首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 639 毫秒
1.
2.
We prove an explicit bound on the radius of a ball centered at the origin which is guaranteed to contain all bounded connected components of a semi-algebraic set S⊂RkSRk defined by a weak sign condition involving ss polynomials in Z[X1,…,Xk]Z[X1,,Xk] having degrees at most dd, and whose coefficients have bitsizes at most ττ. Our bound is an explicit function of s,d,ks,d,k and ττ, and does not contain any undetermined constants. We also prove a similar bound on the radius of a ball guaranteed to intersect every connected component of SS (including the unbounded components). While asymptotic bounds of the form 2τdO(k)2τdO(k) on these quantities were known before, some applications require bounds which are explicit and which hold for all values of s,d,ks,d,k and ττ. The bounds proved in this paper are of this nature.  相似文献   

3.
4.
5.
6.
We present a new positive lower bound for the minimum value taken by a polynomial PP with integer coefficients in kk variables over the standard simplex of RkRk, assuming that PP is positive on the simplex. This bound depends only on the number of variables kk, the degree dd and the bitsize ττ of the coefficients of PP and improves all the previous bounds for arbitrary polynomials which are positive over the simplex.  相似文献   

7.
A collection of T1,T2,…,TkT1,T2,,Tk of unrooted, leaf labelled (phylogenetic) trees, all with different leaf sets, is said to be compatible   if there exists a tree TT such that each tree TiTi can be obtained from TT by deleting leaves and contracting edges. Determining compatibility is NP-hard, and the fastest algorithm to date has worst case complexity of around Ω(nk)Ω(nk) time, nn being the number of leaves. Here, we present an O(nf(k))O(nf(k)) algorithm, proving that compatibility of unrooted phylogenetic trees is fixed parameter tractable   (FPT) with respect to the number kk of trees.  相似文献   

8.
The ΔΔ-timed uniform consensus is a stronger variant of the traditional consensus and it satisfies the following additional property: every correct process terminates its execution within a constant time ΔΔΔ-timeliness), and no two processes decide differently (uniformity). In this paper, we consider the ΔΔ-timed uniform consensus problem in presence of fcfc crash processes and ftft timing-faulty processes, and propose a ΔΔ-timed uniform consensus algorithm. The proposed algorithm is adaptive in the following sense: it solves the ΔΔ-timed uniform consensus when at least ft+1ft+1 correct processes exist in the system. If the system has less than ft+1ft+1 correct processes, the algorithm cannot solve the ΔΔ-timed uniform consensus. However, as long as ft+1ft+1 processes are non-crashed, the algorithm solves (non-timed) uniform consensus. We also investigate the maximum number of faulty processes that can be tolerated. We show that any ΔΔ-timed uniform consensus algorithm tolerating up to ftft timing-faulty processes requires that the system has at least ft+1ft+1 correct processes. This impossibility result implies that the proposed algorithm attains the maximum resilience about the number of faulty processes. We also show that any ΔΔ-timed uniform consensus algorithm tolerating up to ftft timing-faulty processes cannot solve the (non-timed) uniform consensus when the system has less than ft+1ft+1 non-crashed processes. This impossibility result implies that our algorithm attains the maximum adaptiveness.  相似文献   

9.
We present algorithmic lower bounds on the size sdsd of the largest independent sets of vertices in random dd-regular graphs, for each fixed d≥3d3. For instance, for d=3d=3 we prove that, for graphs on nn vertices, sd≥0.43475nsd0.43475n with probability approaching one as nn tends to infinity.  相似文献   

10.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

11.
Question/Answer games (Q/A games for short) are a generalization of the Rényi–Ulam game and they are a model for information extraction in parallel. A Q/A game, G=(D,s,(q1,…,qk))G=(D,s,(q1,,qk)), is played on a directed acyclic graph, D=(V,E)D=(V,E), with a distinguished start vertex ss. In the iith round, Paul selects a set, Qi⊆VQiV, of at most qiqi non-terminal vertices. Carole responds by choosing an outgoing edge from each vertex in QiQi. At the end of kk rounds, Paul wins if Carole’s answers define a unique path from the root to one of the terminal vertices in DD.  相似文献   

12.
We define a self-map Pal:F2F2Pal:F2F2 of the free group on two generators a,ba,b, using automorphisms of F2F2 that form a group isomorphic to the braid group B3B3. The map PalPal restricts to de Luca’s right iterated palindromic closure on the submonoid generated by a,ba,b. We show that PalPal is continuous for the profinite topology on F2F2; it is the unique continuous extension of de Luca’s right iterated palindromic closure to F2F2. The values of PalPal are palindromes and coincide with the elements g∈F2gF2 such that abgabg and bagbag are conjugate.  相似文献   

13.
Let G=(V,E)G=(V,E) be a simple undirected graph with a set VV of vertices and a set EE of edges. Each vertex v∈VvV has a demand d(v)∈Z+d(v)Z+ and a cost c(v)∈R+c(v)R+, where Z+Z+ and R+R+ denote the set of nonnegative integers and the set of nonnegative reals, respectively. The source location problem with vertex-connectivity requirements in a given graph GG requires finding a set SS of vertices minimizing vSc(v)vSc(v) such that there are at least d(v)d(v) pairwise vertex-disjoint paths from SS to vv for each vertex v∈V−SvVS. It is known that if there exists a vertex v∈VvV with d(v)≥4d(v)4, then the problem is NP-hard even in the case where every vertex has a uniform cost. In this paper, we show that the problem can be solved in O(|V|4log2|V|)O(|V|4log2|V|) time if d(v)≤3d(v)3 holds for each vertex v∈VvV.  相似文献   

14.
It has been shown that the underestimated by DFT/LDA(GGA) band-gap can be efficiently corrected by an averaging procedure of transition energies over a region close to the direct band-gap transition, which we call the Δ(EIG)Δ(EIG) method (the differences in the Kohn–Sham eigenvalues). For small excitations the averaging appears to be equivalent to the Δ(SCF)Δ(SCF) approach (differences in the self-consistent energies), which is a consequence of Janak’s theorem and has been confirmed numerically. The Gaussian distribution in kk-space for electronic excitation has been used (occupation numbers in the Δ(SCF)Δ(SCF) or eigenenergy sampling in the Δ(EIG)Δ(EIG)). A systematic behavior of the kk-space localization parameter σkσk correcting the band-gap has been observed in numerical experiments. On that basis some sampling schemes for band-gap correction have been proposed and tested in the prediction of the band-gap behavior in InxGa(1x)NInxGa(1x)N semiconducting alloy, and a very good agreement with independent calculations has been obtained. In the context of the work the issue of electron localization in the rr-space has been discussed which, as it has been predicted by Mori-Sánchez et al. [P. Mori-Sánchez, A.J. Cohen, W. Yang, Phys. Rev. Lett. 100 (2008) 146401], should reduce the effect of the convex behavior of the LDA/GGA functionals and improve the band-gap prediction within DFT/LDA(GGA). A scheme for electron localization in rr-space has been suggested.  相似文献   

15.
16.
We consider orthogonal drawings of a plane graph GG with specified face areas. For a natural number kk, a kk-gonal drawing of GG is an orthogonal drawing such that the boundary of GG is drawn as a rectangle and each inner face is drawn as a polygon with at most kk corners whose area is equal to the specified value. In this paper, we show that every slicing graph GG with a slicing tree TT and a set of specified face areas admits a 10-gonal drawing DD such that the boundary of each slicing subgraph that appears in TT is also drawn as a polygon with at most 10 corners. Such a drawing DD can be found in linear time.  相似文献   

17.
In the paper two problems of a single machine bicriterion scheduling of a set of deteriorating jobs are considered. The jobs are independent, nonpreemptable and are ready for processing at time 00. The processing time pjpj of each job is a linear function of the starting time SjSj of the job, pj=1+αjSjpj=1+αjSj, where Sj?0Sj?0 and αj>0αj>0 for j=0,1,...,nj=0,1,...,n.  相似文献   

18.
Given a graph GG, an integer kk, and a demand set D={(s1,t1),…,(sl,tl)}D={(s1,t1),,(sl,tl)}, the kk-Steiner Forest problem finds a forest in graph GG to connect at least kk demands in DD such that the cost of the forest is minimized. This problem was proposed by Hajiaghayi and Jain in SODA’06. Thereafter, using a Lagrangian relaxation technique, Segev et al. gave the first approximation algorithm to this problem in ESA’06, with performance ratio O(n2/3logl)O(n2/3logl). We give a simpler and faster approximation algorithm to this problem with performance ratio O(n2/3logk)O(n2/3logk) via greedy approach, improving the previously best known ratio in the literature.  相似文献   

19.
20.
This paper aims at investigating properties of homomorphisms which preserve the bordered words. The bordered words are classified into d1d1-words and d2d2-words, where the length of the proper border of d2d2-word is greater than half of it. Some characterizations of d1d1-word-preserving homomorphism are studied. Some relationships among d-primitivity-preserving homomorphisms, d1d1-word-preserving homomorphisms, and d2d2-word-preserving homomorphisms are investigated. We show that every d-primitivity-preserving homomorphism is d1d1-word-preserving and every d1d1-word-preserving homomorphism is d2d2-word-preserving.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号