首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 234 毫秒
1.
This paper examines the time for computing integer powers of a class of polynomials in one or several variables. A member f of the class of “sparse” polynomials can be characterized by the number of nonzero terms, t, in the representation of f. Where, for power 4, the most obvious methods result in multiplications, a method is presented which requires fewer than multiplications. This algorithm requires, for t » n » 1 about tn/n! + O(tn ? 1 /(2(n ? 2)!)) multiplications, which is proved to be a lower-bound on the computation.  相似文献   

2.
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O( · n 2) field elements, where is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.  相似文献   

3.
A stable algorithm for reducing a symmetric, non-definite matrix of ordern to tridiagonal form, involving aboutn 3/6 additions and multiplications is presented.  相似文献   

4.
Let A be an n × n symmetric matrix of bandwidth 2m + 1. The matrix need not be positive definite. In this paper we will present an algorithm for factoring A which preserves symmetry and the band structure and limits element growth in the factorization. With this factorization one may solve a linear system with A as the coefficient matrix and determine the inertia of A, the number of positive, negative, and zero eigenvalues of A. The algorithm requires between 1/2nm2 and 5/4nm2 multiplications and at most (2m + 1)n locations compared to non‐symmetric Gaussian elimination which requires between nm2 and 2nm2 multiplications and at most (3m + 1)n locations. Our algorithm reduces A to block diagonal form with 1 × 1 and 2 × 2 blocks on the diagonal. When pivoting for stability and subsequent transformations produce non‐zero elements outside the original band, column/row transformations are used to retract the bandwidth. To decrease the operation count and the necessary storage, we use the fact that the correction outside the band is rank‐1 and invert the process, applying the transformations that would restore the bandwidth first, followed by a modified correction. This paper contains an element growth analysis and a computational comparison with LAPACKs non‐symmetric band routines and the Snap‐back code of Irony and Toledo. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

5.
We show lower bounds on the worst-case complexity of Shellsort. In particular, we give a fairly simple proof of an Ω(n (lg2 n)/(lg lg n)2) lower bound for the size of Shellsort sorting networks for arbitrary increment sequences. We also show an identical lower bound for the running time of Shellsort algorithms, again for arbitrary increment sequences. Our lower bounds establish an almost tight trade-off between the running time of a Shellsort algorithm and the length of the underlying increment sequence.  相似文献   

6.
The space of range-equivalence classes of full orthogonal multiplications F: ℝ n ×ℝ n →ℝ p , npn 2, is shown to be a compact convex body lying in so(n)⊗so(n). Furthermore, the dimension of the space of equivalence classes is determined to be (n 2(n−1)2)/4−n(n−1).  相似文献   

7.
Summary The set of all Hankel (or Toeplitz) matrices of dimensionn, is shown to possess tensorial bases: bases made ofn rank one matrices. Four families of such tensorial bases are possible. From this result, we deduce that the following computations can be performed with a number of multiplications of ordern instead of ordern 2: evaluation of the 2n+1 coefficients of the polynomial product of two polynomials of degreen, evaluation of the inverse of a lower triangular toeplitz matrix, evaluation of the quotient and of the remainder in the division of a polynomial of degree 2n by a polynomial of degreen.  相似文献   

8.
Montgomery's algorithm [8], hereafter denotedM n(...,...), is a process for computingM n (A, B)=ABN modn whereN is a constant factor depending only onn.Usually,A B modn is obtained byM n (M n (A, B),N –2 modn) but in this article, we introduce an alternative approach consisting in pre-integratingN into cryptographic keys so that a singleM n(...,...) will replace directly each modular multiplication.Except the advantage of halving the number of Montgomery multiplications, our strategy skips the precalculation (and the storage) of the constantN –2 modn and turns to be particularly efficient when a hardware device implementingM n(...,...) is the basic computational tool at one's command.  相似文献   

9.
We propose a periodic B-spline quasi-interpolation for multivariate functions on sparse grids and develop a fast scheme for the evaluation of a linear combination of B-splines on sparse grids. We prove that both of these operations require only O(nlogd−1n) number of multiplications, where n is the number of univariate B-spline basis functions used in each coordinate direction and d is the number of variables of the functions. We also establish the optimal approximation order of the periodic B-spline quasi-interpolation. Numerical examples are presented to confirm the theoretical estimates.  相似文献   

10.
Let ℬ be a set ofn arbitrary (possibly intersecting) convex obstacles in ℝ d . It is shown that any two points which can be connected by a path avoiding the obstacles can also be connected by a path consisting ofO(n (d−1)[d/2+1]) segments. The bound cannot be improved below Ω(n d ); thus, in ℝ3, the answer is betweenn 3 andn 4. For open disjoint convex obstacles, a Θ(n) bound is proved. By a well-known reduction, the general case result also upper bounds the complexity for a translational motion of an arbitrary convex robot among convex obstacles. Asymptotically tight bounds and efficient algorithms are given in the planar case. This research was supported by The Netherlands' Organization for Scientific Research (NWO) and partially by the ESPRIT III Basic Research Action 6546 (PROMotion). J. M. acknowledges support by a Humboldt Research Fellowship. Part of this research was done while he visited Utrecht University.  相似文献   

11.
We present an algorithm for constructing stable local bases for the spaces rd(Δ) of multivariate polynomial splines of smoothness r1 and degree dr2n+1 on an arbitrary triangulation Δ of a bounded polyhedral domain Ω n, n2.  相似文献   

12.
This paper proves an important topological characterization of C-manifolds and especially of arbitrary finite dimensional Cn-manifolds and arbitrary C∞-BANACH manifolds. Whereas differentiability structures in the usual sense may be proper classes this characterization always enables a definition of differentiability structures as sets. Further this characterization suggests a suitable generalization of the notion of differentiable manifold which we call Cn-manifold. C n-manifolds have a lot of better properties than Cn-manifolds and may be useful therefore in physics and technics. Some examples of C n-manifolds are given in the last two sections defined by means of certain geometric structures.  相似文献   

13.
Let A kbe the group of isometries of the space of n-by-n matrices over reals (resp. complexes, quaternions) with respect to the Ky Fan k-norm (see the Introduction for the definitions). Let Γ0 be the group of transformations of this space consisting of all products of left and right multiplications by the elements of SO(n)(resp. U(n), Sp(n)). It is shown that, except for three particular casesAk coincides with the normalizer of Γ in Δ group of isometries of the above matrix space with respect to the standard inner product. We also give an alternative treatment of the case D = R n = 4k = 2 which was studied in detail by Johnson, Laffey, and Li [4].  相似文献   

14.
We show that an arbitrary “connectionist” model of n neutrons, defined by an n X n real matrix, can be simulated by a system of O(n3log n) Boolean gates with an O(log n) time slow-down factor. This establishes that, even though n2 real numbers possibly of high precision are required to define it, connectionist models do not possess any basic properties different from those of other (nonuniform) highly parallel hardware models.  相似文献   

15.
In their seminal paper on geometric minimum spanning trees, Monma and Suri (1992) [31] showed how to embed any tree of maximum degree 5 as a minimum spanning tree in the Euclidean plane. The embeddings provided by their algorithm require area O(n22O(n22) and the authors conjectured that an improvement below cn×cn is not possible, for some constant c>0. In this paper, we show how to construct MST embeddings of arbitrary trees of maximum degree 3 and 4 within polynomial area.  相似文献   

16.
Verifiable Partial Escrow of Integer Factors   总被引:1,自引:0,他引:1  
We construct an efficient interactive protocol for realizing verifiable partial escrow of the factors of an integer n with time-delayed and threshold key recovery features. The computational cost of the new scheme amounts to 10k P multiplications of numbers of size of P, where P is a protocol parameter which permits n of size up to ( P) - 4 to be dealt with and k is a security parameter which controls the error probability for correct key escrow under 1/2k. The new scheme realizes a practical method for fine tuning the time complexity for factoring an integer, where the complexity tuning has no respect to the size of the integer.  相似文献   

17.
18.
This paper studies a multicast problem arising in wavelength division multiplexing single-hop lightwave networks, as well as in Video-on-Demand systems. In this problem, the same message of duration Δ has to be transmitted to a set of n receivers which are not all available simultaneously. The receivers can be partitioned into subsets, each served by a different transmission, with the objective of minimizing their overall waiting cost. When there is a single data channel available for transmission, a dynamic programming algorithm is devised which finds an optimal solution in O(nlogn+min{n2,nΔ2}) time, improving over a previously known O(n3) time algorithm. When multiple data channels are available for transmission, an optimal O(n) time algorithm is proposed which finds an optimal solution if the message has constant transmission duration, whereas an NP-completeness proof is given if the message has arbitrary transmission duration.  相似文献   

19.
Taking the m-power of an entry is a well-defined operation on the unimodular vectors in An modulo addition operations, if n is at least 3, for an arbitrary commutative ring A and any integer m.  相似文献   

20.
A congruency theorem is proven for an ordered pair of groups of homeomorphisms of a metric space satisfying an abstract dilation-translation relationship. A corollary is the existence of wavelet sets, and hence of single-function wavelets, for arbitrary expansive matrix dilations on L 2 ( n). Moreover, for any expansive matrix dilation, it is proven that there are sufficiently many wavelet sets to generate the Borel structure of n. The second author is supported in part by NSF Grant DMS-9401544. The third author was a Graduate Research Assistant at Workshop in Linear Analysis and Probability, Texas A&M University.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号