where log*n is equal to the minimum number of iterations of the binary logarithm needed to bring n to 1 or below. The upper bound is obtained by constructing special graphs with modular decomposition of very small depth.  相似文献   

4.
Optimal broadcast on parallel locality models     
Ben Juurlink  Petr Kolman  Friedhelm Meyer auf der Heide  Ingo Rieping   《Journal of Discrete Algorithms》2003,1(2):151
In this paper matching upper and lower bounds for broadcast on general purpose parallel computation models that exploit network locality are proven. These models try to capture both the general purpose properties of models like the PRAM or BSP on the one hand, and to exploit network locality of special purpose models like meshes, hypercubes, etc., on the other hand. They do so by charging a cost l(|ij|) for a communication between processors i and j, where l is a suitably chosen latency function.An upper bound T(p)=∑i=0loglogp2i·l(p1/2i) on the runtime of a broadcast on a p processor H-PRAM is given, for an arbitrary latency function l(k).The main contribution of the paper is a matching lower bound, holding for all latency functions in the range from l(k)=Ω(logk/loglogk) to l(k)=O(log2k). This is not a severe restriction since for latency functions l(k)=O(logk/log1+log(k)) with arbitrary >0, the runtime of the algorithm matches the trivial lower bound Ω(logp) and for l(k)=Θ(log1+k) or l(k)=Θ(k), the runtime matches the other trivial lower bound Ω(l(p)). Both upper and lower bounds apply for other parallel locality models like Y-PRAM, D-BSP and E-BSP, too.  相似文献   

5.
The Number of Permutation Polynomials of a Given Degree Over a Finite Field     
Pinaki Das 《Finite Fields and Their Applications》2002,8(4):478
We relate the number of permutation polynomials in Fq[x] of degree dq−2 to the solutions (x1,x2,…,xq) of a system of linear equations over Fq, with the added restriction that xi≠0 and xixj whenever ij. Using this we find an expression for the number of permutation polynomials of degree p−2 in Fp[x] in terms of the permanent of a Vandermonde matrix whose entries are the primitive pth roots of unity. This leads to nontrivial bounds for the number of such permutation polynomials. We provide numerical examples to illustrate our method and indicate how our results can be generalised to polynomials of other degrees.  相似文献   

6.
Two New Classes of Difference Families     
Marco Buratti 《Journal of Combinatorial Theory, Series A》2000,90(2):353
A Z-cyclic triplewhist tournament for 4n+1 players, or briefly a TWh(4n+1), is equivalent to a n-set {(ai, bi, ci, di) | i=1, …, n} of quadruples partitioning Z4n+1−{0} with the property that ni=1 {±(aici), ±(bidi)}=ni=1 {±(aibi), ±(cidi)}=ni=1 {±(aidi), ±(bici)}=Z4n+1−{0}. The existence problem for Z-cyclic TWh(p)'s with p a prime has been solved for p1 (mod 16). I. Anderson et al. (1995, Discrete Math.138, 31–41) treated the case of p≡5 (mod 8) while Y. S. Liaw (1996, J. Combin. Des.4, 219–233) and G. McNay (1996, Utilitas Math.49, 191–201) treated the case of p≡9 (mod 16). In this paper, besides giving easier proofs of these authors' results, we solve the problem also for primes p≡1 (mod 16). The final result is the existence of a Z-cyclic TWh(v) for any v whose prime factors are all≡1 (mod 4) and distinct from 5, 13, and 17.  相似文献   

7.
Preprocessing chains for fast dihedral rotations is hard or even impossible     
Michael Soss  Jeff Erickson  Mark Overmars   《Computational Geometry》2003,26(3):603-246
We examine a computational geometric problem concerning the structure of polymers. We model a polymer as a polygonal chain in three dimensions. Each edge splits the polymer into two subchains, and a dihedral rotation rotates one of these subchains rigidly about the edge. The problem is to determine, given a chain, an edge, and an angle of rotation, if the motion can be performed without causing the chain to self-intersect. An Ω(nlogn) lower bound on the time complexity of this problem is known.We prove that preprocessing a chain of n edges and answering n dihedral rotation queries is 3 -hard, giving strong evidence that Ω(n2) preprocessing is required to achieve sublinear query time in the worst case. For dynamic queries, which also modify the chain if the requested dihedral rotation is feasible, we show that answering n queries is by itself 3 -hard, suggesting that sublinear query time is impossible after any amount of preprocessing.  相似文献   

8.
Bounds for Covering Codes over Large Alphabets     
Gerzson?KériEmail author  Patric?R.?J.??sterg?rd 《Designs, Codes and Cryptography》2005,37(1):45-60
Let Kq(n,R) denote the minimum number of codewords in any q-ary code of length n and covering radius R. We collect lower and upper bounds for Kq(n,R) where 6 ≤ q ≤ 21 and R ≤ 3. For q ≤ 10, we consider lengths n ≤ 10, and for q ≥ 11, we consider n ≤ 8. This extends earlier results, which have been tabulated for 2 ≤ q ≤ 5. We survey known bounds and obtain some new results as well, also for s-surjective codes, which are closely related to covering codes and utilized in some of the constructions.AMS Classification: 94B75, 94B25, 94B65Gerzson Kéri - Supported in part by the Hungarian National Research Fund, Grant No. OTKA-T029572.Patric R. J. Östergård - Supported in part by the Academy of Finland, Grants No. 100500 and No. 202315.  相似文献   

9.
A note on the largest eigenvalue of a large dimensional sample covariance matrix     
Z. D. Bai  Jack W. Silverstein  Y. Q. Yin 《Journal of multivariate analysis》1988,26(2)
Let {vij; i, J = 1, 2, …} be a family of i.i.d. random variables with E(v114) = ∞. For positive integers p, n with p = p(n) and p/ny > 0 as n → ∞, let Mn = (1/n) Vn VnT , where Vn = (vij)1 ≤ ip, 1 ≤ jn, and let λmax(n) denote the largest eigenvalue of Mn. It is shown that a.s. This result verifies the boundedness of E(v114) to be the weakest condition known to assure the almost sure convergence of λmax(n) for a class of sample covariance matrices.  相似文献   

10.
AnO(n logn) algorithm for the all-nearest-neighbors Problem     
Pravin M. Vaidya 《Discrete and Computational Geometry》1989,4(1):101-115
Given a setV ofn points ink-dimensional space, and anL q -metric (Minkowski metric), the all-nearest-neighbors problem is defined as follows: for each pointp inV, find all those points inV–{p} that are closest top under the distance metricL q . We give anO(n logn) algorithm for the all-nearest-neighbors problem, for fixed dimensionk and fixed metricL q . Since there is an (n logn) lower bound, in the algebraic decision-tree model of computation, on the time complexity of any algorithm that solves the all-nearest-neighbors problem (fork=1), the running time of our algorithm is optimal up to a constant factor.This research was supported by a fellowship from the Shell Foundation. The author is currently at AT&T Bell Laboratories, Murray Hill, New Jersey, USA.  相似文献   

11.
L-upper bound of L2-projections onto splines at a geometric mesh     
Rong-Qing Jia 《Journal of Approximation Theory》1983,37(4):293-310
For an integer k 1 and a geometric mesh (qi)−∞ with q ε (0, ∞), let Mi,k(x): = k[qi + k](· − x)+k − 1, Ni,k(x): = (qi + kqiMi,k(x)/k, and let Ak(q) be the Gram matrix (∝Mi,kNj,k)i,jεz. It is known that Ak(q)−1 is bounded independently of q. In this paper it is shown that Ak(q)−1 is strictly decreasing for q in [1, ∞). In particular, the sharp upper bound and lower bound for Ak (q)−1 are obtained: for all q ε (0, ∞).  相似文献   

12.
Schur functions and the invariant polynomials characterizing U(n) tensor operators     
R. A. Gustafson  S. C. Milne 《Advances in Applied Mathematics》1983,4(4)
We give a direct formulation of the invariant polynomials μGq(n)(, Δi,;, xi,i + 1,) characterizing U(n) tensor operators p, q, …, q, 0, …, 0 in terms of the symmetric functions Sλ known as Schur functions. To this end, we show after the change of variables Δi = γi − δi and xi, i + 1 = δi − δi + 1 thatμGq(n)(,Δi;, xi, i + 1,) becomes an integral linear combination of products of Schur functions Sα(, γi,) · Sβ(, δi,) in the variables {γ1,…, γn} and {δ1,…, δn}, respectively. That is, we give a direct proof that μGq(n)(,Δi,;, xi, i + 1,) is a bisymmetric polynomial with integer coefficients in the variables {γ1,…, γn} and {δ1,…, δn}. By making further use of basic properties of Schur functions such as the Littlewood-Richardson rule, we prove several remarkable new symmetries for the yet more general bisymmetric polynomials μmGq(n)1,…, γn; δ1,…, δm). These new symmetries enable us to give an explicit formula for both μmG1(n)(γ; δ) and 1G2(n)(γ; δ). In addition, we describe both algebraic and numerical integration methods for deriving general polynomial formulas for μmGq(n)(γ; δ).  相似文献   

13.
Permanence and global stability in a Lotka-Volterra predator-prey system with delays     
Y. Muroya   《Applied Mathematics Letters》2003,16(8):1245-1250
Consider the permanence and global asymptotic stability of models governed by the following Lotka-Volterra-type system:
, with initial conditions
xi(t) = φi(t) ≥ o, tt0, and φi(t0) > 0. 1 ≤ in
. We define x0(t) = xn+1(t)≡0 and suppose that φi(t), 1 ≤ in, are bounded continuous functions on [t0, + ∞) and γi, αi, ci > 0,γi,j ≥ 0, for all relevant i,j.Extending a technique of Saito, Hara and Ma[1] for n = 2 to the above system for n ≥ 2, we offer sufficient conditions for permanence and global asymptotic stability of the solutions which improve the well-known result of Gopalsamy.  相似文献   

14.
Complexity results for scheduling tasks with discrete starting times     
Kazuo Nakajima  S. Louis Hakimi 《Journal of Algorithms in Cognition, Informatics and Logic》1982,3(4):344-361
Suppose that n independent tasks are to be scheduled without preemption on a set of identical parallel processors. Each task Ti requires a given execution time τi and it may be started for execution on any processor at any of its prescribed starting times si1, si2, …, siki, with kik for some fixed integer k. We first prove that the problem of finding a feasible schedule on a single processor is NP-complete in the strong sense even when τi ε {τ, τ′} and ki ≤ 3 for 1 ≤ in. The same problem is, however, shown to be solvable in O(n log n) time, provided sikisi1 < τi for 1 ≤ in. We then show that the problem of finding a feasible schedule on an arbitrary number of processors is strongly NP-complete even when τi ε {τ, τ′}, ki = 2 and si2si1 = δ < τi for 1 ≤ in. Finally a special case with ki = 2 and si2si1 = 1, 1 ≤ in, of the above multiprocessor scheduling problem is shown to be solvable in polynomial time.  相似文献   

15.
Text Indexing and Dictionary Matching with One Error     
Amihood Amir  Dmitry Keselman  Gad M. Landau  Moshe Lewenstein  Noa Lewenstein  Michael Rodeh 《Journal of Algorithms in Cognition, Informatics and Logic》2000,37(2)
The indexing problem is where a text is preprocessed and subsequent queries of the form “Find all occurrences of pattern P in the text” are answered in time proportional to the length of the query and the number of occurrences. In the dictionary matching problem a set of patterns is preprocessed and subsequent queries of the form “Find all occurrences of dictionary patterns in text T” are answered in time proportional to the length of the text and the number of occurrences.There exist efficient worst-case solutions for the indexing problem and the dictionary matching problem, but none that find approximate occurrences of the patterns, i.e., where the pattern is within a bound edit (or Hamming) distance from the appropriate text location.In this paper we present a uniform deterministic solution to both the indexing and the general dictionary matching problem with one error. We preprocess the data in time O(n log2 n), where n is the text size in the indexing problem and the dictionary size in the dictionary matching problem. Our query time for the indexing problem is O(m log n log log n + tocc), where m is the query string size and tocc is the number of occurrences. Our query time for the dictionary matching problem is O(n log3 d log log d + tocc), where n is the text size and d the dictionary size. The time bounds above apply to both bounded and unbounded alphabets.  相似文献   

16.
Lower bounds for the cardinality of minimal blocking sets in projective spaces     
Martin Bokler   《Discrete Mathematics》2003,270(1-3):13-31
In this paper new lower bounds for the cardinality of minimal m-blocking sets are determined. Let r2(q) be the number such that q+r2(q)+1 is the cardinality of the smallest non-trivial line-blocking set in a plane of order q. If B is a minimal m-blocking set in PG(n,q) that contains at most qm+qm−1+…+q+1+r2(q)·(∑i=2mnm−1qi) points for an integer n′ satisfying mn′2m, then the dimension of B is at most n′. If the dimension of B is n′, then the following holds. The cardinality of B equals qm+qm−1+…+q+1+r2(q)(∑i=2mnm−1qi). For n′=m the set B is an m-dimensional subspace and for n′=m+1 the set B is a cone with an (m−2)-dimensional vertex over a non-trivial line-blocking set of cardinality q+r2(q)+1 in a plane skew to the vertex. This result is due to Heim (Mitt. Math. Semin. Giessen 226 (1996), 4–82). For n′>m+1 and q not a prime the number q is a square and for q16 the set B is a Baer cone. If q is odd and |B|<qm+qm−1+…+q+1+r2(q)(qm−1+qm−2), it follows from this result that the subspace generated by B has dimension at most m+1. Furthermore we prove that in this case, if , then B is an m-dimensional subspace or a cone with an (m−2)-dimensional vertex over a non-trivial line-blocking set of cardinality q+r2(q)+1 in a plane skew to the vertex. For q=p3h, p7 and q not a square we show this assertion for |B|qm+qm−1+…+q+1+q2/3·(qm−1+…+1).  相似文献   

17.
Cyclic Difference Packing and Covering Arrays     
Jianxing?YinEmail author 《Designs, Codes and Cryptography》2005,37(2):281-292
Let n and k be positive integers. Let Cq be a cyclic group of order q. A cyclic difference packing (covering) array, or a CDPA(k, n; q) (CDCA(k, n; q)), is a k × n array (aij) with entries aij (0 ≤ ik−1, 0 ≤ jn−1) from Cq such that, for any two rows t and h (0 ≤ t < hk−1), every element of Cq occurs in the difference list at most (at least) once. When q is even, then nq−1 if a CDPA(k, n; q) with k ≥ 3 exists, and nq+1 if a CDCA(k, n; q) with k ≥ 3 exists. It is proved that a CDCA(4, q+1; q) exists for any even positive integers, and so does a CDPA(4, q−1; q) or a CDPA(4, q−2; q). The result is established, for the most part, by means of a result on cyclic difference matrices with one hole, which is of interest in its own right.  相似文献   

18.
Efficient Computation of Rectilinear Geodesic Voronoi Neighbor in the Presence of Obstacles     
Pinaki Mitra  Subhas C. Nandy 《Journal of Algorithms in Cognition, Informatics and Logic》1998,28(2):315-338
In this paper we present an algorithm to compute the rectilinear geodesic voronoi neighbor of an arbitrary query pointqamong a setSofmpoints in the presence of a set ofnvertical line segment obstacles inside a rectangular floor. The distance between a pair of points α and β is the shortest rectilinear distance avoiding the obstacles in and is denoted by δ(α, β). The rectilinear geodesic voronoi neighbor of an arbitrary query pointq,RGVN(q) is the pointpiSsuch that δ(q, pi) is minimum. The algorithm suggests a preprocessing of the elements of the setsSand inO((m + n)log(m + n)) time such that for an arbitrary query pointq, theRGVNquery can be answered inO(log(m + n)) time. The space required for storing the preprocessed information isO(n + m log m). If the points inSare placed on the boundary of the rectangular floor, a different technique is adopted to decrease the space complexity toO(m + n). This technique works even if the obstacles are rectangles instead of line segments. Finally, the parallelization of the preprocessing steps for the latter algorithm is suggested, which takesO(log3(m + n)) time, usingO((m + n)1.5/log2(m + n)) processors andO(log(m + n)) query time.  相似文献   

19.
On the evaluation of the Eigenvalues of a banded toeplitz block matrix     
Dario Bini  Victor Pan 《Journal of Complexity》1991,7(4)
Let A = (aij) be an n × n Toeplitz matrix with bandwidth k + 1, K = r + s, that is, aij = aji, i, J = 1,… ,n, ai = 0 if i > s and if i < -r. We compute p(λ)= det(A - λI), as well as p(λ)/p′(λ), where p′(λ) is the first derivative of p(λ), by using O(k log k log n) arithmetic operations. Moreover, if ai are m × m matrices, so that A is a banded Toeplitz block matrix, then we compute p(λ), as well as p(λ)/p′(λ), by using O(m3k(log2 k + log n) + m2k log k log n) arithmetic operations. The algorithms can be extended to the computation of det(A − λB) and of its first derivative, where both A and B are banded Toeplitz matrices. The algorithms may be used as a basis for iterative solution of the eigenvalue problem for the matrix A and of the generalized eigenvalue problem for A and B.  相似文献   

20.
A recursive algorithm for the infinity-norm fixed point problem     
Spencer Shellman  K. Sikorski   《Journal of Complexity》2003,19(6):799-834
We present the PFix algorithm for the fixed point problem f(x)=x on a nonempty domain [a,b], where d1, , and f is a Lipschitz continuous function with respect to the infinity norm, with constant q1. The computed approximation satisfies the residual criterion , where >0. In general, the algorithm requires no more than ∑i=1dsi function component evaluations, where s≡max(1,log2(||ba||/))+1. This upper bound has order as →0. For the domain [0,1]d with <0.5 we prove a stronger result, i.e., an upper bound on the number of function component evaluations is , where r≡log2(1/). This bound approaches as r→∞ (→0) and as d→∞. We show that when q<1 the algorithm can also compute an approximation satisfying the absolute criterion , where x* is the unique fixed point of f. The complexity in this case resembles the complexity of the residual criterion problem, but with tolerance (1−q) instead of . We show that when q>1 the absolute criterion problem has infinite worst-case complexity when information consists of function evaluations. Finally, we report several numerical tests in which the actual number of evaluations is usually much smaller than the upper complexity bound.  相似文献   

  首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
Anm×nmatrix =(ai, j), 1≤imand 1≤jn, is called atotally monotonematrix if for alli1, i2, j1, j2, satisfying 1≤i1<i2m, 1≤j1<j2n.[formula]We present an[formula]time algorithm to select thekth smallest item from anm×ntotally monotone matrix for anykmn. This is the first subquadratic algorithm for selecting an item from a totally monotone matrix. Our method also yields an algorithm of the same time complexity for ageneralized row-selection problemin monotone matrices. Given a setS={p1,…, pn} ofnpoints in convex position and a vectork={k1,…, kn}, we also present anO(n4/3logc n) algorithm to compute thekith nearest neighbor ofpifor everyin; herecis an appropriate constant. This algorithm is considerably faster than the one based on a row-selection algorithm for monotone matrices. If the points ofSare arbitrary, then thekith nearest neighbor ofpi, for allin, can be computed in timeO(n7/5 logc n), which also improves upon the previously best-known result.  相似文献   

2.
The n-widths of the unit ball Ap of the Hardy space Hp in Lq( −1, 1) are determined asymptotically. It is shown that for 1 ≤ q < p ≤∞ there exist constants k1 and k2 such that [formula]≤ dn(Ap, Lq(−1, 1)),dn(Ap, Lq(−1, 1)), δn(Ap, Lq(−1, 1))[formula]where dn, dn, and δn denote the Kolmogorov, Gel′fand and linear n-widths, respectively. This result is an improvement of estimates previously obtained by Burchard and Höllig and by the author.  相似文献   

3.
Let D(G) be the minimum quantifier depth of a first order sentence Φ that defines a graph G up to isomorphism. Let D0(G) be the version of D(G) where we do not allow quantifier alternations in Φ. Define q0(n) to be the minimum of D0(G) over all graphs G of order n.We prove that for all n we have
log*n−log*log*n−2≤q0(n)≤log*n+22,
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号