We show that an n-vertex bipartite K3,3-free graph with n?3 has at most 2n−4 edges and that an n-vertex bipartite K5-free graph with n?5 has at most 3n−9 edges. These bounds are also tight. We then use the bound on the number of edges in a K3,3-free graph to extend two known NC algorithms for planar graphs to K3,3-free graphs. 相似文献
In this paper the dynamic location problem with opening, closure and reopening of facilities is formulated and an efficient primal-dual heuristic that computes both upper and lower limits to its optimal solution is described. The problem here studied considers the possibility of reconfiguring any location more than once over the planning horizon. This problem is NP-hard (the simple plant location problem is a special case of the problem studied). A primal-dual heuristic based on the work of Erlenkotter [A dual-based procedure for uncapacitated facility location. Operations Research 1978;26:992–1009] and Van Roy and Erlenkotter [A dual-based procedure for dynamic facility location. Management Science 1982;28:1091–105] was developed and tested over a set of randomly generated test problems. The results obtained are quite good, both in terms of the quality of lower and upper bounds calculated as in terms of the computational time spent by the heuristic. A branch-and-bound procedure that enables to optimize the problem is also described and tested over the same set of randomly generated problems. 相似文献
This paper presents a novel approach to computing tight upper bounds on the processor utilization for general real-time systems where tasks are composed of subtasks and precedence constraints may exist among subtasks of the same task. By careful analysis of preemption effects among tasks, the problem is formulated as a set of linear programming (LP) problems. Observations are made to reduce the number of LP problem instances required to be solved, which greatly improves the computation time of the utilization bounds. Furthermore, additional constraints are allowed to be included under certain circumstances to improve the quality of the bounds. 相似文献
This paper concerns the following problem: given a set of multi-attribute records, a fixed number of buckets and a two-disk system, arrange the records into the buckets and then store the buckets between the disks in such a way that, over all possible orthogonal range queries (ORQs), the disk access concurrency is maximized. We shall adopt the multiple key hashing (MKH) method for arranging records into buckets and use the disk modulo (DM) allocation method for storing buckets onto disks. Since the DM allocation method has been shown to be superior to any other allocation methods for allocating an MKH file onto a two-disk system for answering ORQs, the real issue is knowing how to determine an optimal way for organizing the records into buckets based upon the MKH concept.
A performance formula that can be used to evaluate the average response time, over all possible ORQs, of an MKH file in a two-disk system using the DM allocation method is first presented. Based upon this formula, it is shown that our design problem is related to a notoriously difficult problem, namely the Prime Number Problem. Then a performance lower bound and an efficient algorithm for designing optimal MKH files in certain cases are presented. It is pointed out that in some cases the optimal MKH file for ORQs in a two-disk system using the DM allocation method is identical to the optimal MKH file for ORQs in a single-disk system and the optimal average response time in a two-disk system is slightly greater than one half of that in a single-disk system. 相似文献
The authors report 3 picture-word interference experiments in which they explore some properties of the agreement process in speech production. In Experiment 1, Croatian speakers were asked to produce utterances in which the noun's gender value had an impact on the selection of gender-marked freestanding morphemes (pronouns) while ignoring the presentation of same- or different-gender distractor words. In Experiments 2 and 3, Croatian speakers were asked to name the same pictures using noun phrases in which the noun's gender value surfaced as an inflectional suffix. Different-gender distractors interfered more than same-gender distractors (the gender congruency effect) in Experiment 1, but not in Experiments 2 and 3. These contrasting results show that the cause of the gender congruency effect is not at the level where lexical-grammatical information is selected but at the level of selection of freestanding morphemes. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
A fast exact algorithm of searching for the upper bound of Bayesian estimates for the parameter of the exponential distribution
under the condition that an a priori distribution belongs to the class of all distribution functions with two equal quantiles.
This problem arises in analyzing the sensitivity of Bayesian estimates to the choice of an a priori distribution in an exponential
failure model.
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 1, pp. 90–102, January–February 2007. 相似文献
Formulating the minimum concave cost capacitated network flow problem as an integer concave minimization problem, we establish
finite branch and bound algorithms, in which the branching operation is the so–called integral rectangular partition and the
bounding procedure is performed by the classical minimum linear cost flow problem on subnetworks. For the special case that
the flow cost function is concave on a fixed number of arcs and linear on the others, an upper bound of the running time is
given.
Received: 19 July 1996 / Accepted: 8 July 1997 相似文献