首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
2.
Let F(x,y)F(x,y) be a polynomial over a field KK and mm a nonnegative integer. We call a polynomial gg over KK an mm-near solution of F(x,y)F(x,y) if there exists a c∈KcK such that F(x,g)=cxmF(x,g)=cxm, and the number cc is called an mm-value of F(x,y)F(x,y) corresponding to gg. In particular, cc can be 0. Hence, by viewing F(x,y)=0F(x,y)=0 as a polynomial equation over K[x]K[x] with variable yy, every solution of the equation F(x,y)=0F(x,y)=0 in K[x]K[x] is also an mm-near solution. We provide an algorithm that gives all mm-near solutions of a given polynomial F(x,y)F(x,y) over KK, and this algorithm is polynomial time reducible to solving one variable equations over KK. We introduce approximate solutions to analyze the algorithm. We also give some interesting properties of approximate solutions.  相似文献   

3.
We consider a two-edge connected, undirected graph G=(V,E)G=(V,E), with nn nodes and mm non-negatively real weighted edges, and a single source shortest paths tree (SPT) TT of GG rooted at an arbitrary node rr. If an edge in TT is temporarily removed, it makes sense to reconnect the nodes disconnected from the root by adding a single non-tree edge, called a swap edge  , instead of rebuilding a new optimal SPT from scratch. In the past, several optimality criteria have been considered to select a best possible swap edge. In this paper we focus on the most prominent one, that is the minimization of the average distance between the root and the disconnected nodes. To this respect, we present an O(mlog2n)O(mlog2n) time and O(m)O(m) space algorithm to find a best swap edge for every edge of TT, thus improving for m=o(n2/log2n)m=o(n2/log2n) the previously known O(n2)O(n2) time and space complexity algorithm.  相似文献   

4.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

5.
6.
7.
This paper concerns construction of additive stretched spanners with few edges for nn-vertex graphs having a tree-decomposition into bags of diameter at most δδ, i.e., the tree-length δδ graphs. For such graphs we construct additive 2δ2δ-spanners with O(δn+nlogn)O(δn+nlogn) edges, and additive 4δ4δ-spanners with O(δn)O(δn) edges. This provides new upper bounds for chordal graphs for which δ=1δ=1. We also show a lower bound, and prove that there are graphs of tree-length δδ for which every multiplicative δδ-spanner (and thus every additive (δ−1)(δ1)-spanner) requires Ω(n1+1/Θ(δ))Ω(n1+1/Θ(δ)) edges.  相似文献   

8.
9.
Motivated by the famous 3n+13n+1 conjecture, we call a mapping from ZZ to ZZresidue-class-wise affine   if there is a positive integer mm such that it is affine on residue classes (mod mm). This article describes a collection of algorithms and methods for computation in permutation groups and monoids formed by residue-class-wise affine mappings.  相似文献   

10.
This paper deals with the existence and search for properly edge-colored paths/trails between two, not necessarily distinct, vertices ss and tt in an edge-colored graph from an algorithmic perspective. First we show that several versions of the s−tst path/trail problem have polynomial solutions including the shortest path/trail case. We give polynomial algorithms for finding a longest properly edge-colored path/trail between ss and tt for a particular class of graphs and characterize edge-colored graphs without properly edge-colored closed trails. Next, we prove that deciding whether there exist kk pairwise vertex/edge disjoint properly edge-colored s−tst paths/trails in a cc-edge-colored graph GcGc is NP-complete even for k=2k=2 and c=Ω(n2)c=Ω(n2), where nn denotes the number of vertices in GcGc. Moreover, we prove that these problems remain NP-complete for cc-edge-colored graphs containing no properly edge-colored cycles and c=Ω(n)c=Ω(n). We obtain some approximation results for those maximization problems together with polynomial results for some particular classes of edge-colored graphs.  相似文献   

11.
Suffix automata and factor automata are efficient data structures for representing the full index of a set of strings. They are minimal deterministic automata representing the set of all suffixes or substrings of a set of strings. This paper presents a novel analysis of the size of the suffix automaton or factor automaton of a set of strings. It shows that the suffix automaton or factor automaton of a set of strings UU has at most 2Q−22Q2 states, where QQ is the number of nodes of a prefix-tree representing the strings in UU. This bound significantly improves over 2‖U‖−12U1, the bound given by Blumer et al. [A. Blumer, J. Blumer, D. Haussler, R.M. McConnell, A. Ehrenfeucht, Complete inverted files for efficient text retrieval and analysis, Journal of the ACM 34 (1987) 578–589], where ‖U‖U is the sum of the lengths of all strings in UU. More generally, we give novel and general bounds for the size of the suffix or factor automaton of an automaton as a function of the size of the original automaton and the maximal length of a suffix shared by the strings it accepts. We also describe in detail a linear-time algorithm for constructing the suffix automaton SS or factor automaton FF of UU in time O(|S|)O(|S|). Our algorithm applies in fact to any input suffix-unique automaton and strictly generalizes the standard on-line construction of a suffix automaton for a single input string. Our algorithm can also be used straightforwardly to generate the suffix oracle or factor oracle of a set of strings, which has been shown to have various useful properties in string-matching. Our analysis suggests that the use of factor automata of automata can be practical for large-scale applications, a fact that is further supported by the results of our experiments applying factor automata to a music identification task with more than 15,000 songs.  相似文献   

12.
We develop a new lower bound technique for data structures. We show an optimal Ω(nlglgn/lgn)Ω(nlglgn/lgn) space lower bounds for storing an index that allows to implement rank and select queries on a bit vector BB provided that BB is stored explicitly. These results improve upon [Peter Bro Miltersen, Lower bounds on the size of selection and rank indexes, in: Proceedings of the 16th Annual ACM–SIAM Symposium on Discrete Algorithms, 2005, pp. 11–12]. We show Ω((m/t)lgt)Ω((m/t)lgt) lower bounds for storing rank/select index in the case where BB has mm 11-bits in it and the algorithm is allowed to probe tt bits of BB. We also present an improved data structure that implements both rank and select queries with an index of size (1+o(1))(nlglgn/lgn)+O(n/lgn)(1+o(1))(nlglgn/lgn)+O(n/lgn), that is, compared to existing results we give an explicit constant for storage in the RAM model with word size lgnlgn. An advantage of this data structure is that both rank and select indexes share the most space consuming part of order Θ(nlglgn/lgn)Θ(nlglgn/lgn) making it more practical for implementation.  相似文献   

13.
14.
Fraenkel and Simpson [A.S. Fraenkel, J. Simpson, How many squares can a string contain? J. Combin. Theory Ser. A 82 (1998) 112–120] proved that the number of squares in a word of length nn is bounded by 2n2n. In this note we improve this bound to 2n−Θ(logn)2nΘ(logn). Based on the numerical evidence, the conjectured bound is nn.  相似文献   

15.
The maximal matching problem has received considerable attention in the self-stabilizing community. Previous work has given several self-stabilizing algorithms that solve the problem for both the adversarial and the fair distributed daemon, the sequential adversarial daemon, as well as the synchronous daemon. In the following we present a single self-stabilizing algorithm for this problem that unites all of these algorithms in that it has the same time complexity as the previous best algorithms for the sequential adversarial, the distributed fair, and the synchronous daemon. In addition, the algorithm improves the previous best time complexities for the distributed adversarial daemon from O(n2)O(n2) and O(δm)O(δm) to O(m)O(m) where nn is the number of processes, mm is the number of edges, and δδ is the maximum degree in the graph.  相似文献   

16.
We consider a variant of Gold’s learning paradigm where a learner receives as input nn different languages (in the form of one text where all input languages are interleaved). Our goal is to explore the situation when a more “coarse” classification of input languages is possible, whereas more refined classification is not. More specifically, we answer the following question: under which conditions, a learner, being fed nn different languages, can produce mm grammars covering all input languages, but cannot produce kk grammars covering input languages for any k>mk>m. We also consider a variant of this task, where each of the output grammars may not cover more than rr input languages. Our main results indicate that the major factor affecting classification capabilities is the difference n−mnm between the number nn of input languages and the number mm of output grammars. We also explore the relationship between classification capabilities for smaller and larger groups of input languages. For the variant of our model with the upper bound on the number of languages allowed to be represented by one output grammar, for classes consisting of disjoint languages, we found complete picture of relationship between classification capabilities for different parameters nn (the number of input languages), mm (number of output grammars), and rr (bound on the number of languages represented by each output grammar). This picture includes a combinatorial characterization of classification capabilities for the parameters n,m,rn,m,r of certain types.  相似文献   

17.
We present algorithmic lower bounds on the size sdsd of the largest independent sets of vertices in random dd-regular graphs, for each fixed d≥3d3. For instance, for d=3d=3 we prove that, for graphs on nn vertices, sd≥0.43475nsd0.43475n with probability approaching one as nn tends to infinity.  相似文献   

18.
19.
Matroid theory gives us powerful techniques for understanding combinatorial optimization problems and for designing polynomial-time algorithms. However, several natural matroid problems, such as 3-matroid intersection, are NP-hard. Here we investigate these problems from the parameterized complexity point of view: instead of the trivial nO(k)nO(k) time brute force algorithm for finding a kk-element solution, we try to give algorithms with uniformly polynomial (i.e., f(k)⋅nO(1)f(k)nO(1)) running time. The main result is that if the ground set of a represented linear matroid is partitioned into blocks of size ??, then we can determine in randomized time f(k,?)⋅nO(1)f(k,?)nO(1) whether there is an independent set that is the union of kk blocks. As a consequence, algorithms with similar running time are obtained for other problems such as finding a kk-element set in the intersection of ?? matroids, or finding kk terminals in a network such that each of them can be connected simultaneously to the source by ?? disjoint paths.  相似文献   

20.
We show how to support efficient back traversal in a unidirectional list, using small memory and with essentially no slowdown in forward steps. Using O(lgn)O(lgn) memory for a list of size nn, the ii’th back-step from the farthest point reached so far takes O(lgi)O(lgi) time in the worst case, while the overhead per forward step is at most ?? for arbitrary small constant ?>0?>0. An arbitrary sequence of forward and back steps is allowed. A full trade-off between memory usage and time per back-step is presented: kk vs. kn1/kkn1/k and vice versa. Our algorithms are based on a novel pebbling technique which moves pebbles on a virtual binary, or n1/kn1/k-ary, tree that can only be traversed in a pre-order fashion.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号