首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 484 毫秒
1.
The following game is considered. The first player can take any number of stones, but not all the stones, from a single pile of stones. After that, each player can take at most n-times as many as the previous one. The player first unable to move loses and his opponent wins. Let f1,f2,… be an initial sequence of stones in increasing order, such that the second player has a winning strategy when play begins from a pile of size fi. It is proved that there exist constants c=c(n) and k0=k0(n) such that fk+1=fk+fkc for all k>k0, and limn→∞ c(n)/(nlogn)=1.  相似文献   

2.
If are maximal nests on a finite-dimensional Hilbert space H, the dimension of the intersection of the corresponding nest algebras is at least dim H. On the other hand, there are three maximal nests whose nest algebras intersect in the scalar operators. The dimension of the intersection of two nest algebras (corresponding to maximal nests) can be of any integer value from n to n(n+1)/2, where n=dim H. For any two maximal nests there exists a basis {f1,f2,…,fn} of H and a permutation π such that and where Mi=  span{f1,f2,…,fi} and Ni= span{fπ(1),fπ(2),…,fπ(i)}. The intersection of the corresponding nest algebras has minimum dimension, namely dim H, precisely when π(j)=nj+1,1jn. Those algebras which are upper-triangular matrix incidence algebras, relative to some basis, can be characterised as intersections of certain nest algebras.  相似文献   

3.
An up–down permutation P=(p1,p2,…,pn) is a permutation of the integers 1 to n which satisfies constraints specified by a sequence C=(c1,c2,…,cn−1) of U's and D's of length n−1. If ci is U then pi<pi+1 otherwise pi−1>pi. A loopless algorithm is developed for generating all the up–down permutations satisfying any sequence C. Ranking and unranking algorithms are discussed.  相似文献   

4.
Length-bounded disjoint paths in planar graphs   总被引:1,自引:0,他引:1  
The following problem is considered: given: an undirected planar graph G=(V,E) embedded in , distinct pairs of vertices {r1,s1},…,{rk,sk} of G adjacent to the unbounded face, positive integers b1,…,bk and a function ; find: pairwise vertex-disjoint paths P1,…,Pk such that for each i=1,…,k, Pi is a risi-path and the sum of the l-length of all edges in Pi is at most bi. It is shown that the problem is NP-hard in the strong sense. A pseudo-polynomial-time algorithm is given for the case of k=2.  相似文献   

5.
Let W be an n-dimensional vector space over a field F; for each positive integer m, let the m-tuples (U1, …, Um) of vector subspaces of W be uniformly distributed; and consider the statistics Xm,1 dimF(∑i=1m Ui) and Xm,2 dimF (∩i=1m Ui). If F is finite of cardinality q, we determine lim E(Xm,1k), and lim E(Xm,2k), and hence, lim var(Xm,1) and lim var(Xm,2), for any k > 0, where the limits are taken as q → ∞ (for fixed n). Further, we determine whether these, and other related, limits are attained monotonically. Analogous issues are also addressed for the case of infinite F.  相似文献   

6.
Let sk(n) be the largest integer such that every n-point interval order with no antichain of more than k points includes an sk(n)-point semiorder. When k = 1, s1(n) = n since all interval orders with no two-point antichains are chains. Given (c1,...,c5) = (1, 2, 3, 4), it is shown that s2(n) = cn for n 4, s3(n) = cn for n 5, and for all positive n, s2 (n+4) =s2(n)+3, s3(n+5) = s3(n)+3. Hence s2 has a repeating pattern of length 4 [1, 2, 3, 3; 4, 5, 6, 6; 7, 8, 9, 9;...], and s3 has a repeating pattern of length 5 [1, 2, 3, 3, 4; 4, 5, 6, 6, 7; 7, 8, 9, 9, 10;...].

Let s(n) be the largest integer such that every n-point interval order includes an s(n)-point semiorder. It was proved previously that for even n from 4 to 14, and that s(17) = 9. We prove here that s(15) = s(16) = 9, so that s begins 1, 2, 3, 3, 4, 4,..., 8, 8, 9, 9, 9. Since s(n)/n→0, s cannot have a repeating pattern.  相似文献   


7.
For a 1-dependent stationary sequence {Xn} we first show that if u satisfies p1=p1(u)=P(X1>u)0.025 and n>3 is such that 88np131, then
P{max(X1,…,Xn)u}=ν·μn+O{p13(88n(1+124np13)+561)}, n>3,
where
ν=1−p2+2p3−3p4+p12+6p22−6p1p2,μ=(1+p1p2+p3p4+2p12+3p22−5p1p2)−1
with
pk=pk(u)=P{min(X1,…,Xk)>u}, k1
and
|O(x)||x|.
From this result we deduce, for a stationary T-dependent process with a.s. continuous path {Ys}, a similar, in terms of P{max0skTYs<u}, k=1,2 formula for P{max0stYsu}, t>3T and apply this formula to the process Ys=W(s+1)−W(s), s0, where {W(s)} is the Wiener process. We then obtain numerical estimations of the above probabilities.  相似文献   

8.
We consider the following model Hr(n, p) of random r-uniform hypergraphs. The vertex set consists of two disjoint subsets V of size | V | = n and U of size | U | = (r − 1)n. Each r-subset of V × (r−1U) is chosen to be an edge of H ε Hr(n, p) with probability p = p(n), all choices being independent. It is shown that for every 0 < < 1 if P = (C ln n)/nr−1 with C = C() sufficiently large, then almost surely every subset V1 V of size | V1 | = (1 − )n is matchable, that is, there exists a matching M in H such that every vertex of V1 is contained in some edge of M.  相似文献   

9.
A holey Schröder design of type h1n1h2n2hknk (HSD(h1n1h2n2hknk)) is equivalent to a frame idempotent Schröder quasigroup (FISQ(h1n1h2n2hknk)) of order n with ni missing subquasigroups (holes) of order hi, (1 i k), which are disjoint and spanning, that is, Σ1 i k nihi = n. In this paper, it is shown that an HSD(hn) exists if and only if h2n(n − 1) 0 (mod 4) with expceptions (h, n) ε {{(1,5),(1,9),(2,4)}} and the possible exception of (h, n) = (6,4).  相似文献   

10.
The parametric resource allocation problem asks to minimize the sum of separable single-variable convex functions containing a parameter λ, Σi = 1ni(xi + λgi(xi)), under simple constraints Σi = 1n xi = M, lixiui and xi: nonnegative integers for i = 1, 2, …, n, where M is a given positive integer, and li and ui are given lower and upper bounds on xi. This paper presents an efficient algorithm for computing the sequence of all optimal solutions when λ is continuously changed from 0 to ∞. The required time is O(GMlog2 n + n log n + n log(M/n)), where G = Σi = 1n ui − Σi = 1n li and an evaluation of ƒi(·) or gi(·) is assumed to be done in constant time.  相似文献   

11.
For each positive integer k we consider the smallest positive integer f(k) (dependent only on k) such that the following holds: Each connected graph G with chromatic number χ(G) = k can be properly vertex colored by k colors so that for each pair of vertices xo and xp in any color class there exist vertices x1, x2, …, xp-1 of the same class with dist(xi, xi+1) f(k) for each i, 0 i p − 1. Thus, the graph is k-colorable with the vertices of each color class placed throughout the graph so that no subset of the class is at a distance > f(k) from the remainder of the class.

We prove that f(k) < 12k when the order of the graph is k(k − 2) + 1.  相似文献   


12.
Let I be a compact interval of real axis R, and(I, H) be the metric space of all nonempty closed subintervals of I with the Hausdorff metric H and f : I → I be a continuous multi-valued map. Assume that Pn =(x_0, x_1,..., xn) is a return tra jectory of f and that p ∈ [min Pn, max Pn] with p ∈ f(p). In this paper, we show that if there exist k(≥ 1) centripetal point pairs of f(relative to p)in {(x_i; x_i+1) : 0 ≤ i ≤ n-1} and n = sk + r(0 ≤ r ≤ k-1), then f has an R-periodic orbit, where R = s + 1 if s is even, and R = s if s is odd and r = 0, and R = s + 2 if s is odd and r 0. Besides,we also study stability of periodic orbits of continuous multi-valued maps from I to I.  相似文献   

13.
We present a new data structure for a set of n convex simply-shaped fat objects in the plane, and use it to obtain efficient and rather simple solutions to several problems including (i) vertical ray shooting—preprocess a set of n non-intersecting convex simply-shaped flat objects in 3-space, whose xy-projections are fat, for efficient vertical ray shooting queries, (ii) point enclosure—preprocess a set C of n convex simply-shaped fat objects in the plane, so that the k objects containing a query point p can be reported efficiently, (iii) bounded-size range searching— preprocess a set C of n convex fat polygons, so that the k objects intersecting a “not-too-large” query polygon can be reported efficiently, and (iv) bounded-size segment shooting—preprocess a set C as in (iii), so that the first object (if exists) hit by a “not-too-long” oriented query segment can be found efficiently. For the first three problems we construct data structures of size O(λs(n)log3n), where s is the maximum number of intersections between the boundaries of the (xy-projections) of any pair of objects, and λs(n) is the maximum length of (n, s) Davenport-Schinzel sequences. The data structure for the fourth problem is of size O(λs(n)log2n). The query time in the first problem is O(log4n), the query time in the second and third problems is O(log3n + klog2n), and the query time in the fourth problem is O(log3n).

We also present a simple algorithm for computing a depth order for a set as in (i), that is based on the solution to the vertical ray shooting problem. (A depth order for , if exists, is a linear order of , such that, if K1, K2 and K1 lies vertically above K2, then K1 precedes K2.) Unlike the algorithm of Agarwal et al. (1995) that might output a false order when a depth order does not exist, the new algorithm is able to determine whether such an order exists, and it is often more efficient in practical situations than the former algorithm.  相似文献   


14.
Jianxiang Li   《Discrete Mathematics》2003,260(1-3):217-221
Let G be a graph of order n, and let a and b be integers such that 1a<b. Let δ(G) be the minimum degree of G. Then we prove that if δ(G)(k−1)a, n(a+b)(k(a+b)−2)/b, and |NG(x1)NG(x2)NG(xk)|an/(a+b) for any independent subset {x1,x2,…,xk} of V(G), where k2, then G has an [a,b]-factor. This result is best possible in some sense.  相似文献   

15.
A graph G with n vertices is said to be embeddable (in its complement) if there is an automorphism φ of Kn such that E(G) ∩ E(φ(G))=. It is known that all trees T with n (≥2) vertices and T K1,n−1 are embeddable. We say that G is 1-embeddable if, for every edge e, there is an automorphism φ of Kn such that E(G) ∩ E(φ(G))={e};and that it is 2-embeddable if,for every pair e1, e2 of edges, there is an automorphism φ of Kn such that E(G) ∩ E(φ(G))={e1, e2}. We prove here that all trees with n (3) vertices are 1-embeddable; and that all trees T with n (4) vertices and T K1,n−1 are 2-embeddable. In a certain sense, this result is sharp.  相似文献   

16.
In a recent paper, D.J. Kleitman and M.E. Saks gave a proof of Huang's conjecture on alphabetic binary trees.

Given a set E = {ei}, I = 0, 1, 2, …, m and assigned positive weights to its elements and supposing the elements are indexed such that w(e0) ≤ w(e1) ≤ … ≤w (em), where w(ei) is the weight of ei, we call the following sequence E* a ‘saw-tooth’ sequence

E*=(e0,em,e1,…,ej,emj,…).

Huang's conjecture is: E* is the most expensive sequence for alphabetic binary trees. This paper shows that this property is true for the L-restricted alphabetic binary trees, where L is the maximum length of the leaves and log2(m + 1) ≤Lm.  相似文献   


17.
A mapping ƒ : n=1InI is called a bag mapping having the self-identity if for every (x1,…,xn) ε i=1In we have (1) ƒ(x1,…,xn) = ƒ(xi1,…,xin) for any arrangement (i1,…,in) of {1,…,n}; monotonic; (3) ƒ(x1,…,xn, ƒ(x1,…,xn)) = ƒ(x1,…,xn). Let {ωi,n : I = 1,…,n;n = 1,2,…} be a family of non-negative real numbers satisfying Σi=1nωi,n = 1 for every n. Then one calls the mapping ƒ : i=1InI defined as follows an OWA bag mapping: for every (x1,…,xn) ε i=1In, ƒ(x1,…,xn) = Σi=1nωi,nyi, where yi is the it largest element in the set {x1,…,xn}. In this paper, we give a sufficient and necessary condition for an OWA bag mapping having the self-identity.  相似文献   

18.
Let k be a field of characteristic 0, and let f : knkn be a polynomial map with components of the form fi=xi+hi, where the hi are monomials. If the Jacobian determinant of the map f is a nonzero constant, then f is a tame automorphism. If, in addition, each hi is either constant or of degree 2 or more, then f is linearly triangularizable.  相似文献   

19.
Here we examine an active redundant system with scheduled starting times of the units. We assume availability of n non-identical, non-repairable units for replacement or support. The original unit starts its operation at time s1 = 0 and each one of the (n − 1) standbys starts its operation at scheduled time si (i = 2, …, n) and works in parallel with those already introduced and not failed before si. The system is up at times si (i = 2, …, n), if and only if, there is at least one unit in operation. Thus, the system has the possibility to work with up to n units, in parallel structure. Unit-lifetimes Ti (i = 1, …, n) are independent with cdf Fi, respectively. The system has to operate without inspection for a fixed period of time c and it stops functioning when all available units fail before c. The probability that the system is functioning for the required period of time c depends on the distribution of the unit-lifetimes and on the scheduling of the starting times si. The reliability of the system is evaluated via a recursive relation as a function of the starting times si (i = 2, …, n). Maximizing with respect to the starting times we get the optimal ones. Analytical results are presented for some special distributions and moderate values of n.  相似文献   

20.
Let H be a Hopf algebra over a field k and let H AA, h ah.a, be an action of H on a commutative local Noetherian kalgebra (A, m). We say that this action is linearizable if there exists a minimal system x1, …, xn of generators of the maximal ideal m such that h.xi ε kx1 + …+ kxn for all h ε H and i = 1, …, n. In the paper we prove that the actions from a certain class are linearizable (see Theorem 4), and we indicate some consequences of this fact.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号