
16.
We describe an ant algorithm for solving constraint problems (Solnon 2002, IEEE Transactions on Evolutionary Computation 6(4): 347–357). We devise a number of variants and carry out experiments. Our preliminary results suggest that the best way
to deposit pheromone and the best heuristics for state transitions may differ from current practice 相似文献
17.
We study network-design problems with two different design objectives: the total cost of the edges and nodes in the network
and the maximum degree of any node in the network. A prototypical example is the degree-constrained node-weighted Steiner
tree problem: We are given an undirected graph G(V,E) , with a nonnegative integral function d that specifies an upper bound d(v) on the degree of each vertex v ∈ V in the Steiner tree to be constructed, nonnegative costs on the nodes, and a subset of k nodes called terminals. The goal is to construct a Steiner tree T containing all the terminals such that the degree of any node v in T is at most the specified upper bound d(v) and the total cost of the nodes in T is minimum. Our main result is a bicriteria approximation algorithm whose output is approximate in terms of both the degree
and cost criteria—the degree of any node v ∈ V in the output Steiner tree is O(d(v) log k) and the cost of the tree is O(log k) times that of a minimum-cost Steiner tree that obeys the degree bound d(v) for each node v . Our result extends to the more general problem of constructing one-connected networks such as generalized Steiner forests.
We also consider the special case in which the edge costs obey the triangle inequality and present simple approximation algorithms
with better performance guarantees.
Received December 21, 1998; revised September 24, 1999. 相似文献
18.
Abstract. We present a new approach for designing external graph algorithms and use it to design simple, deterministic and randomized
external algorithms for computing connected components, minimum spanning forests, bottleneck minimum spanning forests, maximal
independent sets (randomized only), and maximal matchings in undirected graphs. Our I/ O bounds compete with those of previous approaches. We also introduce a semi-external model, in which the vertex set but
not the edge set of a graph fits in main memory. In this model we give an improved connected components algorithm, using new
results for external grouping and sorting with duplicates. Unlike previous approaches, ours is purely functional—without side
effects—and is thus amenable to standard checkpointing and programming language optimization techniques. This is an important
practical consideration for applications that may take hours to run. 相似文献
19.
旅行商问题(TSP)的一种改进遗传算法 总被引:16,自引:1,他引:16
传统的序号编码遗传算法(GA)使用PMX、CX和OX等特殊的交叉算子,这些算子实施起来很麻烦。针对TSP问题的求解,提出了一种新的改进遗传算法:单亲进化遗传算法(PEGA),PEGA是利用父体所提供的有效边的信息,使用保留最小边的方法进行个体的进化。与传统的遗传算法相比,PEGA算法弥补了它们的不足之处,简化了遗传算法。给出了PEGA算法的数值算例,仿真实验表明了该算法对于对称的TSP和非对称的TSP问题,都具有收敛速度快的特点,证明了该算法的有效性。 相似文献
20.
Sinichiro Kawano 《Information Processing Letters》2003,85(6):333-337
In this paper, we consider a greedy algorithm for thickness of graphs. The greedy algorithm we consider here takes a maximum planar subgraph away from the current graph in each iteration and repeats this process until the current graph has no edge. The greedy algorithm outputs the number of iterations which is an upper bound of thickness for an input graph G=(V,E). We show that the performance ratio of the greedy algorithm is . 相似文献