首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
We investigate the growth of the number w k of walks of length k in undirected graphs as well as related inequalities. In the first part, we deduce the inequality w 2a+c ?w 2(a+b)+c w 2a ?w 2(a+b+c), which we call the Sandwich Theorem. It unifies and generalizes an inequality by Lagarias et al. and an inequality by Dress and Gutman. In the same way, we derive the inequality w 2a+c (v,v)?w 2(a+b)+c (v,v)≤w 2a (v,v)?w 2(a+b+c)(v,v) for the number w k (v,v) of closed walks of length k starting at a given vertex v. We then use a theorem of Blakley and Dixon to show $w_{2\ell+p}^{k}\leq w_{2\ell+pk}\cdot w_{2\ell}^{k-1}$ , which unifies and generalizes an inequality by Erd?s and Simonovits and, again, the inequality by Dress and Gutman. Both results can be translated directly into the corresponding forms using the higher order densities, which extends former results. In the second part, we provide a new family of lower bounds for the largest eigenvalue λ 1 of the adjacency matrix based on closed walks. We apply the Sandwich Theorem to show monotonicity in this and a related family of lower bounds of Nikiforov. This leads to generalized upper bounds for the energy of graphs. In the third part, we demonstrate that a further natural generalization of the Sandwich Theorem is not valid for general graphs. We show that the inequality w a+b ?w a+b+c w a ?w a+2b+c does not hold even in very restricted cases like w 1?w 2w 0?w 3 (i.e., $\bar{d}\cdot w_{2}\leq w_{3}$ ) in the context of bipartite or cycle free graphs. In contrast, we show that surprisingly this inequality is always satisfied for trees and we show how to construct worst-case instances (regarding the difference of both sides of the inequality) for a given degree sequence. We also prove the inequality w 1?w 4w 0?w 5 (i.e., $\bar{d}\cdot w_{4}\leq w_{5}$ ) for trees and conclude with a corresponding conjecture for longer walks.  相似文献   

2.
3.
A sixth-order convergent finite difference method is developed for the numerical solution of the special nonlinear fourth-order boundary value problem y(iv)(x) = f(x, y), a < x < b, y(a) = A0, y″(a) = B0, y(b) = A1 y′(b) = B1, the simple-simple beam problem.The method is based on a second-order convergent method which is used on three grids, sixth-order convergence being obtained by taking a linear combination of the (second-order) numerical results calculated using the three individual grids.Special formulas are proposed for application to points of the discretization adjacent to the boundaries x = a and x= b, the first two terms of the local truncation errors of these formulas being the same as those of the second-order method used at the other points of each grid.Modifications to these two formulas are obtained for problems with boundary conditions of the form y(a) = A0, y′(a) = C0, y(b) = A1, y′(b) = C1, the clamped-clamped beam problem.The general boundary value problem, for which the differential equation is y(iv)(x) = f(x, y, y′, y″, y‴), is also considered.  相似文献   

4.
For an alphabet A and a morphism h : A1A1, the set of words w such that the DOL language L(A, h, w) is a BOUNDED language is shown to be B1, where B is an effectively computable subset of A. Consequently, BOUNDEDNESS is decidable for DOL languages. The result depends on the authors' recent results on periodic DOL languages. Interpretation of the result for polynomially bounded DOL languages is also considered.  相似文献   

5.
Partial words are finite sequences over a finite alphabet A that may contain a number of “do not know” symbols denoted by ?’s. Setting $A_{\diamond}=A\cup\lbrace{\diamond}\rbracePartial words are finite sequences over a finite alphabet A that may contain a number of “do not know” symbols denoted by ’s. Setting Aà=Aè{à}A_{\diamond}=A\cup\lbrace{\diamond}\rbrace , A * denotes the set of all partial words over A. In this paper, we investigate the border correlation function b:Aà*?{a,b}*\beta:A_{\diamond}^{*}\rightarrow\lbrace a,b\rbrace^{*} that specifies which conjugates (cyclic shifts) of a given partial word w of length n are bordered, that is, β(w)=c 0 c 1c n−1 where c i =a or c i =b according to whether the ith cyclic shift σ i (w) of w is unbordered or bordered. A partial word w is bordered if a proper prefix x 1 of w is compatible with a proper suffix x 2 of w, in which case any partial word x containing both x 1 and x 2 is called a border of w. In addition to β, we investigate an extension β′:A *→ℕ* that maps a partial word w of length n to m 0 m 1m n−1 where m i is the length of a shortest border of σ i (w). Our results extend those of Harju and Nowotka.  相似文献   

6.
Given a language L over an alphabet Σ and two homomorphisms g and h, defined on Σ1, we want to decide whether or not g and h are equivalent on L, i.e., whether or not g(w) = h(w) holds for all words w in L. We prove the following results' for the case where Σ consists of two letters. Every language L possesses a finite subset L, such that, for any pair (g, h), g and h are equivalent on L if and only if they are equivalent on L1. For every language L (with the exception of some trivial cases), there is a word w (not necessarily in L) such that, for any pair (g, h), g and h are equivalent on L if and only if g(w) = h(w). Our constructions are, in general, noneffective. Also some related notions are discussed in the paper.  相似文献   

7.
It is shown that there is a sequence of languages E1, E2,… such that every correct prefix parser (one which detects errors at the earliest possible moment, e.g., LR or LL parsers) for En has size 2cn, yet a deterministic PDA recognizing En exists and has size O(n2). There is another easily described sequence of languages N1, N2,… for which N has a nondeterministic PDA of size O(n2), but no deterministic PDA of size less than 2cn. It is shown moreover, that this latter gap can be made arbitrarily large for different sequences of languages.  相似文献   

8.
Let A = (aij) be an n × n complex matrix. Suppose that G(A), the undirected graph of A, has no isolated vertex. Let E be the set of edges of G(A). We prove that the smallest singular value of A, σn, satisfies: σn ≥ min σij | (i, j) ∈ E, where gijai + aj − [(aiaj)2 + (ri + ci)(rj + cj)]1/2/2 with ai ≡ |aii| and ri,ci are the ith deleted absolute row sum and column sum of A, respectively. The result simplifies and improves that of Johnson and Szulc: σn ≥ minij σij. (See [1].)  相似文献   

9.
A unit cube in k-dimension (or a k-cube) is defined as the Cartesian product R1×R2×?×Rk, where each Ri is a closed interval on the real line of the form [ai,ai+1]. The cubicity of G, denoted as cub(G), is the minimum k such that G is the intersection graph of a collection of k-cubes. Many NP-complete graph problems can be solved efficiently or have good approximation ratios in graphs of low cubicity. In most of these cases the first step is to get a low dimensional cube representation of the given graph.It is known that for a graph G, . Recently it has been shown that for a graph G, cub(G)?4(Δ+1)lnn, where n and Δ are the number of vertices and maximum degree of G, respectively. In this paper, we show that for a bipartite graph G=(AB,E) with |A|=n1, |B|=n2, n1?n2, and Δ=min{ΔA,ΔB}, where ΔA=maxaAd(a) and ΔB=maxbBd(b), d(a) and d(b) being the degree of a and b in G, respectively, cub(G)?2(Δ+2)⌈lnn2⌉. We also give an efficient randomized algorithm to construct the cube representation of G in 3(Δ+2)⌈lnn2⌉ dimensions. The reader may note that in general Δ can be much smaller than Δ.  相似文献   

10.
A binary image I is Ba, Wb-connected, where ab ∈ {4, 8}, if its foreground is a-connected and its background is b-connected. We consider a local modification of a Ba, wb-connected image I in which a black pixel can be interchanged with an adjacent white pixel provided that this preserves the connectivity of both the foreground and the background of I. We have shown that for any (ab) ∈ {(4, 8), (8, 4), (8, 8)}, any two Ba, wb-connected images I and J each with n black pixels differ by a sequence of Θ(n2) interchanges. We have also shown that any two B4, W4-connected images I and J each with n black pixels differ by a sequence of O(n4) interchanges.  相似文献   

11.
Let A=〈a1,a2,…,am〉 and B=〈b1,b2,…,bn〉 be two sequences, where each pair of elements in the sequences is comparable. A common increasing subsequence of A and B is a subsequence 〈ai1=bj1,ai2=bj2,…,ail=bjl〉, where i1<i2<?<il and j1<j2<?<jl, such that for all 1?k<l, we have aik<aik+1. A longest common increasing subsequence of A and B is a common increasing subsequence of the maximum length. This paper presents an algorithm for delivering a longest common increasing subsequence in O(mn) time and O(mn) space.  相似文献   

12.
Minimization based aggregation operators Ag,D are discussed. Special attention is paid to weighting function g based cases related to some fixed dissimilarity function D. When D2(x,y)=(x-y)2, we recognize mixture operators and we recall some sufficient conditions for g ensuring the monotonicity of Ag,D. For D1(x,y)=|x-y| and non-decreasing (non-increasing) g, Ag,D is shown to be the upper (lower) median whenever Ag,D is an aggregation operator.  相似文献   

13.
14.
This paper presents a family of agreement problems called Managed Agreement, which is parameterized by the number of aristocrat nodes in the system; NBAC is a special case of this family when all nodes are aristocrats while Consensus is a special case of this family when there are no aristocrats. The paper also presents a parameterized family of failure detectors F(A) such that F(A) is the weakest failure detector class that enables solving Managed Agreement with a set A of aristocrats in an asynchronous environment.  相似文献   

15.
We prove that there is a polynomial time substitution (y1,…,yn):=g(x1,…,xk) with k?n such that whenever the substitution instance A(g(x1,…,xk)) of a 3DNF formula A(y1,…,yn) has a short resolution proof it follows that A(y1,…,yn) is a tautology. The qualification “short” depends on the parameters k and n.  相似文献   

16.
17.
Recently several algorithms have been developed which achieve high efficiency index in enclosing a root of the equationf(x)=0 in an interval [a, b] over whichf(x) is continuous andf(a)f(b)<0. The highest efficiency index, 1.6686 ..., was achieved in [4] using the inverse cubic interpolation. This paper studies the possibility of improving efficiency index by using high order inverse interpolations. A class of algorithms are presented and the optimal one of the class has achieved the efficiency index 1.7282 ... With a user-given accurary ? and starting with the initial interval [a 1,b 1]=[a, b], these algorithms guarantee to find in finitely many iterations an enclosing interval [a n ,b n ] that contains a root of the equation and whose lengthb n –a n is smaller than ?. Numerical experiments indicate that the new algorithm performs very well in practice.  相似文献   

18.
We characterize the class of all languages which are acceptable in exponential time by means of recursive and grammatical methods. (i) The class of all languages which are acceptable in exponential time is uniquely characterized by the class of all (0-1)-functions which can be generated, starting with the initial functions of the Grzegorczyk-class E2, by means of subtitution and limited recursion of the form f(x, y + 1) = h(x, y), f(x, y), f(x, l(x, y))), l(x, y) ? y. (ii) The class of all languages which are acceptable in exponential time is equal to the class of all languages generated by context-sensitive grammars with context-free control sets.  相似文献   

19.
Lindenmayer systems are a class of parallel rewriting systems originally introduced to model the growth and development of filamentous organisms. Families of languages generated by deterministic Lindenmayer systems (i.e., those in which each string has a unique successor) are investigated. In particular, the use of nonterminals, homomorphisms, and the combination of these are studied for deterministic Lindenmayer systems using one-sided context (D1Ls) and two-sided context (D2Ls). Languages obtained from Lindenmayer systems by the use of nonterminals are called extensions. Typical results are: The closure under letter-to-letter homomorphism of the family of extensions of D1L languages is equal to the family of recursively enumerable languages, although the family of extensions of D1L languages does not even contain all regular languages. Let P denote the restriction that the system does not rewrite a letter as the empty word. The family of extensions of PD2L languages is equal to the family of languages accepted by deterministic linear bounded automata. The closure under nonerasing homomorphism of the family of extensions of PD1L languages does not even contain languages like {a1,a2,?, an}1--{λ}, n?2 . The closure of the family of PD1L languages under homomorphisms which map a letter either to itself or to the empty word is equal to the family of recursively enumerable languages. Strict inclusion results follow from necessary conditions for a language to be in one of the considered families. By stating the results in their strongest form, the paper contains a systematic classification of the effect of nonterminals, letter-to-letter homomorphisms, nonerasing homomorphisms and homomorphisms for all the basic types of deterministic Lindenmayer systems using context.  相似文献   

20.
We consider an algebraic system over R[x] of the form X = a0(x)Xk+ ak1(x)X+ak(x), where a0(x) and ak(x) are in xR[x] and ak?1(x) is in xR. Let A be the infinite incidence matrix associated with the algebraic system. Then we prove that the eigenvalues of northwest corner truncations of A are dense in some algebraic curves.Using this we get a result on positive algebraic series. We consider the case that the coefficients of a1(x)(i = 0,…,k?1, k) are positive. The algebraic series generated by the algebraic system may be viewed as a function in the complex variable x. Then by the above fact we prove that the radius of convergence of the function equals the least positive zero of the modified discriminant of the system.As an application to context free languages we show a procedure for calculating the entropy of some one counter languages. Other applications to Dyck languages and the Lukasiewicz language are also described.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号