首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
If A=(Aij)1?i,j?nB(X) is an upper triangular Banach space operator such that AiiAij=AijAjj for all 1?i?j?n, then A has SVEP or satisfies (Dunford's) condition (C) or (Bishop's) property (β) or (the decomposition) property (δ) if and only if Aii, 1?i?n, has the corresponding property.  相似文献   

2.
The inclusion relations between the Lp-Sobolev spaces and the modulation spaces is determined explicitly. As an application, mapping properties of unimodular Fourier multiplier eiα|D| between Lp-Sobolev spaces and modulation spaces are discussed.  相似文献   

3.
Recently, Sloane suggested the following problem: We are given n boxes, labeled 1,2,…,n. For i=1,…,n, box i weighs (m-1)i grams (where m?2 is a fixed integer) and box i can support a total weight of i grams. What is the number of different ways to build a single stack of boxes in which no box will be squashed by the weight of the boxes above it? Prior to this generalized problem, Sloane and Sellers solved the case m=2. More recently, Andrews and Sellers solved the case m?3. In this note we give new and simple proofs of the results of Sloane and Sellers and of Andrews and Sellers, using a known connection with m-ary partitions.  相似文献   

4.
The problem addressed in this paper is to compare the minimum cost of the two randomized control policies in the M/G/1 queueing system with an unreliable server, a second optional service, and general startup times. All arrived customers demand the first required service, and only some of the arrived customers demand a second optional service. The server needs a startup time before providing the first required service until the system becomes empty. After all customers are served in the queue, the server immediately takes a vacation and the system operates the (T, p)-policy or (p, N)-policy. For those two policies, the expected cost functions are established to determine the joint optimal threshold values of (T, p) and (p, N), respectively. In addition, we obtain the explicit closed form of the joint optimal solutions for those two policies. Based on the minimal cost, we show that the optimal (p, N)-policy indeed outperforms the optimal (T, p)-policy. Numerical examples are also presented for illustrative purposes.  相似文献   

5.
For a positive integer k, a k-packing in a graph G is a subset A of vertices such that the distance between any two distinct vertices from A is more than k. The packing chromatic number of G is the smallest integer m such that the vertex set of G can be partitioned as V1,V2,…,Vm where Vi is an i-packing for each i. It is proved that the planar triangular lattice T and the three-dimensional integer lattice Z3 do not have finite packing chromatic numbers.  相似文献   

6.
We prove that II1 factors M have a unique (up to unitary conjugacy) cross-product type decomposition around “core subfactors” NM satisfying the property HT of [S. Popa, On a class of type II1 factors with Betti numbers invariants, Ann. of Math. (2) 163 (2006) 809-899] and a certain “torsion freeness” condition. In particular, this shows that isomorphism of factors of the form Lαi(Z2)?Fni, i=1,2, for FniSL(2,Z) free groups of rank ni and αj=e2πitj, tjQ, implies n1=n2.  相似文献   

7.
This paper analyzes the F-policy M/M/1/K queueing system with working vacation and an exponential startup time. The F-policy deals with the issue of controlling arrivals to a queueing system, and the server requires a startup time before allowing customers to enter the system. For the queueing systems with working vacation, the server can still provide service to customers rather than completely stop the service during a vacation period. The matrix-analytic method is applied to develop the steady-state probabilities, and then obtain several system characteristics. We construct the expected cost function and formulate an optimization problem to find the minimum cost. The direct search method and Quasi-Newton method are implemented to determine the optimal system capacity K, the optimal threshold F and the optimal service rates (μB,μV) at the minimum cost. A sensitivity analysis is conducted to investigate the effect of changes in the system parameters on the expected cost function. Finally, numerical examples are provided for illustration purpose.  相似文献   

8.
Let i1i2i3≥1 be integers. An L(i1,i2,i3)-labelling of a graph G=(V,E) is a mapping ?:V→{0,1,2,…} such that |?(u)−?(v)|≥it for any u,vV with d(u,v)=t, t=1,2,3, where d(u,v) is the distance in G between u and v. The integer ?(v) is called the label assigned to v under ?, and the difference between the largest and the smallest labels is called the span of ?. The problem of finding the minimum span, λi1,i2,i3(G), over all L(i1,i2,i3)-labellings of G arose from channel assignment in cellular communication systems, and the related problem of finding the minimum number of labels used in an L(i1,i2,i3)-labelling was originated from recent studies on the scalability of optical networks. In this paper we study the L(i1,i2,i3)-labelling problem for hypercubes Qd (d≥3) and obtain upper and lower bounds on λi1,i2,i3(Qd) for any (i1,i2,i3).  相似文献   

9.
Inspired by the classic γ-spline, we propose a method for constructing a G2 rational γ-spline curve that interpolates a given set of distinct ordered data-points (planar or spatial). The only input of our method is just these data-points. We also present a procedure to solve the key problem of determining the tension parameters γi which are computed in terms of exponential functions that determine the eccentricities of the common conic osculants at the junction points while keeping in geometrical agreement with data-points. This allows the resulting curve to be modified in the close vicinity of each data-point.  相似文献   

10.
A subset X of an abelian group Γ, written additively, is a Sidon set of orderh if whenever {(ai,mi):iI} and {(bj,nj):jJ} are multisets of size h with elements in X and ∑iImiai=∑jJnjbj, then {(ai,mi):iI}={(bj,nj):jJ}. The set X is a generalized Sidon set of order(h,k) if whenever two such multisets have the same sum, then their multiset intersection has size at least k. It is proved that if X is a generalized Sidon set of order (2h−1,h−1), then the maximal Sidon sets of order h contained in X have the same cardinality. Moreover, X is a matroid where the independent subsets of X are the Sidon sets of order h.  相似文献   

11.
Maria Monks 《Discrete Mathematics》2009,309(16):5196-1883
All continuous endomorphisms f of the shift dynamical system S on the 2-adic integers Z2 are induced by some , where n is a positive integer, Bn is the set of n-blocks over {0, 1}, and f(x)=y0y1y2… where for all iN, yi=f(xixi+1xi+n−1). Define D:Z2Z2 to be the endomorphism of S induced by the map {(00,0),(01,1),(10,1),(11,0)} and V:Z2Z2 by V(x)=−1−x. We prove that D, V°D, S, and V°S are conjugate to S and are the only continuous endomorphisms of S whose parity vector function is solenoidal. We investigate the properties of D as a dynamical system, and use D to construct a conjugacy from the 3x+1 function T:Z2Z2 to a parity-neutral dynamical system. We also construct a conjugacy R from D to T. We apply these results to establish that, in order to prove the 3x+1 conjecture, it suffices to show that for any mZ+, there exists some nN such that R−1(m) has binary representation of the form or .  相似文献   

12.
We give explicit constructions of sets S with the property that for each integer k, there are at most g solutions to k=s1+s2,siS; such sets are called Sidon sets if g=2 and generalized Sidon sets if g?3. We extend to generalized Sidon sets the Sidon-set constructions of Singer, Bose, and Ruzsa. We also further optimize Kolountzakis’ idea of interleaving several copies of a Sidon set, extending the improvements of Cilleruelo, Ruzsa and Trujillo, Jia, and Habsieger and Plagne. The resulting constructions yield the largest known generalized Sidon sets in virtually all cases.  相似文献   

13.
Pavol Hell 《Discrete Mathematics》2009,309(18):5703-5373
A sequence 〈d1,d2,…,dn〉 of non-negative integers is graphical if it is the degree sequence of some graph, that is, there exists a graph G on n vertices whose ith vertex has degree di, for 1≤in. The notion of a graphical sequence has a natural reformulation and generalization in terms of factors of complete graphs.If H=(V,E) is a graph and g and f are integer-valued functions on the vertex set V, then a (g,f)-factor of H is a subgraph G=(V,F) of H whose degree at each vertex vV lies in the interval [g(v),f(v)]. Thus, a (0,1)-factor is just a matching of H and a (1, 1)-factor is a perfect matching of H. If H is complete then a (g,f)-factor realizes a degree sequence that is consistent with the sequence of intervals 〈[g(v1),f(v1)],[g(v2),f(v2)],…,[g(vn),f(vn)]〉.Graphical sequences have been extensively studied and admit several elegant characterizations. We are interested in extending these characterizations to non-graphical sequences by introducing a natural measure of “near-graphical”. We do this in the context of minimally deficient (g,f)-factors of complete graphs. Our main result is a simple linear-time greedy algorithm for constructing minimally deficient (g,f)-factors in complete graphs that generalizes the method of Hakimi and Havel (for constructing (f,f)-factors in complete graphs, when possible). It has the added advantage of producing a certificate of minimum deficiency (through a generalization of the Erdös-Gallai characterization of (f,f)-factors in complete graphs) at no additional cost.  相似文献   

14.
We introduce a frame cellular automaton as a broad generalization of an earlier study on quasigroup-defined cellular automata. It consists of a triple (F,R,EF) where, for a given finite set X of cells, the frame F is a family of subsets of X (called elementary frames, denoted Si, i=1,…,n), which is a cover of X. A matching configuration is a map which attributes to each cell a state in a finite set G under restriction of a set of local rules R={Rii=1,…n}, where Ri holds in the elementary frame Si and is determined by an (|Si|-1)-ary quasigroup over G. The frame associated map EF models how a matching configuration can be grown iteratively from a certain initial cell-set. General properties of frames and related matroids are investigated. A generating set SX is a set of cells such that there is a bijection between the collection of matching configurations and GS. It is shown that for certain frames, the algebraically defined generating sets are bases of a related geometric-combinatorially defined matroid.  相似文献   

15.
We prove that for every graph H with the minimum degree δ?5, the third iterated line graph L3(H) of H contains as a minor. Using this fact we prove that if G is a connected graph distinct from a path, then there is a number kG such that for every i?kG the i-iterated line graph of G is -linked. Since the degree of Li(G) is even, the result is best possible.  相似文献   

16.
Let G be a graph of order n and S be a vertex set of q vertices. We call G,S-pancyclable, if for every integer i with 3≤iq there exists a cycle C in G such that |V(C)∩S|=i. For any two nonadjacent vertices u,v of S, we say that u,v are of distance two in S, denoted by dS(u,v)=2, if there is a path P in G connecting u and v such that |V(P)∩S|≤3. In this paper, we will prove that if G is 2-connected and for all pairs of vertices u,v of S with dS(u,v)=2, , then there is a cycle in G containing all the vertices of S. Furthermore, if for all pairs of vertices u,v of S with dS(u,v)=2, , then G is S-pancyclable unless the subgraph induced by S is in a class of special graphs. This generalizes a result of Fan [G. Fan, New sufficient conditions for cycles in graphs, J. Combin. Theory B 37 (1984) 221-227] for the case when S=V(G).  相似文献   

17.
Let G=(V,E) be a finite, simple and undirected graph. For SV, let δ(S,G)={(u,v)∈E:uS and vVS} be the edge boundary of S. Given an integer i, 1≤i≤|V|, let the edge isoperimetric value of G at i be defined as be(i,G)=minSV;|S|=i|δ(S,G)|. The edge isoperimetric peak of G is defined as be(G)=max1≤j≤|V|be(j,G). Let bv(G) denote the vertex isoperimetric peak defined in a corresponding way. The problem of determining a lower bound for the vertex isoperimetric peak in complete t-ary trees was recently considered in [Y. Otachi, K. Yamazaki, A lower bound for the vertex boundary-width of complete k-ary trees, Discrete Mathematics, in press (doi:10.1016/j.disc.2007.05.014)]. In this paper we provide bounds which improve those in the above cited paper. Our results can be generalized to arbitrary (rooted) trees.The depth d of a tree is the number of nodes on the longest path starting from the root and ending at a leaf. In this paper we show that for a complete binary tree of depth d (denoted as ), and where c1, c2 are constants. For a complete t-ary tree of depth d (denoted as ) and dclogt where c is a constant, we show that and where c1, c2 are constants. At the heart of our proof we have the following theorem which works for an arbitrary rooted tree and not just for a complete t-ary tree. Let T=(V,E,r) be a finite, connected and rooted tree — the root being the vertex r. Define a weight function w:VN where the weight w(u) of a vertex u is the number of its successors (including itself) and let the weight index η(T) be defined as the number of distinct weights in the tree, i.e η(T)=|{w(u):uV}|. For a positive integer k, let ?(k)=|{iN:1≤i≤|V|,be(i,G)≤k}|. We show that .  相似文献   

18.
A circular-arc graphG is the intersection graph of a collection of arcs on the circle and such a collection is called a model of G. Say that the model is proper when no arc of the collection contains another one, it is Helly when the arcs satisfy the Helly Property, while the model is proper Helly when it is simultaneously proper and Helly. A graph admitting a Helly (resp. proper Helly) model is called a Helly (resp. proper Helly) circular-arc graph. The clique graphK(G) of a graph G is the intersection graph of its cliques. The iterated clique graphKi(G) of G is defined by K0(G)=G and Ki+1(G)=K(Ki(G)). In this paper, we consider two problems on clique graphs of circular-arc graphs. The first is to characterize clique graphs of Helly circular-arc graphs and proper Helly circular-arc graphs. The second is to characterize the graph to which a general circular-arc graph K-converges, if it is K-convergent. We propose complete solutions to both problems, extending the partial results known so far. The methods lead to linear time recognition algorithms, for both problems.  相似文献   

19.
A k-dimensional box is the Cartesian product R1×R2×?×Rk where each Ri is a closed interval on the real line. The boxicity of a graph G, denoted as , is the minimum integer k such that G can be represented as the intersection graph of a collection of k-dimensional boxes. A unit cube in k-dimensional space or a k-cube is defined as the Cartesian product R1×R2×?×Rk where each Ri is a closed interval on the real line of the form [ai,ai+1]. The cubicity of G, denoted as , is the minimum integer k such that G can be represented as the intersection graph of a collection of k-cubes. The threshold dimension of a graph G(V,E) is the smallest integer k such that E can be covered by k threshold spanning subgraphs of G. In this paper we will show that there exists no polynomial-time algorithm for approximating the threshold dimension of a graph on n vertices with a factor of O(n0.5−?) for any ?>0 unless NP=ZPP. From this result we will show that there exists no polynomial-time algorithm for approximating the boxicity and the cubicity of a graph on n vertices with factor O(n0.5−?) for any ?>0 unless NP=ZPP. In fact all these hardness results hold even for a highly structured class of graphs, namely the split graphs. We will also show that it is NP-complete to determine whether a given split graph has boxicity at most 3.  相似文献   

20.
A theorem of Scott gives an upper bound for the normalized volume of lattice polygons with exactly i>0 interior lattice points. We will show that the same bound is true for the normalized volume of lattice polytopes of degree 2 even in higher dimensions. In particular, there is only a finite number of quadratic polynomials with fixed leading coefficient being the h-polynomial of a lattice polytope.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号