首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

2.
We formalize paper fold (origami) by graph rewriting. Origami construction is abstractly described by a rewriting system (O,?)(O,?), where OO is the set of abstract origamis and ?? is a binary relation on OO, that models fold  . An abstract origami is a structure (Π,∽,?)(Π,,?), where ΠΠ is a set of faces constituting an origami, and ∽ and ?? are binary relations on ΠΠ, each representing adjacency and superposition relations between the faces.  相似文献   

3.
4.
5.
Let F(x,y)F(x,y) be a polynomial over a field KK and mm a nonnegative integer. We call a polynomial gg over KK an mm-near solution of F(x,y)F(x,y) if there exists a c∈KcK such that F(x,g)=cxmF(x,g)=cxm, and the number cc is called an mm-value of F(x,y)F(x,y) corresponding to gg. In particular, cc can be 0. Hence, by viewing F(x,y)=0F(x,y)=0 as a polynomial equation over K[x]K[x] with variable yy, every solution of the equation F(x,y)=0F(x,y)=0 in K[x]K[x] is also an mm-near solution. We provide an algorithm that gives all mm-near solutions of a given polynomial F(x,y)F(x,y) over KK, and this algorithm is polynomial time reducible to solving one variable equations over KK. We introduce approximate solutions to analyze the algorithm. We also give some interesting properties of approximate solutions.  相似文献   

6.
This paper deals with the existence and search for properly edge-colored paths/trails between two, not necessarily distinct, vertices ss and tt in an edge-colored graph from an algorithmic perspective. First we show that several versions of the s−tst path/trail problem have polynomial solutions including the shortest path/trail case. We give polynomial algorithms for finding a longest properly edge-colored path/trail between ss and tt for a particular class of graphs and characterize edge-colored graphs without properly edge-colored closed trails. Next, we prove that deciding whether there exist kk pairwise vertex/edge disjoint properly edge-colored s−tst paths/trails in a cc-edge-colored graph GcGc is NP-complete even for k=2k=2 and c=Ω(n2)c=Ω(n2), where nn denotes the number of vertices in GcGc. Moreover, we prove that these problems remain NP-complete for cc-edge-colored graphs containing no properly edge-colored cycles and c=Ω(n)c=Ω(n). We obtain some approximation results for those maximization problems together with polynomial results for some particular classes of edge-colored graphs.  相似文献   

7.
Let G=(V,E)G=(V,E) be a simple undirected graph with a set VV of vertices and a set EE of edges. Each vertex v∈VvV has a demand d(v)∈Z+d(v)Z+ and a cost c(v)∈R+c(v)R+, where Z+Z+ and R+R+ denote the set of nonnegative integers and the set of nonnegative reals, respectively. The source location problem with vertex-connectivity requirements in a given graph GG requires finding a set SS of vertices minimizing vSc(v)vSc(v) such that there are at least d(v)d(v) pairwise vertex-disjoint paths from SS to vv for each vertex v∈V−SvVS. It is known that if there exists a vertex v∈VvV with d(v)≥4d(v)4, then the problem is NP-hard even in the case where every vertex has a uniform cost. In this paper, we show that the problem can be solved in O(|V|4log2|V|)O(|V|4log2|V|) time if d(v)≤3d(v)3 holds for each vertex v∈VvV.  相似文献   

8.
Question/Answer games (Q/A games for short) are a generalization of the Rényi–Ulam game and they are a model for information extraction in parallel. A Q/A game, G=(D,s,(q1,…,qk))G=(D,s,(q1,,qk)), is played on a directed acyclic graph, D=(V,E)D=(V,E), with a distinguished start vertex ss. In the iith round, Paul selects a set, Qi⊆VQiV, of at most qiqi non-terminal vertices. Carole responds by choosing an outgoing edge from each vertex in QiQi. At the end of kk rounds, Paul wins if Carole’s answers define a unique path from the root to one of the terminal vertices in DD.  相似文献   

9.
10.
11.
12.
Assume that a program pp on input aa outputs bb. We are looking for a shorter program qq having the same property (q(a)=bq(a)=b). In addition, we want qq to be simple conditional to pp (this means that the conditional Kolmogorov complexity K(q|p)K(q|p) is negligible). In the present paper, we prove that sometimes there is no such program qq, even in the case when the complexity of pp is much bigger than K(b|a)K(b|a). We give three different constructions that use the game approach, probabilistic arguments and algebraic arguments, respectively.  相似文献   

13.
We consider a two-edge connected, undirected graph G=(V,E)G=(V,E), with nn nodes and mm non-negatively real weighted edges, and a single source shortest paths tree (SPT) TT of GG rooted at an arbitrary node rr. If an edge in TT is temporarily removed, it makes sense to reconnect the nodes disconnected from the root by adding a single non-tree edge, called a swap edge  , instead of rebuilding a new optimal SPT from scratch. In the past, several optimality criteria have been considered to select a best possible swap edge. In this paper we focus on the most prominent one, that is the minimization of the average distance between the root and the disconnected nodes. To this respect, we present an O(mlog2n)O(mlog2n) time and O(m)O(m) space algorithm to find a best swap edge for every edge of TT, thus improving for m=o(n2/log2n)m=o(n2/log2n) the previously known O(n2)O(n2) time and space complexity algorithm.  相似文献   

14.
Given a capacitated undirected graph G=(V,E)G=(V,E) with a set of terminals K⊂VKV, a mimicking network   is a smaller graph H=(VH,EH)H=(VH,EH) which contains the set of terminals K   and for every bipartition [U,K−U][U,KU] of the terminals, the cost of the minimum cut separating U   from K−UKU in G is exactly equal to the cost of the minimum cut separating U   from K−UKU in H.  相似文献   

15.
16.
We define a self-map Pal:F2F2Pal:F2F2 of the free group on two generators a,ba,b, using automorphisms of F2F2 that form a group isomorphic to the braid group B3B3. The map PalPal restricts to de Luca’s right iterated palindromic closure on the submonoid generated by a,ba,b. We show that PalPal is continuous for the profinite topology on F2F2; it is the unique continuous extension of de Luca’s right iterated palindromic closure to F2F2. The values of PalPal are palindromes and coincide with the elements g∈F2gF2 such that abgabg and bagbag are conjugate.  相似文献   

17.
We present algorithmic lower bounds on the size sdsd of the largest independent sets of vertices in random dd-regular graphs, for each fixed d≥3d3. For instance, for d=3d=3 we prove that, for graphs on nn vertices, sd≥0.43475nsd0.43475n with probability approaching one as nn tends to infinity.  相似文献   

18.
We study four problems from the geometry of numbers, the shortest vector problem  (Svp)(Svp), the closest vector problem  (Cvp)(Cvp), the successive minima problem  (Smp)(Smp), and the shortest independent vectors problem   (SivpSivp). Extending and generalizing results of Ajtai, Kumar, and Sivakumar we present probabilistic single exponential time algorithms for all four problems for all ?p?p norms. The results on SmpSmp and SivpSivp are new for all norms. The results on SvpSvp and CvpCvp generalize previous results of Ajtai et al. for the Euclidean ?2?2 norm to arbitrary ?p?p norms. We achieve our results by introducing a new lattice problem, the generalized shortest vector problem   (GSvpGSvp). 1 We describe a single exponential time algorithm for GSvpGSvp. We also describe polynomial time reductions from Svp,Cvp,SmpSvp,Cvp,Smp, and SivpSivp to GSvpGSvp, establishing single exponential time algorithms for the four classical lattice problems. This approach leads to a unified algorithmic treatment of the lattice problems Svp,Cvp,SmpSvp,Cvp,Smp, and SivpSivp.  相似文献   

19.
We prove an explicit bound on the radius of a ball centered at the origin which is guaranteed to contain all bounded connected components of a semi-algebraic set S⊂RkSRk defined by a weak sign condition involving ss polynomials in Z[X1,…,Xk]Z[X1,,Xk] having degrees at most dd, and whose coefficients have bitsizes at most ττ. Our bound is an explicit function of s,d,ks,d,k and ττ, and does not contain any undetermined constants. We also prove a similar bound on the radius of a ball guaranteed to intersect every connected component of SS (including the unbounded components). While asymptotic bounds of the form 2τdO(k)2τdO(k) on these quantities were known before, some applications require bounds which are explicit and which hold for all values of s,d,ks,d,k and ττ. The bounds proved in this paper are of this nature.  相似文献   

20.
We prove that a polynomial f∈R[x,y]fR[x,y] with tt non-zero terms, restricted to a real line y=ax+by=ax+b, either has at most 6t−46t4 zeros or vanishes over the whole line. As a consequence, we derive an alternative algorithm for deciding whether a linear polynomial y−ax−b∈K[x,y]yaxbK[x,y] divides a lacunary polynomial f∈K[x,y]fK[x,y], where KK is a real number field. The number of bit operations performed by the algorithm is polynomial in the number of non-zero terms of ff, in the logarithm of the degree of ff, in the degree of the extension K/QK/Q and in the logarithmic height of aa, bb and ff.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号