首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A new approach for implementation of the counting function for a Boolean set is proposed. The approach is based on approximate calculation of sums. Using this approach, new upper bounds for the size and depth of symmetric functions over the basis B2 of all dyadic functions and over the standard basis B0 = {∧, ∨,- } were non-constructively obtained. In particular, the depth of multiplication of n-bit binary numbers is asymptotically estimated from above by 4.02 log2n relative to the basis B2 and by 5.14log2n relative to the basis B0.  相似文献   

2.
Realization of Boolean functions by circuits of functional elements is considered over arbitrary complete bases (including infinite ones). The depth of a circuit means the maximal number of functional elements forming an oriented chain going from inputs of the circuit to its output. It is shown that for any basis B the growth order of the Shannon function of depth D B (n) for n → ∞ is equal to 1, log2 n, or n, and the latter case appears if and only if the basis B is finite.  相似文献   

3.
Realization of Boolean functions by circuits is considered over an arbitrary infinite complete basis. The depth of a circuit is defined as the greatest number of functional elements constituting a directed path from an input of the circuit to its output. The Shannon function of the depth is defined for a positive integer n as the minimal depth D B (n) of the circuits sufficient to realize every Boolean function on n variables over a basis B. It is shown that, for each infinite basis B, either there exists a constant β ? 1 such that D B (n) = β for all sufficiently large n or there exist an integer constant γ ? 2 and a constant δ such that log γ n ? D B (n) ? log γ n + δ for all n.  相似文献   

4.
We consider a model of delays in networks of functional elements in an arbitrary finite complete basis B, where the delays of basis elements are arbitrary positive real numbers for each input and each input set of variables going to the remaining inputs. This model estimates the delays in a multiplexer function of nth order asymptotically as τB n ± O(logn), where τB is a constant depending only on the basis B. On the basis of these estimates and within this model, asymptotic estimates of the form τB n ± O(logn) are obtained for the corresponding Shannon function, i.e., for the delay of the “worst” Boolean algebra function of given n variables.  相似文献   

5.
A class of circuits of functional elements over the standard basis of the conjunction, disjunction, and negation elements is considered. For each circuit Σ in this class, its depth D(Σ) and dimension R(Σ) equal to the minimum dimension of the Boolean cube allowing isomorphic embedding Σ are defined. It is established that for n = 1, 2,… and an arbitrary Boolean function f of n variables there exists a circuit Σf for implementing this function such that Rf) ? n ? log2 log2n + O(1) and Df) ? 2n ? 2 log2 log2n + O(1). It is proved that for n = 1, 2,… almost all functions of n variables allow implementation by circuits of the considered type, whose depth and dimension differ from the minimum values of these parameters (for all equivalent circuits) by no more than a constant and asymptotically no more than by a factor of 2, respectively.  相似文献   

6.
We prove that the complexity of the implementation of the counting function of n Boolean variables by binary formulas is at most n 3.03, and it is at most n 4.47 for DeMorgan formulas. Hence, the same bounds are valid for the formula size of any threshold symmetric function of n variables, particularly, for the majority function. The following bounds are proved for the formula size of any symmetric Boolean function of n variables: n 3.04 for binary formulas and n 4.48 for DeMorgan ones. The proof is based on the modular arithmetic.  相似文献   

7.
We consider realization of Boolean functions by the circuits composed of unreliable elements in a complete basis B ? B 3 (with B 3 the set of all Boolean functions of three variables x 1, x 2, and x 3). We assume that, with probability ? ∈ (0, 1/2), all elements of a circuit are independently subjected to inverse failures at outputs. All bases are found in which it is possible to realize almost all Boolean functions by the circuits asymptotically optimal in reliability and functioning with unreliability 3? as ? → 0. It is proved that there are no other bases B ? B 3 like these.  相似文献   

8.
It is constructively established in the paper that in the case of constant faults on outputs of elements any Boolean function of n variables may be implemented by a circuit of functional elements in some infinite basis admitting a unitary diagnostic test whose length does not exceed 2 log2?n + 1? + 1.  相似文献   

9.
A delay model for schemes of functional elements in arbitrary finite complete basis B is studied; in the model, delays of the basic element are given by random positive real numbers for each input and each input set of variables entering other inputs. Asymptotic estimates in the form τB n ± O(logn), where τB is a constant that depends only on basis B, are obtained for the delay of the multiplex function of order n. Based on these estimates, asymptotic estimates of the form τB n ± O(logn) for the corresponding Shannon function, i.e., for the delay of the worst function of logic algebra that depends on given n variables, are established.  相似文献   

10.
Consider the realization of Boolean functions by networks from unreliable functional components in a complete basis B ? B 3 (B 3 is the set of all Boolean functions depending on the variables x 1, x 2, x 3). It is assumed that all the components of the network are subject to inverse faults at the outputs independently of each other with probability ? ∈ (0, 1/2). In B 3, we obtain all complete bases in which the following two conditions simultaneously hold: 1) any function can be realized by a network with unreliability asymptotically not greater than 2? (? → 0); 2) there exist functions (denote their set by K) that cannot be realized by networks with unreliability asymptotically less than 2?, ? → 0. Such bases will be called bases with unreliability coefficient 2. It is also proved that the set K contains almost all functions.  相似文献   

11.
Realization of functions of the k-valued logic by circuits is considered over an arbitrary finite complete basis B. Asymptotic behavior of the Shannon function D B (n) of the circuit depth over B is examined. The value D B (n) is the minimal depth sufficient to realize every function of the k-valued logic of n variables by a circuit over B. It is shown that for each natural k ≥ 2 and for any finite complete basis B there exists a positive constant α B such that D B (n) ~ α B n for n → ∞.  相似文献   

12.
The realization of functions of the k-valued logic by circuits is considered over an arbitrary infinite complete basis B. The Shannon function D B (n) of the circuit depth over B is examined (for any positive integer n the value D B (n) is the minimal depth sufficient to realize every function of the k-valued logic of n variables by a circuit over B). It is shown that for each fixed k ≥ 2 and for any infinite complete basis B either there exists a constant α ≥ 1 such that D B (n) = α for all sufficiently large n, or there exist constants β (β > 0), γ, δ such that βlog2 nD B (n) ≤ γlog2 n + δ for all n.  相似文献   

13.
The upper bound log2 n + log2 log2 n + const is proved on the depth of the addition and comparison operators on n-bit numbers over the basis {&;, ∨, ~}.  相似文献   

14.
《Journal of Complexity》1999,15(1):17-29
Consider an arithmetic expression of lengthninvolving only the operations {+, ×} and non-negative constants. We prove lower bounds on the depth of any binary computation tree over the same sets of operations and constants that computes such an expression. We exhibit a family of arithmetic expressions that requires computation trees of depth at least 1.5 log2 nO(1), thus proving a conjecture of S. R. Kosaraju (1986,in“Proc. of the 18th ACM Symp. on Theory Computing,” pp. 231–239). In contrast, Kosaraju showed how to compute such expressions with computation trees of depth 2 log2 n+O(1).  相似文献   

15.
In this paper we consider noniterated Boolean functions in the basis {&;, ∨, ?}. We obtain the canonical form of the formula for a noniterated function in this basis. We construct the set of such formulas with respect to variables x 1, …, x n and calculate the number of its elements. Based on these results, we obtain the upper and lower bounds for the number of noniterated Boolean functions of n variables in the basis under consideration.  相似文献   

16.
The complexity of implementing a cyclic shift of a 2n-tuple of real numbers by Boolean circuits over the basis consisting of a ternary choice function and all binary Boolean functions is shown to be 2n n.  相似文献   

17.
The asymptotic behavior of the Shannon’s function L B(n) is studied for complexity of n-variable predicate implementation with the use of predicate circuits over arbitrary complete basis B. A new definition of the reduced weight of the predicate is introduced, regarding it as a solution of a specific linear programming problem based on a system of predicate’s generalized variables. New, more exact upper elements for L B(n) in a number of bases are acquired by the means of special decompositions of initial predicates using universal sets of predicates constructed for circuits consisting of bases elements with minimal reduced weight.  相似文献   

18.
《Journal of Complexity》1996,12(2):81-115
Given a univariate polynomialf(z) of degreenwith complex coefficients, whose norms are less than 2min magnitude, the root problem is to find all the roots off(z) up to specified precision 2−μ. Assuming the arithmetic model for computation, we provide an algorithm which has complexityO(nlog5nlogB), whereb= χ + μ, and χ = max{n,m}. This improves on the previous best known algorithm of Pan for the problem, which has complexityO(n2log2nlog(m+ μ)). A remarkable property of our algorithm is that it does not require any assumptions about the root separation off, which were either explicitly, or implicitly, required by previous algorithms. Moreover it also has a work-efficient parallel implementation. We also show that both the sequential and parallel implementations of the algorithm work without modification in the Boolean model of arithmetic. In this case, it follows from root perturbation estimates that we need only specify θ = ⌈n(B+ logn+ 3)⌉ bits of the binary representations of the real and imaginary parts of each of the coefficients off. We also show that by appropriate rounding of intermediate values, we can bound the number of bits required to represent all complex numbers occurring as intermediate quantities in the computation. The result is that we can restrict the numbers we use in every basic arithmetic operation to those having real and imaginary parts with at most φ bits, where[formula]and[formula]Thus, in the Boolean model, the overall work complexity of the algorithm is only increased by a multiplicative factor ofM(φ) (whereM(ψ) =O(ψ(log ψ) log log ψ) is the bit complexity for multiplication of integers of length ψ). The key result on which the algorithm is based, is a new theorem of Coppersmith and Neff relating the geometric distribution of the zeros of a polynomial to the distribution of the zeros of its high order derivatives. We also introduce several new techniques (splitting sets and “centered” points) which hinge on it. We also observe that our root finding algorithm can be efficiently parallelized to run in parallel timeO(log6nlogB) usingnprocessors.  相似文献   

19.
Let B1, B2, ... be a sequence of independent, identically distributed random variables, letX0 be a random variable that is independent ofBn forn?1, let ρ be a constant such that 0<ρ<1 and letX1,X2, ... be another sequence of random variables that are defined recursively by the relationshipsXnXn-1+Bn. It can be shown that the sequence of random variablesX1,X2, ... converges in law to a random variableX if and only ifE[log+¦B1¦]<∞. In this paper we let {B(t):0≦t<∞} be a stochastic process with independent, homogeneous increments and define another stochastic process {X(t):0?t<∞} that stands in the same relationship to the stochastic process {B(t):0?t<∞} as the sequence of random variablesX1,X2,...stands toB1,B2,.... It is shown thatX(t) converges in law to a random variableX ast →+∞ if and only ifE[log+¦B(1)¦]<∞ in which caseX has a distribution function of class L. Several other related results are obtained. The main analytical tool used to obtain these results is a theorem of Lukacs concerning characteristic functions of certain stochastic integrals.  相似文献   

20.
The random Boolean expressions are considered that are obtained by the random and independent substitution with the probabilities p and 1 ? p of the constantly one function and constantly zero function for variables of repetition-free formulas over a given basis. The probability is studied that the expressions are equal to one. It is shown that, for each finite basis and p ? (0, 1), this probability tends to some finite limit P 1(p) as the length of an expression grows. Explicit representation of the probability function P 1(p) is found for all finite bases, the analytic properties of this function are studied, and its behavior is investigated in dependence on the properties of the basis.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号