首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 20 毫秒
1.
While training and estimation for Pattern Recognition (PR) have been extensively studied, the question of achieving these when the resources are both limited and constrained is relatively open. This is the focus of this paper. We consider the problem of allocating limited sampling resources in a “real-time” manner, with the explicit purpose of estimating multiple binomial proportions (the extension of these results to non-binomial proportions is, in our opinion, rather straightforward). More specifically, the user is presented with ‘ntraining sets of data points, S 1,S 2,…,S n , where the set S i has N i points drawn from two classes {ω 1,ω 2}. A random sample in set S i belongs to ω 1 with probability u i and to ω 2 with probability 1?u i , with {u i }, i=1,2,…n, being the quantities to be learnt. The problem is both interesting and non-trivial because while both n and each N i are large, the number of samples that can be drawn is bounded by a constant, c. A web-related problem which is based on this model (Snaprud et al., The Accessibility for All Conference, 2003) is intriguing because the sampling resources can only be allocated optimally if the binomial proportions are already known. Further, no non-automaton solution has ever been reported if these proportions are unknown and must be sampled. Using the general LA philosophy as a paradigm to tackle this real-life problem, our scheme improves a current solution in an online manner, through a series of informed guesses which move towards the optimal solution. We solve the problem by first modelling it as a Stochastic Non-linear Fractional Knapsack Problem. We then present a completely new on-line Learning Automata (LA) system, namely, the Hierarchy of Twofold Resource Allocation Automata (H-TRAA), whose primitive component is a Twofold Resource Allocation Automaton (TRAA), both of which are asymptotically optimal. Furthermore, we demonstrate empirically that the H-TRAA provides orders of magnitude faster convergence compared to the Learning Automata Knapsack Game (LAKG) which represents the state-of-the-art. Finally, in contrast to the LAKG, the H-TRAA scales sub-linearly. Based on these results, we believe that the H-TRAA has also tremendous potential to handle demanding real-world applications, particularly those dealing with the world wide web.  相似文献   

2.
A finite set {F1,…,Fn} of λ-terms is said to be discriminable if, given n arbitrary λ-terms X1,…,Xn, there exists a λ-term Δ such that: ΔFi ? Xifor 1 ? i ? n. In the present paper each finite set of normal combinators which are pairwise non α-η-convertible is proved to be discriminable. Moreover a discrimination algorithm is given.  相似文献   

3.
Let R be a commutative ring and let n ≥ 1. We study Γ(s), the generating function and Ann(s), the ideal of characteristic polynomials of s, an n-dimensional sequence over R .We express f(X1,…,Xn) · Γ(s)(X-11,…,X-1n) as a partitioned sum. That is, we give (i) a 2n-fold "border" partition (ii) an explicit expression for the product as a 2n-fold sum; the support of each summand is contained in precisely one member of the partition. A key summand is βo(f, s), the "border polynomial" of f and s, which is divisible by X1Xn.We say that s is eventually rectilinear if the elimination ideals Ann(s)∩R[Xi] contain an fi (Xi) for 1 ≤ in. In this case, we show that Ann(s) is the ideal quotient (ni=1(fi) : βo(f, s)/(X1 … Xn )).When R and R[[X1, X2 ,…, Xn]] are factorial domains (e.g. R a principal ideal domain or F [X1,…, Xn]), we compute the monic generator γi of Ann(s) ∩ R[Xi] from known fi ϵ Ann(s) ∩ R[Xi] or from a finite number of 1-dimensional linear recurring sequences over R. Over a field F this gives an O(ni=1 δγ3i) algorithm to compute an F-basis for Ann(s).  相似文献   

4.
The frequency moments of a sequence containingmielements of typei, 1⩽in, are the numbersFk=∑ni=1 mki. We consider the space complexity of randomized algorithms that approximate the numbersFk, when the elements of the sequence are given one by one and cannot be stored. Surprisingly, it turns out that the numbersF0,F1, andF2can be approximated in logarithmic space, whereas the approximation ofFkfork⩾6 requiresnΩ(1)space. Applications to data bases are mentioned as well.  相似文献   

5.
The Cocke-Younger-Kasami algorithm (CYK) always requires 0(n3) time and 0(n2) space to recognize a trial sentence ω = w1w2…wn, given an e-free context-free grammar in Chomsky Normal form. The same inductive rule that underlies the CYK algorithm may be used to produce a variant that computes the same information but requires (1) a maximum of 0(n3) time and 0(n2) space, and (2) only 0(s(n)) space and time for an unambiguous grammar, where s(n) is the number of triples (A,i,j) for which a nonterminal symbol A derives wiwi+1wi+j?1. In this case, time and space consumed are at worst 0(n2).It is shown in addition, for any grammar, that a parse may be obtained from the table left from the recognition algorithm in time 0(s(n)) whether or not the grammar is ambiguous. The same procedure for the CYK algorithm requires time 0(n2).The performance of our variant is quite similar to that of the Earley algorithm except that the Earley algorithm substitutes for s(n), a function which is usually smaller.The model we use of a RAM is strictly identical to the model used in the CYK algorithm. CR categories: 4.20, 5.23, 5.25.  相似文献   

6.
In this paper we present schemes for reconfiguration of embedded task graphs in hypercubes. Previous results, which use either fault-tolerant embedding or an automorphism approach, can be expensive in terms of either the required number of spare nodes or reconfiguration time. Using the free dimension concept, we combine the above two approaches in our schemes which can tolerate about n faulty nodes under the worst case while keeping task migration time small. With expansion-2 initial embedding, three distributed reconfiguration schemes are presented in this paper. The first scheme, applied to chains and rings, can tolerate any ƒ ≤ n − 2 faulty nodes in an n-dimensional hypercube. The second and third schemes are applied to meshes or tori. For a mesh or torus of size 2m1 1 ··· 1 2md, the second scheme can tolerate any ƒ ≤ mi − 1 faulty nodes, where mi is the largest direction of the mesh and n = m1 + ··· + md + 1. By embedding two copies of meshes or tori in cube, the third scheme can tolerate any ƒ ≤ n − 1 faulty nodes with the dilation of embedding after reconfiguration degraded to 2. The third scheme is quite general and can be applied to any task graph.  相似文献   

7.
《国际计算机数学杂志》2012,89(6):1228-1232
In 2003, Balibrea et al. stated the problem of finding a skew-product map G on 𝕀3 holding ω G ={0}×𝕀2 G (x, y, z) for any (x, y, z)∈𝕀3, x≠0. We present a method for constructing skew-product maps F on 𝕀 n+1 holding ω F ={0}×𝕀 n F (x 1, x 2, …, x n+1), (x 1, x 2, …, x n+1)∈𝕀 n+1, x 1≠0.  相似文献   

8.
We consider the problem of maintaining information about the rank of a matrix M under changes to its entries. For an n×n matrix M, we show an amortized upper bound of O(n ω?1) arithmetic operations per change for this problem, where ω<2.373 is the exponent for matrix multiplication, under the assumption that there is a lookahead of up to Θ(n) locations. That is, we know up to the next Θ(n) locations (i 1,j 1),(i 2,j 2),…?, whose entries are going to change, in advance; however we do not know the new entries in these locations in advance. We get the new entries in these locations in a dynamic manner. The dynamic matrix rank problem was first studied by Frandsen and Frandsen who showed an upper bound of O(n 1.575) and a lower bound of Ω(n) for this problem and later Sankowski showed an upper bound of O(n 1.495) for this problem when allowing randomization and a small probability of error. These algorithms do not assume any lookahead. For the dynamic matrix rank problem with lookahead, Sankowski and Mucha showed a randomized algorithm (with a small probability of error) that is more efficient than these algorithms.  相似文献   

9.
A graph G(VE) (|V|⩾2k) satisfies property Ak if, given k pairs of distinct nodes (s1t1), …, (sktk) of V(G), there are k mutually node-disjoint paths, one connecting si and ti for each i, 1⩽ik. A necessary condition for any graph to satisfy Ak is that it is (2k−1)-connected. Hypercubes are important interconnection topologies for parallel computation and communication networks. It has been known that hypercubes of dimension n (which are n-connected) satisfy An/2⌉. In this paper we give an algorithm which, given k=⌈n/2⌉ pairs of distinct nodes (s1t1), …, (sktk) in the n-dimensional hypercube, finds the k disjoint paths of length at most n+⌈log n⌉+1 in O(n2 log* n) time.  相似文献   

10.
Let r be a relation for the relation scheme R(A1,A2,…,An); then we define Dom(r) to be Domr(A1)×Domr(A2)×…×Domr(An), where Domr(Ai) for each i is the set of all ith coordinates of tuples of r. A relation s is said to be a substructure of the relation r if and only if Dom(s)∩r = s.The following theorems analogous to Tarski-Fraisse-Vaught's characterizations of universal classes are proved: (i) An implicational dependency family (ID-family) F over the relation scheme R is finitely specifiable if and only if there exists a finite number of relations r1,r2,…,rm for R such that r ∈ F if and only if no ri is isomorphic to a substructure of r. (ii) F is finitely specifiable if and only if there exists a natural number k such that r ∈ F whenever F contains all substructures of r with at most k elements.We shall use these characterizations to obtain a new proof for Hull's (1984) characterization of finitely specifiable ID-families.  相似文献   

11.
The aim of this paper is to generalize a result given by Curry and Feys, who have shown that the only regular combinators possessing inverse in the λ-β-η-calculus are the permutators, whose definition is p=λzλx1λxn(zxi1xin) for n?0 where i1,…, ir is a permutation of 1,…, n. Here we extend this characterization to the set of normal forms, showing that the only normal forms possessing inverse in the λ-βη-calculus are the “hereditarily finite permutators” (h.f.p.), whose recursive definition is: if n?0, Pj (1?j?n) are h.f.p. and i1,…,in is a permutation of 1,…, n, then the normal form of P = λzλx1λxn(z(P1xi1))… (Pnin) is an h.f.p.  相似文献   

12.
13.
The dictionary matching problem seeks all locations in a given text that match any of the patterns in a given dictionary. Efficient algorithms for dictionary matching scan the text once, searching for all patterns simultaneously. Existing algorithms that solve the 2-dimensional dictionary matching problem all require working space proportional to the size of the dictionary. This paper presents the first efficient 2-dimensional dictionary matching algorithm that operates in small space. Given d patterns, D={P 1,…,P d }, each of size m×m, and a text T of size n×n, our algorithm finds all occurrences of P i , 1≤id, in T. The preprocessing of the dictionary forms a compressed self-index of the patterns, after which the original dictionary may be discarded. Our algorithm uses O(dmlogdm) extra bits of space. The time complexity of our algorithm is close to linear, O(dm 2+n 2 τlogσ), where τ is the time it takes to access a character in the compressed self-index and σ is the size of the alphabet. Using recent results τ is at most sub-logarithmic.  相似文献   

14.
For each n?1, an n-ary product ? on finite monoids is constructed. This product has the following property: Let Σ be a finite alphabet and Σ1 the free monoid generated by Σ. For i = 1, …,n, let Ai be a recognizable subset of Σ1, M(Ai) the syntactic monoid of An and M(A1?An) the syntactic monoid of the concatenation product A1?An. Then M(A1?An)< ? (M(A1),…,M(An)). The case n = 2 was studied by Schützenberger. As an application of the generalized product, I prove the theorem of Brzozowski and Knast that the dot-depth hierarchy of star-free sets is infinite.  相似文献   

15.
This note describes an algorithm for broadcasting a message on the n-dimensional hypercube in optimal time (n time units) and optimal communication (2n − 1 messages) in the presence of up to n − 2 arbitrary node or edge faults, assuming the set of faults is known to all nodes of the hypercube.  相似文献   

16.
Motivated by applications in batch scheduling of jobs in manufacturing systems and distributed computing, we study two related problems. Given is a set of jobs {J 1,…,J n }, where J j has a processing time p j , and an undirected intersection graph G=({1,…,n},E), with an edge (i,j) whenever the pair of jobs J i and J j cannot be processed in the same batch. We are to schedule the jobs in batches, where each batch completes its processing when the last job in the batch completes execution. The goal is to minimize the sum of job completion times. Our two problems differ in the definition of completion time of a job within a given batch. In the first variant, a job completes its execution when its batch is completed, whereas in the second variant, a job completes execution when its own processing is completed. For the first variant, we show that an adaptation of the greedy set cover algorithm gives a 4-approximation for perfect graphs. For the second variant, we give new or improved approximations for a number of different classes of graphs. The algorithms are of widely different genres (LP, greedy, subgraph covering), yet they curiously share a common feature in their use of randomized geometric partitioning.  相似文献   

17.
Within a mathematically rigorous model, we analyse the curse of dimensionality for deterministic exact similarity search in the context of popular indexing schemes: metric trees. The datasets X are sampled randomly from a domain Ω, equipped with a distance, ρ, and an underlying probability distribution, μ. While performing an asymptotic analysis, we send the intrinsic dimension d of Ω to infinity, and assume that the size of a dataset, n, grows superpolynomially yet subexponentially in d. Exact similarity search refers to finding the nearest neighbour in the dataset X to a query point ωΩ, where the query points are subject to the same probability distribution μ as datapoints. Let denote a class of all 1-Lipschitz functions on Ω that can be used as decision functions in constructing a hierarchical metric tree indexing scheme. Suppose the VC dimension of the class of all sets {ω:f(ω)≥a}, a∈? is o(n 1/4/log2 n). (In view of a 1995 result of Goldberg and Jerrum, even a stronger complexity assumption d O(1) is reasonable.) We deduce the Ω(n 1/4) lower bound on the expected average case performance of hierarchical metric-tree based indexing schemes for exact similarity search in (Ω,X). In paricular, this bound is superpolynomial in d.  相似文献   

18.
Any stationary time-series can be decomposed by means of an optimization operator, called the ζ-optimator, into several components (the time-series){Y t i}, i =1,2,…, p, such that the first component {V t i} t = 1,2,…,v is a smooth process having a larger autocorrelation in comparison with the original process {Y t}, i.e. ρvi > ρy. Usually only a few such components are sufficient for approximating the time-series with good accuracy. The ζ-optimator involves a shape parameter a, so the decomposition is unique provided that a. is fixed. Since the component {V t 1} involves much of the useful information it can be used for computing predictors for control purposes. Thus, given the observations Yv, Yv-1, Yv-2,…, a predictor of Yv+1 is ρvi V v 1 (q) where, Vv 1(q) = qYv + q(1-q)2 Yv-2, …, the weights q(1-q)r, r=0,1,2,…, decreasing rapidly as q = q(α) ε (0,1) Further, one may choose q rather than choosing α, since q(α) is a one-one mapping. Once q is fixed, the predictor ρv1 V v 1(q) is obtained in a straightforward way by using the formula above. It is shown that ρv1 V v 1(q) converges to the best predictor as α → 0. Some examples are worked out, illustrating both the decomposition and the forecasting procedures.  相似文献   

19.
It is proved that the family of recognizable N-subsets is not closed under the operation sup, and that there exists even a DOL length sequence x0, x1, … such that, for any k,xi ? xi+1 ? … ? xi+k holds true for some i and the cardinality of the set {n ∈ N|xn > xn+1} is infinite.  相似文献   

20.
Extending a result of Borodin et al. [1], we show that any branching program using linear queries “∑iλixi:c” to sort n numbers x1, x2,…,xn must satisfy the time-space tradeoff relation TS = Ω(n2). The same relation is also shown to be true for branching programs that uses queries “min R = ?” where R is any subset of {x1, x2,…,xn}.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号