首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Let F(x,y)F(x,y) be a polynomial over a field KK and mm a nonnegative integer. We call a polynomial gg over KK an mm-near solution of F(x,y)F(x,y) if there exists a c∈KcK such that F(x,g)=cxmF(x,g)=cxm, and the number cc is called an mm-value of F(x,y)F(x,y) corresponding to gg. In particular, cc can be 0. Hence, by viewing F(x,y)=0F(x,y)=0 as a polynomial equation over K[x]K[x] with variable yy, every solution of the equation F(x,y)=0F(x,y)=0 in K[x]K[x] is also an mm-near solution. We provide an algorithm that gives all mm-near solutions of a given polynomial F(x,y)F(x,y) over KK, and this algorithm is polynomial time reducible to solving one variable equations over KK. We introduce approximate solutions to analyze the algorithm. We also give some interesting properties of approximate solutions.  相似文献   

2.
Let G=(V,E)G=(V,E) be a simple undirected graph with a set VV of vertices and a set EE of edges. Each vertex v∈VvV has a demand d(v)∈Z+d(v)Z+ and a cost c(v)∈R+c(v)R+, where Z+Z+ and R+R+ denote the set of nonnegative integers and the set of nonnegative reals, respectively. The source location problem with vertex-connectivity requirements in a given graph GG requires finding a set SS of vertices minimizing vSc(v)vSc(v) such that there are at least d(v)d(v) pairwise vertex-disjoint paths from SS to vv for each vertex v∈V−SvVS. It is known that if there exists a vertex v∈VvV with d(v)≥4d(v)4, then the problem is NP-hard even in the case where every vertex has a uniform cost. In this paper, we show that the problem can be solved in O(|V|4log2|V|)O(|V|4log2|V|) time if d(v)≤3d(v)3 holds for each vertex v∈VvV.  相似文献   

3.
We study the problem of decomposing the vertex set VV of a graph into two nonempty parts V1,V2V1,V2 which induce subgraphs where each vertex v∈V1vV1 has degree at least a(v)a(v) inside V1V1 and each v∈V2vV2 has degree at least b(v)b(v) inside V2V2. We give a polynomial-time algorithm for graphs with bounded treewidth which decides if a graph admits a decomposition, and gives such a decomposition if it exists. This result and its variants are then applied to designing polynomial-time approximation schemes for planar graphs where a decomposition does not necessarily exist but the local degree conditions should be met for as many vertices as possible.  相似文献   

4.
Efficient characteristic set methods for computing zeros of polynomial equation systems in a finite field are proposed. The concept of proper triangular sets is introduced and an explicit formula for the number of zeros of a proper and monic triangular set is given. An improved zero decomposition algorithm is proposed to reduce the zero set of an equation system to the union of zero sets of monic proper triangular sets. The bitsize complexity of this algorithm is shown to be O(ln)O(ln) for Boolean polynomials, where nn is the number of variables and l≥2l2 is the number of equations. We also give a multiplication free characteristic set method for Boolean polynomials, where the sizes of the polynomials occurred during the computation do not exceed the sizes of the input polynomials and the bitsize complexity of algorithm is O(nd)O(nd) for input polynomials with nn variables and degree dd. The algorithms are implemented in the case of Boolean polynomials and extensive experiments show that they are quite efficient for solving certain classes of Boolean equations raising from stream ciphers.  相似文献   

5.
We give a polynomial time reduction from the vector scheduling problem (VS) to the generalized load balancing problem (GLB). This reduction gives the first non-trivial online algorithm for VS where vectors come in an online fashion. The online algorithm is very simple in that each vector only needs to minimize the Lln(md)Lln(md) norm of the resulting load when it comes, where mm is the number of partitions and dd is the dimension of vectors. It has an approximation bound of elog(md)elog(md), which is in O(ln(md))O(ln(md)), so it also improves the O(ln2d)O(ln2d) bound of the existing polynomial time algorithm for VS. Additionally, the reduction shows that GLB does not have constant approximation algorithms that run in polynomial time unless P=NPP=NP.  相似文献   

6.
7.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

8.
A string S∈ΣmSΣm can be viewed as a set of pairs S={(σi,i):i∈{0,…,m−1}}S={(σi,i):i{0,,m1}}. We consider approximate pattern matching problems arising from the setting where errors are introduced to the location component (ii), rather than the more traditional setting, where errors are introduced into the content itself (σiσi). In this paper, we consider the case where bits of ii may be erroneously flipped, either in a consistent or transient manner. We formally define the corresponding approximate pattern matching problems, and provide efficient algorithms for their resolution, while introducing some novel techniques.  相似文献   

9.
Let R[X]:=R[X1,…,Xn]R[X]:=R[X1,,Xn]. Pólya’s Theorem says that if a form (homogeneous polynomial) p∈R[X]pR[X] is positive on the standard nn-simplex ΔnΔn, then for sufficiently large NN all the coefficients of (X1+?+Xn)Np(X1+?+Xn)Np are positive. The work in this paper is part of an ongoing project aiming to explain when Pólya’s Theorem holds for forms if the condition “positive on ΔnΔn” is relaxed to “nonnegative on ΔnΔn”, and to give bounds on NN. Schweighofer gave a condition which implies the conclusion of Pólya’s Theorem for polynomials f∈R[X]fR[X]. We give a quantitative version of this result and use it to settle the case where a form p∈R[X]pR[X] is positive on ΔnΔn, apart from possibly having zeros at the corners of the simplex.  相似文献   

10.
11.
We prove that a polynomial f∈R[x,y]fR[x,y] with tt non-zero terms, restricted to a real line y=ax+by=ax+b, either has at most 6t−46t4 zeros or vanishes over the whole line. As a consequence, we derive an alternative algorithm for deciding whether a linear polynomial y−ax−b∈K[x,y]yaxbK[x,y] divides a lacunary polynomial f∈K[x,y]fK[x,y], where KK is a real number field. The number of bit operations performed by the algorithm is polynomial in the number of non-zero terms of ff, in the logarithm of the degree of ff, in the degree of the extension K/QK/Q and in the logarithmic height of aa, bb and ff.  相似文献   

12.
We consider the Rosenfeld–Gröbner algorithm for computing a regular decomposition of a radical differential ideal generated by a set of ordinary differential polynomials in nn indeterminates. For a set of ordinary differential polynomials FF, let M(F)M(F) be the sum of maximal orders of differential indeterminates occurring in FF. We propose a modification of the Rosenfeld–Gröbner algorithm, in which for every intermediate polynomial system FF, the bound M(F)?(n−1)!M(F0)M(F)?(n1)!M(F0) holds, where F0F0 is the initial set of generators of the radical ideal. In particular, the resulting regular systems satisfy the bound. Since regular ideals can be decomposed into characterizable components algebraically, the bound also holds for the orders of derivatives occurring in a characteristic decomposition of a radical differential ideal.  相似文献   

13.
We define a self-map Pal:F2F2Pal:F2F2 of the free group on two generators a,ba,b, using automorphisms of F2F2 that form a group isomorphic to the braid group B3B3. The map PalPal restricts to de Luca’s right iterated palindromic closure on the submonoid generated by a,ba,b. We show that PalPal is continuous for the profinite topology on F2F2; it is the unique continuous extension of de Luca’s right iterated palindromic closure to F2F2. The values of PalPal are palindromes and coincide with the elements g∈F2gF2 such that abgabg and bagbag are conjugate.  相似文献   

14.
The ΔΔ-timed uniform consensus is a stronger variant of the traditional consensus and it satisfies the following additional property: every correct process terminates its execution within a constant time ΔΔΔ-timeliness), and no two processes decide differently (uniformity). In this paper, we consider the ΔΔ-timed uniform consensus problem in presence of fcfc crash processes and ftft timing-faulty processes, and propose a ΔΔ-timed uniform consensus algorithm. The proposed algorithm is adaptive in the following sense: it solves the ΔΔ-timed uniform consensus when at least ft+1ft+1 correct processes exist in the system. If the system has less than ft+1ft+1 correct processes, the algorithm cannot solve the ΔΔ-timed uniform consensus. However, as long as ft+1ft+1 processes are non-crashed, the algorithm solves (non-timed) uniform consensus. We also investigate the maximum number of faulty processes that can be tolerated. We show that any ΔΔ-timed uniform consensus algorithm tolerating up to ftft timing-faulty processes requires that the system has at least ft+1ft+1 correct processes. This impossibility result implies that the proposed algorithm attains the maximum resilience about the number of faulty processes. We also show that any ΔΔ-timed uniform consensus algorithm tolerating up to ftft timing-faulty processes cannot solve the (non-timed) uniform consensus when the system has less than ft+1ft+1 non-crashed processes. This impossibility result implies that our algorithm attains the maximum adaptiveness.  相似文献   

15.
16.
Consider a power series f∈R[[z]]fR[[z]], which is obtained by a precise mathematical construction. For instance, ff might be the solution to some differential or functional initial value problem or the diagonal of the solution to a partial differential equation. In cases when no suitable method is available beforehand for determining the asymptotics of the coefficients fnfn, but when many such coefficients can be computed with high accuracy, it would be useful if a plausible asymptotic expansion for fnfn could be guessed automatically.  相似文献   

17.
We present an algorithm to find two non-linear polynomials for the Number Field Sieve integer factorization method. This algorithm extends Montgomery’s “two quadratics” method; for degree 33, it gives two skewed polynomials with resultant O(N5/4)O(N5/4), which improves on the Williams O(N4/3)O(N4/3) result (Williams, 2010).  相似文献   

18.
Let f:=p/q∈K(x)f:=p/qK(x) be a rational function in one variable. By Lüroth’s theorem, the collection of intermediate fields K(f)?L?K(x)K(f)?L?K(x) is in bijection with inequivalent proper decompositions f=g°hf=g°h, with g,h∈K(x)g,hK(x) of degrees ≥22. In [Alonso, Cesar, Gutierrez, Jaime, Recio, Tomas, 1995. A rational function decomposition algorithm by near-separated polynomials. J. Symbolic Comput. 19, 527–544] an algorithm is presented to calculate such a function decomposition. In this paper we describe a simplification of this algorithm, avoiding expensive solutions of linear equations. A MAGMA implementation shows the efficiency of our method. We also prove some indecomposability criteria for rational functions, which were motivated by computational experiments.  相似文献   

19.
Motivated by the famous 3n+13n+1 conjecture, we call a mapping from ZZ to ZZresidue-class-wise affine   if there is a positive integer mm such that it is affine on residue classes (mod mm). This article describes a collection of algorithms and methods for computation in permutation groups and monoids formed by residue-class-wise affine mappings.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号