首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In this paper we separate many-one reducibility from truth-table reducibility for distributional problems in DistNP under the hypothesis that P NP . As a first example we consider the 3-Satisfiability problem (3SAT) with two different distributions on 3CNF formulas. We show that 3SAT with a version of the standard distribution is truth-table reducible but not many-one reducible to 3SAT with a less redundant distribution unless P = NP . We extend this separation result and define a distributional complexity class C with the following properties: (1) C is a subclass of DistNP, this relation is proper unless P = NP. (2) C contains DistP, but it is not contained in AveP unless DistNP \subseteq AveZPP. (3) C has a p m -complete set. (4) C has a p tt -complete set that is not p m -complete unless P = NP. This shows that under the assumption that PNP, the two completeness notions differ on some nontrivial subclass of DistNP.  相似文献   

2.
An algorithm for solving the satisfiability problem is presented. It is proved that this algorithm solves 2-SAT and Horn-SAT in linear time andk-positive SAT (in which every clause contains at mostk positive literals) in timeO(|F|·ξ n k ), where |F| is the length of inputF, n is the number of atoms occurring inF, and ξ k is the greatest real number satisfying the equation . Compared with previous results, this nontrivial upper bound on time complexity could only be obtained fork-SAT, which is a subproblem ofk-positive SAT. Research partially supported by NSFC grant 221-4-1439. HUANG Xiong received his B.S. and M.S. degrees in computer science from Peking University in 1992 and 1995 respectively. Now he is a Ph.D. candidate in Beijing University of Aeronautics and Astronautics. His major research interests are design and analysis of algorithms, computational complexity, and satisfiability problem. LI Wei received his B.S. degree in mathematics from Peking University in 1966 and his Ph.D. degree in computer science from The University of Edinburgh in 1983. Since 1986, he has been a Professor in computer science at Beijing University of Aeronautics and Astronautics. He has published over 100 papers in the areas of concurrent programming languages, operational semantics, type theory, and logical foundation of artificial intelligence.  相似文献   

3.
Recently, it is proved in the literature that for a given controllable pair (A, B) with A ∈R^n×n, B ∈R^n×m, and any λ ≥ 1, a gain matrix K can be designed so that ‖e^(A+BK)t‖ ≤Mλ^Le^-λt, where M and L are constants independent of λ. Here, we show that M and L can be chosen much smaller than that proposed above. As a consequence, the estimation on overshoot of a transition matrix can be bounded more precisely. This can be regarded as a complement to the existing result.  相似文献   

4.
Chang and Kadin have shown that if the difference hierarchy over NP collapses to levelk, then the polynomial hierarchy (PH) is equal to thekth level of the difference hierarchy over 2 p . We simplify their poof and obtain a slightly stronger conclusion: if the difference hierarchy over NP collapses to levelk, then PH collapses to (P (k–1) NP )NP, the class of sets recognized in polynomial time withk – 1 nonadaptive queries to a set in NPNP and an unlimited number of queries to a set in NP. We also extend the result to classes other than NP: For any classC that has m p -complete sets and is closed under conj p -and m NP -reductions (alternatively, closed under disj p -and m co-NP -reductions), if the difference hierarchy overC collapses to levelk, then PH C = (P (k–1)–tt NP ) C . Then we show that the exact counting class C_P is closed under disj p - and m co-NP -reductions. Consequently, if the difference hierarchy over C_P collapses to levelk, then PHPP(= PHC_P) is equal to (P (k–1)–tt NP )PP. In contrast, the difference hierarchy over the closely related class PP is known to collapse.Finally we consider two ways of relativizing the bounded query class P k–tt NP : the restricted relativization P k–tt NP C and the full relativization (P k–tt NP ) C . IfC is NP-hard, then we show that the two relativizations are different unless PH C collapses.Richard Beigel was supported in part by NSF Grants CCR-8808949 and CCR-8958528. Richard Chang was supported in part by NSF Research Grant CCR 88-23053. This work was done while Mitsunori Ogiwara was at the Department of Information Science, Tokyo Institute of Technology, Tokyo, Japan.  相似文献   

5.
This paper proposes a kind of probably approximately correct (PAC) learning framework for inferring a set of functional dependencies (FDs) from example tuples. A simple algorithm is considered that outputs a set of all FDs which hold in a set of example tuples. Letr be a relation (a set of tuples). We define the error for a set of FDsFS as the minimum Σ t∈ν; where ν (ν ⊂r) is a set such thatFS holds inr − ν, andP(t) denotes the probability that tuplet is picked fromr. Our attention is focused on the sample complexity, and we show that the number of example tuples required to infer a set of FDs whose error does not exceed ω with probability at least 1 − δ under an arbitrary probability distribution is. Tatsuya Akutsu, Ph. D.: He is an associate professor of Department of Computer Science, Gunma University. He received the B. E. degree in 1984, the M. E. degree in 1986 and the Dr. Eng. degree in 1989 from The University of Tokyo. From 1989 to 1994, he was with Mechanical Engineering Laboratory, MITI, Japan. His research interests are design and analysis of algorithms, computational learning theory and bioinformatics.  相似文献   

6.
We study the isomorphic implication problem for Boolean constraints. We show that this is a natural analog of the subgraph isomorphism problem. We prove that, depending on the set of constraints, this problem is in P, or is NP-complete, or is NP-hard, coNP-hard, and in PNP. We show how to extend the NP-hardness and coNP-hardness to PNP-hardness for some cases, and conjecture that this can be done in all cases. Supported in part by grants NSF-CCR-0311021 and DFG VO 630/5-1 and VO 630/5-2. An extended abstract of this paper appears in Proceedings of the 30th International Symposium on Mathematical Foundations of Computer Science (MFCS 2005), pp. 119–130, Springer-Verlag Lecture Notes in Computer Science #3618, August 2005. Work of M. Bauland done in part while visiting CASCI’s Laboratory for Complexity at Rochester Institute of Technology. Work of E. Hemaspaandra done in part while on sabbatical at the University of Rochester.  相似文献   

7.
DPLL (for Davis, Putnam, Logemann, and Loveland) algorithms form the largest family of contemporary algorithms for SAT (the propositional satisfiability problem) and are widely used in applications. The recursion trees of DPLL algorithm executions on unsatisfiable formulas are equivalent to treelike resolution proofs. Therefore, lower bounds for treelike resolution (known since the 1960s) apply to them. However, these lower bounds say nothing about the behavior of such algorithms on satisfiable formulas. Proving exponential lower bounds for them in the most general setting is impossible without proving PNP; therefore, to prove lower bounds, one has to restrict the power of branching heuristics. In this paper, we give exponential lower bounds for two families of DPLL algorithms: generalized myopic algorithms, which read up to n 1−ε of clauses at each step and see the remaining part of the formula without negations, and drunk algorithms, which choose a variable using any complicated rule and then pick its value at random. Extended abstract of this paper appeared in Proceedings of ICALP 2004, LNCS 3142, Springer, 2004, pp. 84–96. Supported by CCR grant CCR-0324906. Supported in part by Russian Science Support Foundation, RAS program of fundamental research “Research in principal areas of contemporary mathematics,” and INTAS grant 04-77-7173. §Supported in part by INTAS grant 04-77-7173.  相似文献   

8.
O. G. Mancino 《Calcolo》1973,9(3):183-193
Riassunto Sia Ω un insieme aperto, connesso e limitato dello spazio euclideo reale adn dimensioni ℝ n . Sia ψ una funzione reale definita sulla chinsura di Ω e non positiva in prossimità della frontiera Γ di Ω. Presentiamo un metodo per la risoluzione numerica della disequazione variazionale dove ℝ={uH 0 1 (Ω)|uψ su ea(u, v) è una forma bilineare coercitiva sul sottospazioH 0 1 (Ω) dello spazio reale di SobolevH 1 (Ω).
Let Ω be an open, connected and bounded set of then-dimensional real Euclidean space ℝ n . Let ψ be a real function defined on the closure of Ω and non-positive near the boundary of Ω. We present a method for the numerical solution of the variational inequality where ℝ={uH 0 1 (Ω)|uψ on anda(u, v) is a bilinear form coercive on the subspaceH 0 1 (Ω) of the real Sobolev spaceH 1 (Ω).
  相似文献   

9.
We study some problems solvable in deterministic polynomial time given oracle access to the (promise version of) Arthur–Merlin class. Our main results are the following:
°   BPPNP|| í PprAM||.\circ\quad{\rm BPP}^{{\rm NP}}_{||} \subseteq {{\rm P}^{{{\rm pr}{\rm AM}}}_{||}}.  相似文献   

10.
An r.e. degree c is contiguous if degwtt(A)=degwtt(B)for any r.e. sets A,B∈c.In this paper,we generalize the notation of contiguity to the structure R/M, the upper semilattice of the r.e. degree set R modulo the cappable r.e. degree set M.An element[C]∈R/M is contiguous if s[degwtt(A)]=[degwtt(B)]for any r.e. sets A,B such that degT(A),degT(B)∈[c],It is proved in this paper that every nonzero element in R/M is not contiguous,i.e.,for every element [C]∈R/M,if[C]≠[O] then there exist at least two r.e. sets A,B such that degT(A),degT(B)∈[C]and [degwtt[A]≠[degwtt(B)].  相似文献   

11.
The 1-versus-2 queries problem, which has been extensively studied in computational complexity theory, asks in its generality whether every efficient algorithm that makes at most 2 queries to a Σ k p -complete language L k has an efficient simulation that makes at most 1 query to L k . We obtain solutions to this problem for hypotheses weaker than previously considered. We prove that:
(I)  For each k≥2, PSpk[2]tt í ZPPSpk[1]T PH=Spk\mathrm{P}^{\Sigma^{p}_{k}[2]}_{tt}\subseteq \mathrm{ZPP}^{\Sigma^{p}_{k}[1]}\Rightarrow \mathrm{PH}=\Sigma^{p}_{k} , and
(II)  P tt NP[2]⊆ZPPNP[1] PH=S2 p .
Here, for any complexity class C\mathcal{C} and integer j≥1, we define ZPPC[j]\mathrm{ZPP}^{\mathcal{C}[j]} to be the class of problems solvable by zero-error randomized algorithms that run in polynomial time, make at most j queries to C\mathcal{C} , and succeed with probability at least 1/2+1/poly(⋅). This same definition of ZPPC[j]\mathrm{ZPP}^{\mathcal{C}[j]} , also considered in Cai and Chakaravarthy (J. Comb. Optim. 11(2):189–202, 2006), subsumes the class of problems solvable by randomized algorithms that always answer correctly in expected polynomial time and make at most j queries to C\mathcal{C} . Hemaspaandra, Hemaspaandra, and Hempel (SIAM J. Comput. 28(2):383–393, 1998), for k>2, and Buhrman and Fortnow (J. Comput. Syst. Sci. 59(2):182–194, 1999), for k=2, had obtained the same consequence as ours in (I) using the stronger hypothesis PSpk[2]tt í PSpk[1]\mathrm{P}^{\Sigma^{p}_{k}[2]}_{tt}\subseteq \mathrm{P}^{\Sigma^{p}_{k}[1]} . Fortnow, Pavan, and Sengupta (J. Comput. Syst. Sci. 74(3):358–363, 2008) had obtained the same consequence as ours in (II) using the stronger hypothesis P tt NP[2]⊆PNP[1].  相似文献   

12.
We consider a finite element approximation of a phase field model for the evolution of voids by surface diffusion in an electrically conducting solid. The phase field equations are given by the nonlinear degenerate parabolic system
subject to an initial condition u 0(⋅)∈[−1,1] on u and flux boundary conditions on all three equations. Here γ∈ℝ>0, α∈ℝ≥0, Ψ is a non-smooth double well potential, and c(u):=1+u, b(u):=1−u 2 are degenerate coefficients. On extending existing results for the simplified two dimensional phase field model, we show stability bounds for our approximation and prove convergence, and hence existence of a solution to this nonlinear degenerate parabolic system in three space dimensions. Furthermore, a new iterative scheme for solving the resulting nonlinear discrete system is introduced and some numerical experiments are presented. L. Baňas was supported by the EPSRC grant EP/C548973/1.  相似文献   

13.
As a notion dual to Knuth's nested formulas [4], we call a boolean formula in conjunctive normal formco-nested if its clauses can be linearly ordered (sayC={c i ;i=1,2, ...,n})so that the graphG cl =(XC, {xc i ;xc i or ¬xc i } {c i c i+1;i=1, 2, ...,n}) allows a noncrossing drawing in the plane so that the circlec 1,c 2, ...,c n bounds the outerface. Our main result is that maximum satisfiability of co-nested formulas can be decided in linear time.Both authors acknowledge a partial support of Ec Cooperative Action IC-1000 (project ALTEC:Algorithms for Future Technologies).  相似文献   

14.
15.
Let F = C 1 C m be a Boolean formula in conjunctive normal form over a set V of n propositional variables, s.t. each clause C i contains at most three literals l over V. Solving the problem exact 3-satisfiability (X3SAT) for F means to decide whether there is a truth assignment setting exactly one literal in each clause of F to true (1). As is well known X3SAT is NP-complete [6]. By exploiting a perfect matching reduction we prove that X3SAT is deterministically decidable in time O(20.18674n ). Thereby we improve a result in [2,3] stating X3SAT O(20.2072n ) and a bound of O(20.200002n ) for the corresponding enumeration problem #X3SAT stated in a preprint [1]. After that by a more involved deterministic case analysis we are able to show that X3SAT O(20.16254n ).An extended abstract of this paper was presented at the Fifth International Symposium on the Theory and Applications of Satisfiability Testing (SAT 2002).  相似文献   

16.
C. Mastroserio 《Calcolo》1980,17(2):133-142
Let Π n denote the space of algebraic polynomials of degreen or less. In this paper we establish the inequality for everyf C (n−1) ([−1, 1]) andf (n−1) absolutely continuous. A way for obtaining similar inequalities forf C (t−1) ([−1, 1]) andf (l−1) absolutely continuous is given.

Ricerca effettuata mentre l'autore fruiva di una Borsa di Studio del C.N.R.  相似文献   

17.
Generalized fuzzy bi-ideals of semigroups   总被引:1,自引:0,他引:1  
After the introduction of fuzzy sets by Zadeh, there have been a number of generalizations of this fundamental concept. The notion of (∈, ∈ ∨q)-fuzzy subgroups introduced by Bhakat is one among them. In this paper, using the relations between fuzzy points and fuzzy sets, the concept of a fuzzy bi-ideal with thresholds is introduced and some interesting properties are investigated. The acceptable nontrivial concepts obtained in this manner are the (∈, ∈ ∨q)-fuzzy bi-ideals and -fuzzy bi-ideals, which are extension of the concept of a fuzzy bi-ideal in semigroup.  相似文献   

18.
Dario Bini 《Calcolo》1985,22(1):209-228
The tensor rankA of the linear spaceA generated by the set of linearly independent matricesA 1, A2, …, Ap, is the least integert for wich there existt diadsu (r) v (r)τ, τ=1,2,...,t, such that . IfA=n+k,k≪n then some computational problems concerning matricesAA can be solyed fast. For example the parallel inversion of almost any nonsingular matrixAA costs 3 logn+0(log2 k) steps with max(n 2+p (n+k), k2 n+nk) processors, the evaluation of the determinant ofA can be performed by a parallel algorithm in logp+logn+0 (log2 k) parallel steps and by a sequential algorithm inn(1+k 2)+p (n+k)+0 (k 3) multiplications. Analogous results hold to accomplish one step of bisection method, Newton's iterations method and shifted inverse power method applied toA−λB in order to compute the (generalized) eigenvalues provided thatA, BA. The same results hold if tensor rank is replaced by border rank. Applications to the case of banded Toeplitz matrices are shown. Dedicated to Professor S. Faedo on his 70th birthday Part of the results of this paper has been presented at the Oberwolfach Conference on Komplexitatstheorie, November 1983  相似文献   

19.
20.
Consider a class of binary functions h: X→{ − 1, + 1} on an interval . Define the sample width of h on a finite subset (a sample) S ⊂ X as ω S (h) =  min x ∈ S |ω h (x)| where ω h (x) = h(x) max {a ≥ 0: h(z) = h(x), x − a ≤ z ≤ x + a}. Let be the space of all samples in X of cardinality ℓ and consider sets of wide samples, i.e., hypersets which are defined as Through an application of the Sauer-Shelah result on the density of sets an upper estimate is obtained on the growth function (or trace) of the class , β > 0, i.e., on the number of possible dichotomies obtained by intersecting all hypersets with a fixed collection of samples of cardinality m. The estimate is .   相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号