共查询到20条相似文献,搜索用时 62 毫秒
1.
Josef Cibulka 《Theoretical computer science》2011,412(8-10):822-834
We are given a stack of pancakes of different sizes and the only allowed operation is to take several pancakes from the top and flip them. The unburnt version requires the pancakes to be sorted by their sizes at the end, while in the burnt version they additionally need to be oriented burnt-side down. We are interested in the largest value of the number of flips needed to sort a stack of pancakes, both in the unburnt version () and in the burnt version ().We present exact values of up to and of up to and disprove a conjecture of Cohen and Blum by showing that the burnt stack is not the hardest to sort for .We also show that sorting a random stack of unburnt pancakes can be done with at most flips on average. The average number of flips of the optimal algorithm for sorting stacks of burnt pancakes is shown to be between and and we conjecture that it is .Finally we show that sorting the stack needs at least flips, which slightly increases the lower bound on . This bound together with the upper bound for sorting found by Heydari and Sudborough in 1997 [10] gives the exact number of flips to sort it for and . 相似文献
2.
The number of states in a deterministic finite automaton (DFA) recognizing the language , where is regular language recognized by an -state DFA, and is a constant, is shown to be at most and at least in the worst case, for every and for every alphabet of at least six letters. Thus, the state complexity of is . In the case the corresponding state complexity function for is determined as with the lower bound witnessed by automata over a four-letter alphabet. The nondeterministic state complexity of is demonstrated to be . This bound is shown to be tight over a two-letter alphabet. 相似文献
3.
《Journal of Parallel and Distributed Computing》2004,64(11):1286-1296
In this paper, we investigate the star graph with faulty vertices and/or edges from the graph theoretic point of view. We show that between every pair of vertices with different colors in a bicoloring of , , there is a fault-free path of length at least , and there is a path of length at least joining a pair of vertices with the same color, when the number of faulty elements is or less. Here, is the number of faulty vertices. , , with at most faulty elements has a fault-free cycle of length at least unless the number of faulty elements are and all the faulty elements are edges incident to a common vertex. It is also shown that , , is strongly hamiltonian-laceable if the number of faulty elements is or less and the number of faulty vertices is one or less. 相似文献
4.
Random Fibonacci sequences are stochastic versions of the classical Fibonacci sequence for , and , obtained by randomizing one or both signs on the right side of the defining equation and/or adding a “growth parameter.” These sequences may be viewed as coming from a sequence of products of i.i.d. random matrices and their rate of growth measured by the associated Lyapunov exponent. Following the techniques presented by Embree and Trefethen in their numerical paper Embree and Trefethen (1999) [2], we study the behavior of the Lyapunov exponents as a function of the probability of choosing in the sign randomization. 相似文献
5.
6.
7.
Eigenvalues of a real supersymmetric tensor 总被引:3,自引:0,他引:3
In this paper, we define the symmetric hyperdeterminant, eigenvalues and E-eigenvalues of a real supersymmetric tensor. We show that eigenvalues are roots of a one-dimensional polynomial, and when the order of the tensor is even, E-eigenvalues are roots of another one-dimensional polynomial. These two one-dimensional polynomials are associated with the symmetric hyperdeterminant. We call them the characteristic polynomial and the E-characteristic polynomial of that supersymmetric tensor. Real eigenvalues (E-eigenvalues) with real eigenvectors (E-eigenvectors) are called H-eigenvalues (Z-eigenvalues). When the order of the supersymmetric tensor is even, H-eigenvalues (Z-eigenvalues) exist and the supersymmetric tensor is positive definite if and only if all of its H-eigenvalues (Z-eigenvalues) are positive. An -order -dimensional supersymmetric tensor where is even has exactly eigenvalues, and the number of its E-eigenvalues is strictly less than when . We show that the product of all the eigenvalues is equal to the value of the symmetric hyperdeterminant, while the sum of all the eigenvalues is equal to the sum of the diagonal elements of that supersymmetric tensor, multiplied by . The eigenvalues are distributed in disks in . The centers and radii of these disks are the diagonal elements, and the sums of the absolute values of the corresponding off-diagonal elements, of that supersymmetric tensor. On the other hand, E-eigenvalues are invariant under orthogonal transformations. 相似文献
8.
9.
10.
Jian Wang Xirong Xu Dejun Zhu Liqing Gao Jun-Ming Xu 《Information Processing Letters》2012,112(12):473-478
The feedback number of a graph G is the minimum number of vertices whose removal from G results in an acyclic subgraph. We use to denote the feedback number of the -star graph and the number of k-permutations of an n-element set. This paper proves that where . 相似文献
11.
《Journal of Computer and System Sciences》2016,82(6):1007-1019
Systems of equations of the form and are considered, in which the unknowns are sets of integers, the plus operator denotes element-wise sum of sets, and C is an ultimately periodic constant. For natural numbers, such equations are equivalent to language equations over a one-symbol alphabet using concatenation and regular constants. It is shown that such systems are computationally universal: for every recursive (r.e., co-r.e.) set there exists a system with a unique (least, greatest) solution containing a component T with . Testing solution existence for these equations is -complete, solution uniqueness is -complete, and finiteness of the set of solutions is -complete. A similar construction for integers represents any hyper-arithmetical set by a set satisfying , whereas testing solution existence is -complete. 相似文献
12.
13.
《Journal of Computer and System Sciences》2016,82(5):793-801
14.
15.
16.
Jesse Kamp Anup Rao Salil Vadhan David Zuckerman 《Journal of Computer and System Sciences》2011,77(1):191-220
We give polynomial-time, deterministic randomness extractors for sources generated in small space, where we model space s sources on as sources generated by width branching programs. Specifically, there is a constant such that for any , our algorithm extracts bits that are exponentially close to uniform (in variation distance) from space s sources with min-entropy δn, where . Previously, nothing was known for , even for space 0. Our results are obtained by a reduction to the class of total-entropy independent sources. This model generalizes both the well-studied models of independent sources and symbol-fixing sources. These sources consist of a set of r independent smaller sources over , where the total min-entropy over all the smaller sources is k. We give deterministic extractors for such sources when k is as small as , for small enough ?. 相似文献
17.
Many sensor networks (especially networks of mobile sensors or networks that are deployed to monitor crisis situations) are deployed in an arbitrary and unplanned fashion. Thus, any sensor in such a network can end up being adjacent to any other sensor in the network. To secure the communications between every pair of adjacent sensors in such a network, each sensor in the network needs to store symmetric keys that sensor shares with all the other sensors, where is an upper bound on the number of sensors in the network. This storage requirement of the keying protocol is rather severe, especially when is large and the available storage in each sensor is modest. Earlier efforts to redesign this keying protocol and reduce the number of keys to be stored in each sensor have produced protocols that are vulnerable to impersonation, eavesdropping, and collusion attacks. In this paper, we present a fully secure keying protocol where each sensor needs to store keys, which is much less than the keys that need to be stored in each sensor in the original keying protocol. We also show that in any fully secure keying protocol, each sensor needs to store at least keys. 相似文献
18.
In this paper, we execute elementary row and column operations on the partitioned matrix into to compute generalized inverse of a given complex matrix , where is a matrix such that and . The total number of multiplications and divisions operations is and the upper bound of is less than when . A numerical example is shown to illustrate that this method is correct. 相似文献
19.
In this paper we derive a generic form of structural decomposition for the constraint satisfaction problem, which we call a guarded decomposition. We show that many existing decomposition methods can be characterised in terms of finding guarded decompositions satisfying certain specified additional conditions.Using the guarded decomposition framework we are also able to define a new form of decomposition, which we call a spread-cut. We show that the discovery of width-k spread-cut decompositions is tractable for each k, and that spread-cut decompositions strongly generalise many existing decomposition methods. Finally we exhibit a family of hypergraphs , for , where the minimum width of any hypertree decomposition of each is 3n, but the width of the best spread-cut decomposition is only . 相似文献
20.
Mingqing Zhai Guanglong Yu Jinlong Shu 《Computers & Mathematics with Applications》2010,59(1):376-381
Let be the class of bicyclic graphs on vertices with girth . Let be the subclass of consisting of all bicyclic graphs with two edge-disjoint cycles and . This paper determines the unique graph with the maximal Laplacian spectral radius among all graphs in and , respectively. Furthermore, the upper bound of the Laplacian spectral radius and the extremal graph for are also obtained. 相似文献