首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 156 毫秒
1.
关于最小广播图研究   总被引:3,自引:0,他引:3  
吴福朝  张铃 《计算机学报》1994,17(2):147-151
广播是网络上信息的传播过程。在这个过程中一个结点将信息传给所有其他的结点。本文确定B(19)的值。另外还给出B(2-^k-j),j=1,2,3,4的下界,并确定B(2^5-1)和B(2^5-2)的值。  相似文献   

2.
最小谣传图的一个有效算法   总被引:1,自引:0,他引:1  
黄振杰 《计算机学报》1994,17(4):312-315
谣传是信息网络中结点之间的一种常见的、重要的信息交换方式,在谣传过程中,每一个结点都得到k个结点的信息,这个概念在计算机网络及其它信息、通信网络的设计中有着重要的意义,本文把“权”的概念引入到谣传问题中来,从而定义了最小谣传图,并给出了最小谣传图的一个好算法。  相似文献   

3.
本文引进相对的多项式化归和相对多一多项式同构等概念,对UP、βn的FewP的相对完全集讨论它们的相对同构问题。并得到如下结果:1(1)对任何≤m^P,Bn-βn^Bn完全集C,C≈P^BnAn←→C为P^Bn柱。(2)对任何≤m^P,B-FewP^B完全集C,C≈P^B∪An←→C为P^B柱,其中B=SAT-∪An。 n∈N n∈N  相似文献   

4.
本详细地讨论了n-Pancake在栅去不超过2n-4个结点时的连通情况,并由此给出n-Pancake的条件连通度和条件直径,从本可以看出,n-Pancake是一种具有很强连通性的较好的并行网络拓扑结构。  相似文献   

5.
研究了素数阶完全图Kp的边的n-染色,给出了计算它的子图Gp(Si)的团数的一种算法,得到1个三色,3个四色Ramsey数的新的下界  相似文献   

6.
一类扩展的Steiner树优化问题及其应用   总被引:1,自引:0,他引:1  
本文提出了一个计算机网络通信和分布式系统中的一类扩展的Steiner树问题.对此问题设计了两个求其最优解的算法.这两个算法的时间复杂性分别是O(3(k-1)·n+2(k-1)·n2)和O(2(n-k)·n2).其中,k是一棵Steiner树需支撑的给定顶点的个数.  相似文献   

7.
王小云 《计算机学报》1995,18(3):205-211
本文讨论了Z^*n(n=pq,p和q未知)中离散对数问题的一些基本概念及问题本身的难度;定义了Z^*n中离散对数问题中关于判断主平方根的谓词Bn,a(x),证明了谓词Bn,a(x)即为Z^*n中离散对数问题的安全谓词。  相似文献   

8.
最小生成树的高效异步并行算法   总被引:1,自引:0,他引:1  
在MIMD-SM并行计算模型上,本文给出了时间复杂性为O(n(n/p+logp))的最小生成树的异步并行算法,其中n,p(1≤p≤n)分别表示图的顶点数和处理机的个数。  相似文献   

9.
超立方网络上的平行路径   总被引:1,自引:0,他引:1  
超立方是分布存储系中最常用的结构。在以往的工作中,人们已经提出了不少容错寻径算法,然而,还没有考虑Hn中│F│≥2n-2的情形,在一个含有故障结点集F的n维超立方网络Hn中,│F│≤4n-24,(s0,d0),(s1,d1)是其中任意两对非故障结点,结果,(1)对↓Av∈V(Hn),有│A(v,Hn-F)│≥6.(2)沿着某一维k(0≤k≤n-1),可将Hn分割成两部分:(d0∈)Hn-1,0和(  相似文献   

10.
陈协彬 《计算机学报》1999,22(6):567-570
得到了三族新的t-优图,反证了Boeach等人提出了的关于t-优图10个猜想中的5个猜想,并提出4个新的猜想,比如以下的猜想不正确,若G是n点e的t-优图,n〈e〈n(n-1)/2,则其连通度是(2e/n)代之以新的猜想,若G是n点e边t-优图,则其边连通度λ(G)=(2e/n)并且若λ(G)≥3,则G的一个边集是λ边割集当且仅当它关联于某个λ度顶点。  相似文献   

11.
n维泡形网络是设计大规模多处理机系统时最常用的互连网络拓扑结构之一,它以n维泡形图Bn为数学模型。F是连通图G的顶点子集,使得G-F不再连通且G-F的每个连通分支都有至少有n个顶点的F的势叫做G的Rk连通度。Rk连通度是衡量网络可靠性的一个重要参数。一般来说,网络的Rk连通度越大,其可靠性越高。研究了n维泡形网络的 k连通性;证明了在n维泡形网络中,当n≥3时,其R1连通度为2n-4;当n≥4 时,其R2连通度为4n-12。  相似文献   

12.
星型网络的3-限制边连通性   总被引:1,自引:1,他引:0  
星型互连网络是并行与分布式处理领域中最流行的互连网络之一,它以n维星图作为拓扑结构。k-限制边连通度是衡量网络的可靠性的参数之一。一般来说,一个网络的k-限制边连通度越大,其连通性就越好。研究了星型互连网络的k限制边连通度;证明了当n≥3时,n维星型互连网络的3-限制连通度为3n-7。  相似文献   

13.
星网是并行与分布式处理系统中最流行的互连网络之一,它以n维星图作为拓扑结构。k-限制边连通度是衡量网络可靠性的重要参数之一;一般地,网络的k-限制边连通度越大,它的连通性就越好。研究了星网的k-限制边连通度,证明了当n≥4时,n维星网的4-限制连通度为4n-10。  相似文献   

14.
Although there are polynomial algorithms of finding a 2-partition or a 3-partition for a simple undirected 2-connected or 3-connected graph respectively,there is no general algorithm of finding a k-partition for a k-connected graph G=(V,E),where k is the vertex connectivity of G.In this paper,an O(k^2n^2) general algorithm of finding a k-partition for a k-connected graph is proposed,where n=|V|.  相似文献   

15.
利用由Schingemann和Werner两人提出的构造量子纠错码的图论方法,证明了量子纠错码[[7,1,4]]p(p>3)的存在性。  相似文献   

16.
The undirected de Bruijn graph is often used as the model of communication network for its useful properties,such as short diameter,small maximum vertex degree.In this paper,we consider the alphabet overlap graph G(k,d,s): the vertex set V = {v|v = (v1 ...vk);vi ∈ {1,2,...,d},i = 1,2,...,k};they are distinct and two vertices u = (u1 ...uk) and v = (v1 ...vk) are adjacent if and only if us+i = vi or vs+i = ui (i = 1,2,...,k s).In particular,when s = 1,G(k,d,s) is just an undirected de Bruijn graph.First,we give a formula to calculate the vertex degree of G(k,d,s).Then,we use the corollary of Menger’s theorem to prove that the connectivity of G(k,d,s) is 2ds 2d2s k for s k/2.  相似文献   

17.

A minimum spanning tree (MST) with a small diameter is required in numerous practical situations such as when distributed mutual-exclusion algorithms are used, or when information retrieval algorithms need to compromise between fast access and small storage. The Diameter-Constrained MST (DCMST) problem can be stated as follows: given an undirected, edge-weighted graph, G , with n nodes and a positive integer, k , find a spanning tree with the smallest weight among all spanning trees of G which contain no path with more than k edges. This problem is known to be NP-complete, for all values of k ; 4 h k h ( n m 2). In this paper, we investigate the behavior of the diameter of an MST in randomly generated graphs. Then, we present heuristics that produce approximate solutions for the DCMST problem in polynomial time. We discuss convergence, relative merits, and implementation of these heuristics. Our extensive empirical study shows that the heuristics produce good solutions for a wide variety of inputs.  相似文献   

18.
A radio network (RN) is a distributed system where each station or node is a small hand-held commodity device called a station. Typically, each station has access to a few channels for transmitting and receiving messages. By RN(p, k), we denote a radio network with p stations, where each station has access to k channels. In a single-hop RN, every station is within the transmission range of every other station. Each station consumes power while transmitting or receiving a message, even when it receives a message that is not destined for it. It is extremely important that the stations consume power only when it is necessary since it is not possible to recharge batteries when the stations are on a mission. We are interested in designing an energy-efficient protocol for permutation routing, which is one of the most fundamental problems in any distributed system. An instance of the permutation routing problem involves p stations of an RN, each storing n/p items. Each item has a unique destination address which is the identity of the destination station to which the item should be sent. The goal is to route all the items to their destinations while consuming as little energy as possible. We show that the permutation routing problem of n packets on an RN(p, k) can be solved in 2n/k+(p/k)/sup 2/+p+2k/sup 2/ slots and each station needs to be awake for at most 6n/p+2p/k+8k slots. When k/spl Lt/p/spl Lt/n, our protocol is more efficient, both in terms of total number of slots and the number of slots each station is awake compared to a previously published protocol by Nakano et al. (2001).  相似文献   

19.
A feedforward Sigma-Pi neural network with a single hidden layer of m neurons is given by /sup m//spl Sigma//sub j=1/c/sub j/g(n/spl Pi//sub k=1/x/sub k/-/spl theta//sub k//sup j///spl lambda//sub k//sup j/) where c/sub j/, /spl theta//sub k//sup j/, /spl lambda//sub k//spl isin/R. We investigate the approximation of arbitrary functions f: R/sup n//spl rarr/R by a Sigma-Pi neural network in the L/sup p/ norm. An L/sup p/ locally integrable function g(t) can approximate any given function, if and only if g(t) can not be written in the form /spl Sigma//sub j=1//sup n//spl Sigma//sub k=0//sup m//spl alpha//sub jk/(ln|t|)/sup j-1/t/sub k/.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号