首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The paper presents lower and upper bounds on the maximumnonlinearity for an n-input m-output Booleanfunction. We show a systematic construction method for a highlynonlinear Boolean function based on binary linear codes whichcontain the first order Reed-Muller code as a subcode. We alsopresent a method to prove the nonexistence of some nonlinearBoolean functions by using nonexistence results on binary linearcodes. Such construction and nonexistence results can be regardedas lower and upper bounds on the maximum nonlinearity. For somen and m, these bounds are tighter than theconventional bounds. The techniques employed here indicate astrong connection between binary linear codes and nonlinear n-input m-output Boolean functions.  相似文献   

2.
In this paper, new codes of dimension 8 are presented which give improved bounds on the maximum possible minimum distance of ternary linear codes. These codes belong to the class of quasi-twisted (QT) codes, and have been constructed using a stochastic optimization algorithm, tabu search. Twenty three codes are given which improve or establish the bounds for ternary codes. In addition, a table of upper and lower bounds for d 3(n, 8) is presented for n 200.  相似文献   

3.
Linear multistep methods (LMMs) are written as irreducible general linear methods (GLMs). A-stable LMMs are shown to be algebraically stable GLMs for strictly positive definite G-matrices. Optimal order error bounds, independent of stiffness, are derived for A-stable methods, without considering one-leg methods (OLMs). As a GLM, the OLM is shown to be the transpose of the LMM. For A-stable methods, the LMM G-matrix is the inverse of the OLM G-matrix. Examples of G-symplectic LMMs are given. AMS subject classification (2000) 65L20  相似文献   

4.
A number of important families of association schemes—such as the Hamming and Johnson schemes—enjoy the property that, in each member of the family, Delsarte t-designs can be characterised combinatorially as designs in a certain partially ordered set attached to the scheme. In this paper, we extend this characterisation to designs in a product association scheme each of whose components admits a characterisation of the above type. As a consequence of our main result, we immediately obtain linear programming bounds for a wide variety of combinatorial objects as well as bounds on the size and degree of such designs analogous to Delsarte's bounds for t-designs in Q-polynomial association schemes.  相似文献   

5.
We obtain new bounds on the parameters and we give new constructions of linear error-block codes. We obtain a Gilbert–Varshamov type construction. Using our bounds and constructions we obtain some infinite families of optimal linear error-block codes over . We also study the asymptotic of linear error-block codes. We define the real valued function α q,m,a (δ), which is an analog of the important real valued function α q (δ) in the asymptotic theory of classical linear error-correcting codes. We obtain both Gilbert–Varshamov and algebraic geometry type lower bounds on α q,m,a (δ). We compare these lower bounds in graphs.   相似文献   

6.
We study several bounds for the determinant of an n × n positive definite Hermitian matrix A. These bounds are the best possible given certain data about A. We find the best bounds in the cases that we are given: (i) the diagonal elements of A: (ii) the traces trA,tr A 2 and n and (iii)n, tr A tr A 2 and the diagonal elements of A. In case (i) we get the well known Hadamard inequality. The other bounds are Hadamard type bounds. The bounds are found using optimization techniques.  相似文献   

7.
We describe several analytical and numerical procedures to obtain bounds on the distribution function of a sum of n dependent risks having fixed overlapping marginals. As an application, we produce bounds on quantile-based risk measures for portfolios of financial and actuarial interest.  相似文献   

8.
In this paper several recurrences and formulas are presented leading to upper and lower bounds, both logarithmic, for the expected height of a node in a heap. These bounds are of interest for algorithms that select thekth smallest element in a heap.  相似文献   

9.
We present a general abstract model of local improvement, applicable to such diverse cases as principal pivoting methods for the linear complementarity problem and hill climbing in artificial intelligence. The model accurately predicts the behavior of the algorithms, and allows for a variety of probabilistic assumptions that permit degeneracy. Simulation indicates an approximately linear average number of iterations under a variety of probability assumptions. We derive theoretical bounds of 2en logn and en 2 for different distributions, respectively, as well as polynomial bounds for a broad class of probability distributions. We conclude with a discussion of the applications of the model to LCP and linear programming.The author was supported by the New Faculty Research Development Program of the Georgia Institute of Technology. This work is based on the author's Ph.D. thesis, performed under George Dantzig at Stanford 1978–81, at the Systems Optimization Laboratory. While at Stanford, research was supported in part by Department of Energy Contract AM03-76SF00326, PA #DE-AT03-76ER72018; Office of Naval Research Contract N00014-75-C-0267; National Science Foundation Grants MCS76-81259, MCS-7926009 and ECS-8012974; and Army Research Office Contract DAA29-79-C-0110. Reproduction in whole or in part is permitted for any purpose of the U.S. Government.  相似文献   

10.
We recall the known explicit upper bounds for the residue at s = 1 of the Dedekind zeta function of a number field K. Then, we improve upon these previously known upper bounds by taking into account the behavior of the prime 2 in K. We finally give several examples showing how such improvements yield better bounds on the absolute values of the discriminants of CM-fields of a given relative class number. In particular, we will obtain a 4,000-fold improvement on our previous bound for the absolute values of the discriminants of the non-normal sextic CM-fields with relative class number one.  相似文献   

11.
The first purpose of this note is to provide a proof of the usual square function estimate on Lp(Ω). It turns out to follow directly from a generic Mikhlin multiplier theorem obtained by Alexopoulos, and we provide a sketch of its proof in the Appendix for the reader’s convenience. We also relate such bounds to a weaker version of the square function estimate which is enough in most instances involving dispersive PDEs and relies on Gaussian bounds on the heat kernel (such bounds are the key to Alexopoulos’result as well). Moreover, we obtain several useful Lp(Ω;H) bounds for (the derivatives of) the heat flow with values in a given Hilbert space H.  相似文献   

12.
LINEAR PROVABLE SECURITY FOR A CLASS OF UNBALANCED FEISTEL NETWORK   总被引:2,自引:0,他引:2  
A structure iterated by the unbalanced Feistel networks is introduced. It is showed that this structure is provable resistant against linear attack. The main result of this paper is that the upper bound of r-round (r≥2m) linear hull probabilities are bounded by q^2 when around function F is bijective and the maximal linear hull probabilities of round function F is q. Application of this structure to block cipher designs brings out the provable security against linear attack with the upper bounds of probabilities.  相似文献   

13.
We give some sufficient conditions for proper lower semicontinuous functions on metric spaces to have error bounds (with exponents). For a proper convex function f on a normed space X the existence of a local error bound implies that of a global error bound. If in addition X is a Banach space, then error bounds can be characterized by the subdifferential of f. In a reflexive Banach space X, we further obtain several sufficient and necessary conditions for the existence of error bounds in terms of the lower Dini derivative of f. Received: April 27, 2001 / Accepted: November 6, 2001?Published online April 12, 2002  相似文献   

14.
We show that a particular pivoting algorithm, which we call the lexicographic Lemke algorithm, takes an expected number of steps that is bounded by a quadratic inn, when applied to a random linear complementarity problem of dimensionn. We present two probabilistic models, both requiring some nondegeneracy and sign-invariance properties. The second distribution is concerned with linear complementarity problems that arise from linear programming. In this case we give bounds that are quadratic in the smaller of the two dimensions of the linear programming problem, and independent of the larger. Similar results have been obtained by Adler and Megiddo.Research partially funded by a fellowship from the Alfred Sloan Foundation and by NSF Grant ECS82-15361.  相似文献   

15.
Complexity measures for sequences over finite fields, such as the linear complexity and the k-error linear complexity, play an important role in cryptology. Recent developments in stream ciphers point towards an interest in word-based stream ciphers, which require the study of the complexity of multisequences. We introduce various options for error linear complexity measures for multisequences. For finite multisequences as well as for periodic multisequences with prime period, we present formulas for the number of multisequences with given error linear complexity for several cases, and we present lower bounds for the expected error linear complexity.  相似文献   

16.
Variants of Karmarkar's algorithm are given for solving linear programs with unknown optimal objective valuez *. These new methods combine the approach of Goldfarb and Mehrotra for relaxing the requirement that certain projections be computed exactly with the approach of Todd and Burrell for generating an improving sequence of lower bounds forz * using dual feasible solutions. These methods retain the polynomial-time complexity of Karmarkar's algorithm.This research was supported in part by NSF Grants DMS-85-12277 and CDR-84-21402, and ONR Contract N0014-87-K0214.  相似文献   

17.
The linear complexity of sequences is one of the important security measures for stream cipher systems. Recently, in the study of vectorized stream cipher systems, the joint linear complexity of multisequences has been investigated. By using the generalized discrete Fourier transform for multisequences, Meidl and Niederreiter determined the expectation of the joint linear complexity of random N-periodic multisequences explicitly. In this paper, we study the expectation and variance of the joint linear complexity of random periodic multisequences. Several new lower bounds on the expectation of the joint linear complexity of random periodic multisequences are given. These new lower bounds improve on the previously known lower bounds on the expectation of the joint linear complexity of random periodic multisequences. By further developing the method of Meidl and Niederreiter, we derive a general formula and a general upper bound for the variance of the joint linear complexity of random N-periodic multisequences. These results generalize the formula and upper bound of Dai and Yang for the variance of the linear complexity of random periodic sequences. Moreover, we determine the variance of the joint linear complexity of random periodic multisequences with certain periods.  相似文献   

18.
The conjugate gradient method is one of the most popular iterative methods for computing approximate solutions of linear systems of equations with a symmetric positive definite matrix A. It is generally desirable to terminate the iterations as soon as a sufficiently accurate approximate solution has been computed. This paper discusses known and new methods for computing bounds or estimates of the A-norm of the error in the approximate solutions generated by the conjugate gradient method.  相似文献   

19.
In the general linear model consider the designing problem for the Gauß-Markov estimator or for the least squares estimator when the observations are correlated. Determinant formulas are proved being useful for theD-criterion. They allow, for example, a (nearly) elementary proof and a generalization of recent results for an important linear model with multiple response. In the second part of the paper the determinant formulas are used for deriving lower bounds for the efficiency of a design. These bounds are applied in examples for tridiagonal covariance matrices. For these examples maximin designs are determined.Parts of the paper are based on a part of the author's Habilitationsschrift Bischoff (1993a).  相似文献   

20.
This paper deals with an extension of energetic reasoning, using some efficient lower bounds of the bin-packing problem, to get tight lower bounds for the P|r i , q i |C max. The link between P||C max and bin-packing problem is well-known. Our purpose is to extend the use of efficient lower bounds of the bin-packing problem to P|r i , q i |C max. We focus on some time-intervals, to compute the mandatory parts of activities within this time-interval and then to deduce an associated bin-packing instance. Thus, lower bounds of the bin-packing problem are used to get new satisfiability tests for the parallel machine problem. We also propose to extend the classical time-bound adjustments of release dates and deadlines to efficiently use bin-packing lower bounds. Experimental results that prove the efficiency of our approach on several kind of instances are reported.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号