共查询到20条相似文献,搜索用时 15 毫秒
1.
Ivan Chajda Miroslav Kola?��k Helmut L?nger 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2011,15(1):183-186
Main results of Dorninger and L?nger (J Pure Appl Math 40:441–449, 2007) concerning polynomial permutations on bounded lattices with an antitone involution are generalized to the case of bounded commutative directoids. 相似文献
2.
This paper proves exponential asymptotic stability of discrete-time filters for the estimation of solutions to stochastic difference equations, when the observation noise is bounded. No assumption is made on the ergodicity of the signal. The proof uses the Hilbert projective metric, introduced into filter stability analysis by Atar and Zeitouni [1,2]. It is shown that when the signal noise is sufficiently regular, boundedness of the observation noise implies that the filter update operation is, on average, a strict contraction with respect to the Hilbert metric. Asymptotic stability then follows. 相似文献
3.
KAO-FEI CHIANG 《International journal of systems science》2013,44(10):1987-1998
The adaptive lattice filter is characterized as an input-dependent filter lying in an impulse disturbance. A modified recursive least-squares algorithm for bad data input is obtained by ‘dead zone’ control of the so-called reflection coefficients. The constraint-input constraint-output for stability analysis of the adaptive filter is specified as a sufficient condition. 相似文献
4.
E. K. Burke 《Journal of Automated Reasoning》1994,12(2):209-223
Unification algorithms have been constructed for semigroups and commutative semigroups. This paper considers the intermediate case of partially commutative semigroups. We introduce classesN and of such semigroups and justify their use. We present an equation-solving algorithm for any member of the classN. This algorithm is relative to having an algorithm to determine all non-negative solutions of a certain class of diophantine equations of degree 2 which we call -equations. The difficulties arising when attempting to solve equations in members of the class are discussed, and we present arguments that strongly suggest that unification in these semigroups is undecidable. 相似文献
5.
6.
7.
8.
Ito (1976, 1978) [14], [17] provided representations of strongly connected automata by group-matrix type automata. This shows the close connection between strongly connected automata with their automorphism groups. In this paper we deal with commutative asynchronous automata. In particular, we introduce and study normal commutative asynchronous automata and cyclic commutative asynchronous automata. Some properties on endomorphism monoids of these automata are given. Also, the representations of normal commutative asynchronous automata and cyclic commutative asynchronous automata are provided by S-automata and regular S-automata, respectively. The cartesian composition of a strongly connected automaton A and a cyclic commutative asynchronous automaton B is studied. It is shown that the endomorphism monoid of automaton is a Clifford monoid. Finally, a representation of is provided by regular Clifford monoid matrix-type automaton. This generalizes and extends the representations of strongly connected automata given by Ito (1976) [14]. 相似文献
9.
10.
Juhani Karhumäki 《Theoretical computer science》1979,9(2):207-220
Restricted versions of DT0L systems, so-called commutative DT0L systems, are considered. In these systems the length of a word derived is independent of the order of tables used. It turns out that many interesting length sets or languages, such as the set of composite numbers, are generated by these systems. Moreover, this approach makes it possible to give new (and slightly generalized) proofs for some undecidability results concerning DT0L functions. 相似文献
11.
This paper considers the design, in the frequency domain, of controllers for SISO plants, so that the closed-loop system is asymptotically stable, has a sensitivity function with zeros at given points in Re (s) ?0, and has a transmission or a sensitivity function bounded by a given function. The design requirements are reduced to an interpolation in Re (s) ?0, and a necessary and sufficient condition for its solution is presented. An algorithm is given for the construction of the required controllers. 相似文献
12.
In this paper, we investigate higher-order systems of linear difference equations where the associated characteristic matrix polynomial is self-inversive. We consider classes of equations with bounded solutions. It is known that stability properties of higher-order systems of linear difference equations are determined by the characteristic values of the corresponding matrix polynomials. All solutions are bounded (in both time directions) if the spectrum of the corresponding matrix polynomial lies on the unit circle, and moreover if the characteristic values of modulus 1 are semisimple. If the corresponding matrix polynomial is self-inversive, then one can use the inner radius of the numerical range to obtain a criterion for boundedness of solutions. We show that all solutions are bounded if the inner radius is greater than 1. In the case of matrix polynomials with positive definite coefficient matrices, we derive a computable lower bound for the inner radius and we obtain a criterion for robust boundedness. 相似文献
13.
Rüdiger Ehlers 《Formal Methods in System Design》2012,40(2):232-262
Synthesizing finite-state systems from full linear-time temporal logic (LTL) is an ambitious way to tackle the challenge of
constructing correct-by-construction systems. One particularly promising approach in this context is bounded synthesis, originally proposed by Schewe and Finkbeiner, which in turn builds upon Safraless synthesis, as described by Kupferman and Vardi. Previous implementations of these approaches performed the computation either in an
explicit way or used symbolic data structures other than binary decision diagrams (BDDs). In this paper, we reconsider BDDs
as state space representation and use it as data structure for bounded synthesis. The key to this construction is the application
of two novel optimisation techniques that decrease the number of state bits in such a representation significantly. The first
technique uses signalling bits to connect sub-games representing the safety- and non-safety parts of the specification. The second technique is based
on a closer analysis of the step of building a safety game from a universal automaton and uses a sufficient condition to remove
some so-called counters from the state space of the game. 相似文献
14.
In this paper we present for the Bounded Disorder file organization a model that relates the secondary overflow bucket size to the primary bucket size of the data nodes (supposedly different from that of overflow) and the whole size of a data node, by considering the tree index. This result is obtained by minimizing the cost of inserting data into the structure and enables to compute the optimal overflow bucket size. Both the normal and partial expansion cases are considered and a model for the optimal relation of the parameters involved is developed. 相似文献
15.
Naoki Abe 《New Generation Computing》1991,8(4):319-335
We consider the problem of learning the commutative subclass of regular languages in the on-line model of predicting {0,1∼-valued
functions from examples and reinforcements due to Littlestone [7,4]. We show that the entire class of commutative deterministic
finite state automata (CDFAs) of an arbitrary alphabet sizek is predictable inO(s
k) time with the worst case number of mistakes bounded above byO(s
kk logs), wheres is the number of states in the target DFA. As a corollary, this result implies that the class of CDFAs is also PAC-learnable
from random labeled examples in timeO(s
k) with sample complexity, using a different class of representations. The mistake bound of our algorithm is within a polynomial, for a fixed alphabet
size, of the lower boundO(s+k) we obtain by calculating the VC-dimension of the class. Our result also implies the predictability of the class of finite
sets of commutative DFAs representing the finite unions of the languages accepted by the respective DFAs.
Part of this work was supported by the Office of Naval Research under contract number N00014-87-K-0401 while the author was
at the Department of Computer and Information Science, University of Pennsylvania, and N0014-86-K-0454 while at the Department
of Computer and Information Sciences, U.C. Santa Cruz. The author’s email address is abe@IBL.CL.nec.co.jp 相似文献
16.
Cybernetics and Systems Analysis - 相似文献
17.
B. Litow 《Information Processing Letters》2003,87(6):283-285
Direct arguments are presented showing that for rational series in several commuting variables, the rational series problem is undecidable, and closure under Hadamard product fails. 相似文献
18.
Juhani Karhumäki 《Theoretical computer science》1977,5(2):211-217
Commutative N-rational formal power series are considered. Series giving polynomial functions as their coefficients are characterized, and a monotonicity result for commutative series is proved. As an application the division problem for N-rational formal power series is solved. 相似文献
19.
Two mobile agents (robots) have to meet in an a priori unknown bounded terrain modeled as a polygon, possibly with polygonal obstacles. Robots are modeled as points, and each of them is equipped with a compass. Compasses of robots may be incoherent. Robots construct their routes, but the actual walk of each robot is decided by the adversary that may, e.g., speed up or slow down the robot. We consider several scenarios, depending on three factors: (1) obstacles in the terrain are present, or not, (2) compasses of both robots agree, or not, (3) robots have or do not have a map of the terrain with their positions marked. The cost of a rendezvous algorithm is the worst-case sum of lengths of the robots’ trajectories until they meet. For each scenario, we design a deterministic rendezvous algorithm and analyze its cost. We also prove lower bounds on the cost of any deterministic rendezvous algorithm in each case. For all scenarios these bounds are tight. 相似文献
20.
This correspondence defines approaches for the efficient generation of a spiral-like search pattern within bounded rectangularly tessellated regions. The defined spiral-like search pattern grows outward from a given source in a two-dimensional space, thus tending to minimize search time in many sequential tracking tasks. Efficient spiral generation is achieved by minimizing the number of operations required for interaction with boundaries. Algorithms are developed for both rectangular search regions and for arbitrary convex search regions. 相似文献