共查询到20条相似文献,搜索用时 0 毫秒
1.
Beling 《Algorithmica》2008,31(4):459-478
Abstract. We study the computational complexity of linear programs with coefficients that are real algebraic numbers under a Turing
machine model of computation. After reviewing a method for exact representation of algebraic numbers under the Turing model,
we show that the fundamental tasks of comparison and arithmetic can be performed in polynomial time. Our technique for establishing
polynomial-time algorithms for comparison and arithmetic is distinct from the usual resultant-based approaches, and has the
advantage that it provides a natural framework for analysis of the complexity of computational tasks, such as Gaussian elimination,
that involve a sequence of arithmetic operations. Our main contribution is to show that a variant of the ellipsoid method
can be used to solve linear programming in time polynomial in the encoding size of the problem coefficients and the degree
of any algebraic extension that contains those coefficients. 相似文献
2.
In 2003, Maurer et al. (IEEE Trans. Pattern Anal. Mach. Intell. 25:265–270, 2003) published a paper describing an algorithm that computes the exact distance transform in linear time (with respect to image
size) for the rectangular binary images in the k-dimensional space ℝ
k
and distance measured with respect to L
p
-metric for 1≤p≤∞, which includes Euclidean distance L
2. In this paper we discuss this algorithm from theoretical and practical points of view. On the practical side, we concentrate
on its Euclidean distance version, discuss the possible ways of implementing it as signed distance transform, and experimentally
compare implemented algorithms. We also describe the parallelization of these algorithms and discuss the computational time
savings associated with them. All these implementations will be made available as a part of the CAVASS software system developed
and maintained in our group (Grevera et al. in J. Digit. Imaging 20:101–118, 2007). On the theoretical side, we prove that our version of the signed distance transform algorithm, GBDT, returns the exact value of the distance from the geometrically defined object boundary. We provide a complete proof (which was not given of Maurer et al. (IEEE Trans. Pattern Anal. Mach. Intell. 25:265–270, 2003) that all these algorithms work correctly for L
p
-metric with 1<p<∞. We also point out that the precise form of the algorithm from Maurer et al. (IEEE Trans. Pattern Anal. Mach. Intell. 25:265–270,
2003) is not well defined for L
1 and L
∞ metrics. In addition, we show that the algorithm can be used to find, in linear time, the exact value of the diameter of an object, that is, the largest possible distance between any two of its elements. 相似文献
3.
The binary representation of each classification from a subset of a space of admissible classifications is considered. A metric in a unit cube is introduced, and a correct algebra of classification algorithms is constructed. The correctness and completeness of a model of classification algorithms are proved. An example of construction of a complete model for a classification problem is considered. 相似文献
4.
L. Trevisan 《Algorithmica》1998,21(1):72-88
Several sequential approximation algorithms for combinatorial optimization problems are based on the following paradigm:
solve a linear or semidefinite programming relaxation, then use randomized rounding to convert fractional solutions of the
relaxation into integer solutions for the original combinatorial problem. We demonstrate that such a paradigm can also yield
parallel approximation algorithms by showing how to convert certain linear programming relaxations into essentially equivalent positive linear programming [LN] relaxations that can be near-optimally solved in NC. Building on this technique, and finding some new linear programming
relaxations, we develop improved parallel approximation algorithms for Max Sat, Max Directed Cut, and Max
k CSP. The Max Sat algorithm essentially matches the best approximation obtainable with sequential algorithms and has a fast sequential version.
The Max
k CSP algorithm improves even over previous sequential algorithms. We also show a connection between probabilistic proof checking
and a restricted version of Max
k CSP. This implies that our approximation algorithm for Max
k CSP can be used to prove inclusion in P for certain PCP classes.
Received November 1996; revised March 1997. 相似文献
5.
The maximum satisfiability problem (MAX-SAT) is stated as follows: Given a boolean formula in CNF, find a truth assignment that satisfies the maximum possible number of its clauses. MAX-SAT is MAX-SNP-complete and received much attention recently. One of the challenges posed by Alber, Gramm and Niedermeier in a recent survey paper asks: Can MAX-SAT be solved in less than 2n “steps”? Here, n is the number of distinct variables in the formula and a step may take polynomial time of the input. We answered this challenge positively by showing that a popular algorithm based on branch-and-bound is bounded by O(2n) in time, where n is the maximum number of occurrences of any variable in the input.When the input formula is in 2-CNF, that is, each clause has at most two literals, MAX-SAT becomes MAX-2-SAT and the decision version of MAX-2-SAT is still NP-complete. The best bound of the known algorithms for MAX-2-SAT is O(m2m/5), where m is the number of clauses. We propose an efficient decision algorithm for MAX-2-SAT whose time complexity is bound by O(n2n). This result is substantially better than the previously known results. Experimental results also show that our algorithm outperforms any algorithm we know on MAX-2-SAT. 相似文献
6.
Exact Schema Theory for Genetic Programming and Variable-Length Genetic Algorithms with One-Point Crossover 总被引:3,自引:0,他引:3
Riccardo Poli 《Genetic Programming and Evolvable Machines》2001,2(2):123-163
A few schema theorems for genetic programming (GP) have been proposed in the literature in the last few years. Since they consider schema survival and disruption only, they can only provide a lower bound for the expected value of the number of instances of a given schema at the next generation rather than an exact value. This paper presents theoretical results for GP with one-point crossover which overcome this problem. First, we give an exact formulation for the expected number of instances of a schema at the next generation in terms of microscopic quantities. Due to this formulation we are then able to provide an improved version of an earlier GP schema theorem in which some (but not all) schema creation events are accounted for. Then, we extend this result to obtain an exact formulation in terms of macroscopic quantities which makes all the mechanisms of schema creation explicit. This theorem allows the exact formulation of the notion of effective fitness in GP and opens the way to future work on GP convergence, population sizing, operator biases, and bloat, to mention only some of the possibilities. 相似文献
7.
Programming and Computer Software - For finding global approximate solutions to an algebraic equation in n unknowns, the Hadamard open polygon for the case n = 1 and Hadamard polyhedron for the... 相似文献
8.
Graph homomorphism, also called H-coloring, is a natural generalization of graph coloring: There is a
homomorphism from a graph G to a complete graph on k vertices if and only if G is k-colorable. During recent years the topic
of exact (exponential-time) algorithms for NP-hard problems in general, and for graph coloring in particular, has led to
extensive research. Consequently, it is natural to ask how the techniques developed for exact graph coloring algorithms can
be extended to graph homomorphisms. By the celebrated result of Hell and Nesetril, for each fixed simple graph H, deciding
whether a given simple graph G has a homomorphism to H is polynomial-time solvable if
H is a bipartite graph, and NP-complete otherwise. The case where H is the cycle of length 5, is the first NP-hard case different
from graph coloring. We show that for an odd integer
, whether an input graph G with n vertices is homomorphic to the cycle of length k, can be decided in time
. We extend the results obtained for cycles, which are graphs of treewidth two, to graphs of bounded treewidth as follows:
if H is of treewidth at most t, then whether input graph G with n vertices is homomorphic to H can be decided in time
. 相似文献
9.
In the Intervalizing Coloured Graphs problem, one must decide for a given graph G = (V, E) with a proper vertex colouring of G whether G is the subgraph of a properly coloured interval graph. For the case that the number of colors is fixed, we give an exact algorithm that uses \(2^{\mathcal {O}(n/\log n)}\) time. We also give an \(\mathcal {O}^{\ast }(2^{n})\) algorithm for the case that the number of colors is not fixed. 相似文献
10.
In this paper we present an n^ O(k
1-1/d
) -time algorithm for solving the k -center problem in \reals
d
, under L
∈
fty - and L
2
-metrics. The algorithm extends to other metrics, and to the discrete k -center problem. We also describe a simple (1+ɛ) -approximation algorithm for the k -center problem, with running time O(nlog k) + (k/ɛ)^ O(k
1-1/d
) . Finally, we present an n^ O(k
1-1/d
) -time algorithm for solving the L -capacitated k -center problem, provided that L=Ω(n/k
1-1/d
) or L=O(1) .
Received July 25, 2000; revised April 6, 2001. 相似文献
11.
We present exact algorithms with exponential running times for variants of n-element set cover problems, based on divide-and-conquer and on inclusion–exclusion characterizations.
We show that the Exact Satisfiability problem of size l with m clauses can be solved in time 2
m
l
O(1) and polynomial space. The same bounds hold for counting the number of solutions. As a special case, we can count the number
of perfect matchings in an n-vertex graph in time 2
n
n
O(1) and polynomial space. We also show how to count the number of perfect matchings in time O(1.732
n
) and exponential space.
We give a number of examples where the running time can be further improved if the hypergraph corresponding to the set cover
instance has low pathwidth. This yields exponential-time algorithms for counting k-dimensional matchings, Exact Uniform Set Cover, Clique Partition, and Minimum Dominating Set in graphs of degree at most
three.
We extend the analysis to a number of related problems such as TSP and Chromatic Number. 相似文献
12.
本文基于矩阵的符号函数法,提出了一种U-D分解算法和脉动(Systolic)结构有效地求解代数Riccati方程以及用固定大小的方形阵列解决大型问题的方法. 相似文献
13.
Exact Schema Theory and Markov Chain Models for Genetic Programming and Variable-length Genetic Algorithms with Homologous Crossover 总被引:1,自引:0,他引:1
Riccardo Poli Nicholas Freitag McPhee Jonathan E. Rowe 《Genetic Programming and Evolvable Machines》2004,5(1):31-70
Genetic Programming (GP) homologous crossovers are a group of operators, including GP one-point crossover and GP uniform crossover, where the offspring are created preserving the position of the genetic material taken from the parents. In this paper we present an exact schema theory for GP and variable-length Genetic Algorithms (GAs) which is applicable to this class of operators. The theory is based on the concepts of GP crossover masks and GP recombination distributions that are generalisations of the corresponding notions used in GA theory and in population genetics, as well as the notions of hyperschema and node reference systems, which are specifically required when dealing with variable size representations.In this paper we also present a Markov chain model for GP and variable-length GAs with homologous crossover. We obtain this result by using the core of Vose's model for GAs in conjunction with the GP schema theory just described. The model is then specialised for the case of GP operating on 0/1 trees: a tree-like generalisation of the concept of binary string. For these, symmetries exist that can be exploited to obtain further simplifications.In the absence of mutation, the Markov chain model presented here generalises Vose's GA model to GP and variable-length GAs. Likewise, our schema theory generalises and refines a variety of previous results in GP and GA theory. 相似文献
14.
In this paper we investigate structure-preserving algorithms for computing the symmetric positive semi-definite solutions to the periodic discrete-time algebraic Riccati equations (P-DAREs). Using a structure-preserving swap and collapse procedure, a single symplectic matrix pair in standard symplectic form is obtained. The P-DAREs can then be solved via a single DARE, using a structure-preserving doubling algorithm. We develop the structure-preserving doubling algorithm from a new point of view and show its quadratic convergence under assumptions which are weaker than stabilizability and detectability. With several numerical results, the algorithm is shown to be efficient, out-performing other algorithms on a large set of benchmark problems. 相似文献
15.
《Journal of Symbolic Computation》1995,20(2):207-214
Using predicate logic, the concept of a linear problem is formalized. The class of linear problems is huge, diverse, complex, and important. Linear and randomized linear algorithms are formalized. For each linear problem, a linear algorithm is constructed that solves the problem and a randomized linear algorithm is constructed that completely solves it, that is, for any data of the problem, the output set of the randomized linear algorithm is identical to the solution set of the problem. We obtain a single machine, referred to as the Universal (Randomized) Linear Machine, which (completely) solves every instance of every linear problem. Conversely, for each randomized linear algorithm, a linear problem is constructed that the algorithm completely solves. These constructions establish a one-to-one and onto correspondence from equivalence classes of linear problems to equivalence classes of randomized linear algorithms.Our construction of (randomized) linear algorithms to (completely) solve linear problems as well as the algorithms themselves are based on Fourier Elimination and have superexponential complexity. However, there is no evidence that the inefficiency of our methods is unavoidable relative to the difficulty of the problem. 相似文献
16.
Linear Programming Models for the User and System Optimal Dynamic Network Design Problem: Formulations,Comparisons and Extensions 总被引:1,自引:2,他引:1
In this paper we formulate a network design model in which the traffic flows satisfy dynamic user equilibrium conditions for
a single destination. The model presented here incorporates the Cell Transmission Model (CTM); a traffic flow model capable
of capturing shockwaves and link spillovers. Comparisons are made between the properties of the Dynamic User equilibrium Network
Design Problem (DUE NDP) and an existing Dynamic System Optimal (DSO) NDP formulation. Both network design models have different
objective functions with similar constraint sets which are linear and convex. Numerical demonstrations are made on multiple
networks to demonstrate the efficacy of the model and demonstrate important differences between the DUE and DSO NDP approaches.
In addition, the flexibility of the approach is demonstrated by extending the formulation to account for demand uncertainty.
This is formulated as a stochastic programming problem and initial test results are demonstrated on test networks. It is observed
that not accounting for demand uncertainty explicitly, provides sub-optimal solution to the DUE NDP problem. 相似文献
17.
Given n points, called terminals, in the plane ℝ2 and a positive integer k, the bottleneck Steiner tree problem is to find k Steiner points from ℝ2 and a spanning tree on the n+k points that minimizes its longest edge length. Edge length is measured by an underlying distance function on ℝ2, usually, the Euclidean or the L
1 metric. This problem is known to be NP-hard. In this paper, we study this problem in the L
p
metric for any 1≤p≤∞, and aim to find an exact algorithm which is efficient for small fixed k. We present the first fixed-parameter tractable algorithm running in f(k)⋅nlog 2
n time for the L
1 and the L
∞ metrics, and the first exact algorithm for the L
p
metric for any fixed rational p with 1<p<∞ whose time complexity is f(k)⋅(n
k
+nlog n), where f(k) is a function dependent only on k. Note that prior to this paper there was no known exact algorithm even for the L
2 metric. 相似文献
18.
The Cluster Editing problem is defined as follows: Given an undirected, loopless graph, we want to find a set of edge modifications (insertions and deletions) of minimum cardinality, such that the modified graph consists of disjoint cliques. 相似文献
19.
Nevin Lianwen Zhang 《Applied Intelligence》1998,9(2):173-183
This paper studies computational properties of two exact inference algorithms for Bayesian networks, namely the clique tree propagation algorithm (CTP)1 and the variable elimination algorithm (VE). VE permits pruning of nodes irrelevant to a query while CTP facilitates sharing of computations among different queries. Experiments have been conducted to empirically compare VE and CTP. We found that, contrary to common beliefs, VE is often more efficient than CTP, especially in complex networks. 相似文献
20.
We consider the $\mathcal{NP}$ -hard problem of finding a spanning tree with a maximum number of internal vertices. This problem is a generalization of the famous Hamiltonian Path problem. Our dynamic-programming algorithms for general and degree-bounded graphs have running times of the form $\mathcal{O}^{*}(c^{n})$ with c≤2. For graphs with bounded degree, c<2. The main result, however, is a branching algorithm for graphs with maximum degree three. It only needs polynomial space and has a running time of $\mathcal{O}(1.8612^{n})$ when analyzed with respect to the number of vertices. We also show that its running time is $2.1364^{k} n^{\mathcal{O}(1)}$ when the goal is to find a spanning tree with at least k internal vertices. Both running time bounds are obtained via a Measure & Conquer analysis, the latter one being a novel use of this kind of analysis for parameterized algorithms. 相似文献