首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
We are given a stack of pancakes of different sizes and the only allowed operation is to take several pancakes from the top and flip them. The unburnt version requires the pancakes to be sorted by their sizes at the end, while in the burnt version they additionally need to be oriented burnt-side down. We are interested in the largest value of the number of flips needed to sort a stack of n pancakes, both in the unburnt version (f(n)) and in the burnt version (g(n)).We present exact values of f(n) up to n=19 and of g(n) up to n=17 and disprove a conjecture of Cohen and Blum by showing that the burnt stack ?I15 is not the hardest to sort for n=15.We also show that sorting a random stack of n unburnt pancakes can be done with at most 17n/12+O(1) flips on average. The average number of flips of the optimal algorithm for sorting stacks of n burnt pancakes is shown to be between n+Ω(n/logn) and 7n/4+O(1) and we conjecture that it is n+Θ(n/logn).Finally we show that sorting the stack ?In needs at least ?(3n+3)/2? flips, which slightly increases the lower bound on g(n). This bound together with the upper bound for sorting ?In found by Heydari and Sudborough in 1997 [10] gives the exact number of flips to sort it for n3(mod4) and n15.  相似文献   

2.
The number of states in a deterministic finite automaton (DFA) recognizing the language Lk, where L is regular language recognized by an n-state DFA, and k?2 is a constant, is shown to be at most n2(k?1)n and at least (n?k)2(k?1)(n?k) in the worst case, for every n>k and for every alphabet of at least six letters. Thus, the state complexity of Lk is Θ(n2(k?1)n). In the case k=3 the corresponding state complexity function for L3 is determined as 6n?384n?(n?1)2n?n with the lower bound witnessed by automata over a four-letter alphabet. The nondeterministic state complexity of Lk is demonstrated to be nk. This bound is shown to be tight over a two-letter alphabet.  相似文献   

3.
In this paper, we investigate the star graph Sn with faulty vertices and/or edges from the graph theoretic point of view. We show that between every pair of vertices with different colors in a bicoloring of Sn, n4, there is a fault-free path of length at least n!-2fv-1, and there is a path of length at least n!-2fv-2 joining a pair of vertices with the same color, when the number of faulty elements is n-3 or less. Here, fv is the number of faulty vertices. Sn, n4, with at most n-2 faulty elements has a fault-free cycle of length at least n!-2fv unless the number of faulty elements are n-2 and all the faulty elements are edges incident to a common vertex. It is also shown that Sn, n4, is strongly hamiltonian-laceable if the number of faulty elements is n-3 or less and the number of faulty vertices is one or less.  相似文献   

4.
Random Fibonacci sequences are stochastic versions of the classical Fibonacci sequence fn+1=fn+fn?1 for n>0, and f0=f1=1, obtained by randomizing one or both signs on the right side of the defining equation and/or adding a “growth parameter.” These sequences may be viewed as coming from a sequence of products of i.i.d. random matrices and their rate of growth measured by the associated Lyapunov exponent. Following the techniques presented by Embree and Trefethen in their numerical paper Embree and Trefethen (1999) [2], we study the behavior of the Lyapunov exponents as a function of the probability p of choosing + in the sign randomization.  相似文献   

5.
6.
7.
Eigenvalues of a real supersymmetric tensor   总被引:3,自引:0,他引:3  
In this paper, we define the symmetric hyperdeterminant, eigenvalues and E-eigenvalues of a real supersymmetric tensor. We show that eigenvalues are roots of a one-dimensional polynomial, and when the order of the tensor is even, E-eigenvalues are roots of another one-dimensional polynomial. These two one-dimensional polynomials are associated with the symmetric hyperdeterminant. We call them the characteristic polynomial and the E-characteristic polynomial of that supersymmetric tensor. Real eigenvalues (E-eigenvalues) with real eigenvectors (E-eigenvectors) are called H-eigenvalues (Z-eigenvalues). When the order of the supersymmetric tensor is even, H-eigenvalues (Z-eigenvalues) exist and the supersymmetric tensor is positive definite if and only if all of its H-eigenvalues (Z-eigenvalues) are positive. An mth-order n-dimensional supersymmetric tensor where m is even has exactly n(m1)n1 eigenvalues, and the number of its E-eigenvalues is strictly less than n(m1)n1 when m4. We show that the product of all the eigenvalues is equal to the value of the symmetric hyperdeterminant, while the sum of all the eigenvalues is equal to the sum of the diagonal elements of that supersymmetric tensor, multiplied by (m1)n1. The n(m1)n1 eigenvalues are distributed in n disks in C. The centers and radii of these n disks are the diagonal elements, and the sums of the absolute values of the corresponding off-diagonal elements, of that supersymmetric tensor. On the other hand, E-eigenvalues are invariant under orthogonal transformations.  相似文献   

8.
9.
10.
The feedback number of a graph G is the minimum number of vertices whose removal from G results in an acyclic subgraph. We use f(n,k) to denote the feedback number of the (n,k)-star graph Sn,k and p(n,k) the number of k-permutations of an n-element set. This paper proves thatp(n,k)?2(k?1)!(nk?1)?f(n,k)?p(n,k)?2(k?1)!i=1θ(n?2i+1k?i), where θ=min{k?1,n?k+1}.  相似文献   

11.
Systems of equations of the form X=Y+Z and X=C are considered, in which the unknowns are sets of integers, the plus operator denotes element-wise sum of sets, and C is an ultimately periodic constant. For natural numbers, such equations are equivalent to language equations over a one-symbol alphabet using concatenation and regular constants. It is shown that such systems are computationally universal: for every recursive (r.e., co-r.e.) set SN there exists a system with a unique (least, greatest) solution containing a component T with S={n|16n+13T}. Testing solution existence for these equations is Π10-complete, solution uniqueness is Π20-complete, and finiteness of the set of solutions is Σ30-complete. A similar construction for integers represents any hyper-arithmetical set SZ by a set TZ satisfying S={n|16nT}, whereas testing solution existence is Σ11-complete.  相似文献   

12.
13.
14.
15.
16.
We give polynomial-time, deterministic randomness extractors for sources generated in small space, where we model space s sources on {0,1}n as sources generated by width 2s branching programs. Specifically, there is a constant η>0 such that for any ζ>n?η, our algorithm extracts m=(δ?ζ)n bits that are exponentially close to uniform (in variation distance) from space s sources with min-entropy δn, where s=Ω(ζ3n). Previously, nothing was known for δ?1/2, even for space 0. Our results are obtained by a reduction to the class of total-entropy independent sources. This model generalizes both the well-studied models of independent sources and symbol-fixing sources. These sources consist of a set of r independent smaller sources over {0,1}?, where the total min-entropy over all the smaller sources is k. We give deterministic extractors for such sources when k is as small as polylog(r), for small enough ?.  相似文献   

17.
Many sensor networks (especially networks of mobile sensors or networks that are deployed to monitor crisis situations) are deployed in an arbitrary and unplanned fashion. Thus, any sensor in such a network can end up being adjacent to any other sensor in the network. To secure the communications between every pair of adjacent sensors in such a network, each sensor x in the network needs to store n?1 symmetric keys that sensor x shares with all the other sensors, where n is an upper bound on the number of sensors in the network. This storage requirement of the keying protocol is rather severe, especially when n is large and the available storage in each sensor is modest. Earlier efforts to redesign this keying protocol and reduce the number of keys to be stored in each sensor have produced protocols that are vulnerable to impersonation, eavesdropping, and collusion attacks. In this paper, we present a fully secure keying protocol where each sensor needs to store (n+1)/2 keys, which is much less than the n?1 keys that need to be stored in each sensor in the original keying protocol. We also show that in any fully secure keying protocol, each sensor needs to store at least (n?1)/2 keys.  相似文献   

18.
In this paper, we execute elementary row and column operations on the partitioned matrix (GAGGG0) into ((Is000)00?AT,S(2))to compute generalized inverse AT,S(2) of a given complex matrix A, where G is a matrix such that R(G)=T and N(G)=S. The total number of multiplications and divisions operations is T(m,n,s)=2mn2+4m?s?12ns+(m?s)ns+mns and the upper bound of T(m,n,s) is less than 6mn2?32n3?12n2 when nm. A numerical example is shown to illustrate that this method is correct.  相似文献   

19.
In this paper we derive a generic form of structural decomposition for the constraint satisfaction problem, which we call a guarded decomposition. We show that many existing decomposition methods can be characterised in terms of finding guarded decompositions satisfying certain specified additional conditions.Using the guarded decomposition framework we are also able to define a new form of decomposition, which we call a spread-cut. We show that the discovery of width-k spread-cut decompositions is tractable for each k, and that spread-cut decompositions strongly generalise many existing decomposition methods. Finally we exhibit a family of hypergraphs Hn, for n=1,2,3, where the minimum width of any hypertree decomposition of each Hn is 3n, but the width of the best spread-cut decomposition is only 2n+1.  相似文献   

20.
Let ?(n,g) be the class of bicyclic graphs on n vertices with girth g. Let ?1(n,g) be the subclass of ?(n,g) consisting of all bicyclic graphs with two edge-disjoint cycles and ?2(n,g)=?(n,g)??1(n,g). This paper determines the unique graph with the maximal Laplacian spectral radius among all graphs in ?1(n,g) and ?2(n,g), respectively. Furthermore, the upper bound of the Laplacian spectral radius and the extremal graph for ?(n,g) are also obtained.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号