首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 10 毫秒
1.
The k-server problem is a fundamental online problem where k mobile servers should be scheduled to answer a sequence of requests for points in a metric space as to minimize the total movement cost. While the deterministic competitive ratio is at least k, randomized k-server algorithms have the potential of reaching o(k)-competitive ratios. Prior to this work only few specific cases of this problem were solved. For arbitrary metric spaces, this goal may be approached by using probabilistic metric approximation techniques. This paper gives the first results in this direction, obtaining o(k)-competitive ratio for a natural class of metric spaces, including d-dimensional grids, and wide range of k.  相似文献   

2.
We study the randomized k-server problem on metric spaces consisting of widely separated subspaces. We give a method which extends existing algorithms to larger spaces with the growth rate of the competitive quotients being at most O(logk). This method yields o(k)-competitive algorithms solving the randomized k-server problem for some special underlying metric spaces, e.g. HSTs of “small” height (but unbounded degree). HSTs are important tools for probabilistic approximation of metric spaces.  相似文献   

3.
A quasiconformal extension for the class of k-uniformly convex functions, denoted , and for the class of k-starlike functions, denoted is provided. Also, estimation of the norm of pre-Schwarzian derivative in is given.  相似文献   

4.
In this paper, we study two classes of primitive digraphs, and show that there are k-colorings that are k-primitive.  相似文献   

5.
A k-noncrossing RNA structure can be identified with a k-noncrossing diagram over [n], which in turn corresponds to a vacillating tableau having at most (k−1) rows. In this paper we derive the limit distribution of irreducible substructures via studying their corresponding vacillating tableaux. Our main result proves, that the limit distribution of the numbers of irreducible substructures in k-noncrossing, σ-canonical RNA structures is determined by the density function of a -distribution for some τk>1.  相似文献   

6.
Consider the permutation π=(π1,…, πn) of 1,2,…, n as being placed on a circle with indices taken modulo n. For given kn there are n sums of k consecutive entries. We say the maximum difference of any consecutive k-sum from the average k-sum is the discrepancy of the permutation. We seek a permutation of minimum discrepancy. We find that in general the discrepancy is small, never more than k+6, independent of n. For g= gcd(n,k)>1, we show that the discrepancy is . For g=1 it is more complicated. Our constructions show that the discrepancy never exceeds k/2 by more than 9 for large n, while it is at least k/2 for infinitely many n.We also give an analysis for the easier case of linear permutations, where we view the permutation as written on a line. The analogous discrepancy is at most 2 for all n,k.  相似文献   

7.
In this paper, we present a generalization of the concept of balanced game for finite games. Balanced games are those having a nonempty core, and this core is usually considered as the solution of the game. Based on the concept of k-additivity, we define the so-called k-balanced games and the corresponding generalization of core, the k-additive core, whose elements are not directly imputations but k-additive games. We show that any game is k-balanced for a suitable choice of k, so that the corresponding k-additive core is not empty. For the games in the k-additive core, we propose a sharing procedure to get an imputation and a representative value for the expectations of the players based on the pessimistic criterion. Moreover, we look for necessary and sufficient conditions for a game to be k-balanced. For the general case, it is shown that any game is either balanced or 2-balanced. Finally, we treat the special case of capacities.  相似文献   

8.
An Efficient Exact Algorithm for Constraint Bipartite Vertex Cover   总被引:2,自引:0,他引:2  
The constraint bipartite vertex cover problem (CBVC for short) is as follows: given a bipartite graph G with n vertices and two positive integers k1k2, is there a vertex cover taking at most k1 vertices from one and at most k2 vertices from the other vertex set of G? CBVC is NP-complete. It formalizes the spare allocation problem for reconfigurable arrays, an important problem from VLSI manufacturing. We provide a nontrivial so-called fixed parameter algorithm for CBVC, running in O(1.3999k1 + k2 + (k1 + k2)n) time. Our algorithm is efficient and practical for small values of k1 and k2, as occurring in applications. The analysis of the search tree is based on a novel bonus point system: after the processing of the search tree (which takes time exponential in k), a polynomial-time final analysis follows. Parts of the computation that would be normally done within the search-tree phase can be postponed; nevertheless, knowledge about the size of those parts can be used to reduce the length of the search paths (and hence the depth of the search tree as a whole) by a sort of bonus points.  相似文献   

9.
For several decades, much attention has been paid to the two-sample Behrens-Fisher (BF) problem which tests the equality of the means or mean vectors of two normal populations with unequal variance/covariance structures. Little work, however, has been done for the k-sample BF problem for high dimensional data which tests the equality of the mean vectors of several high-dimensional normal populations with unequal covariance structures. In this paper we study this challenging problem via extending the famous Scheffe’s transformation method, which reduces the k-sample BF problem to a one-sample problem. The induced one-sample problem can be easily tested by the classical Hotelling’s T 2 test when the size of the resulting sample is very large relative to its dimensionality. For high dimensional data, however, the dimensionality of the resulting sample is often very large, and even much larger than its sample size, which makes the classical Hotelling’s T 2 test not powerful or not even well defined. To overcome this difficulty, we propose and study an L 2-norm based test. The asymptotic powers of the proposed L 2-norm based test and Hotelling’s T 2 test are derived and theoretically compared. Methods for implementing the L 2-norm based test are described. Simulation studies are conducted to compare the L 2-norm based test and Hotelling’s T 2 test when the latter can be well defined, and to compare the proposed implementation methods for the L 2-norm based test otherwise. The methodologies are motivated and illustrated by a real data example. The work was supported by the National University of Singapore Academic Research Grant (Grant No. R-155-000-085-112)  相似文献   

10.
近本文研究了截断随机变量和k-正态分布.利用对数凹函数理论,获得了涉及截断随机变量和截断随机变量的函数的方差的不等式链,推广了涉及正态分布和分层教学模型的一些经典结论.同时在附录部分给出了仿真结果.  相似文献   

11.
Turbulence modelling is a crucial question in the application of CFD to flows over buildings. The impinging flow and anisotropic nature of the turbulence present severe challenges. This paper presents a comparison of CFD against full-scale results. It differs from previous work which has concentrated on the wind-tunnel scale. In order to better account for the production of turbulent kinetic energy and the anisotropic nature of the turbulence a non-linear k– model is implemented. The results are discussed for different turbulence models and for the comparison of computed results with the measurements from full-scale.  相似文献   

12.
Trimmed best k-nets were introduced in J. A. Cuesta-Albertos, A. Gordaliza and C. Matrán (1998, Statist. Probab. Lett.36, 401–413) as a robustified L-based quantization procedure. This paper focuses on the asymptotics of this procedure. Also, some possible applications are briefly sketched to motivate the interest of this technique. Consistency and weak limit law are obtained in the multivariate setting. Consistency holds for absolutely continuous distributions without the (artificial) requirement of a trimming level varying with the sample size as in J. A. Cuesta-Albertos, A. Gordaliza and C. Matrán (1998, Statist. Probab. Lett.36, 401–413). The weak convergence will be stated toward a non-normal limit law at a OP(n−1/3) rate of convergence. An algorithm for computing trimmed best k-nets is proposed. Also a procedure is given in order to choose an appropriate number of centers, k, for a given data set.  相似文献   

13.
In this paper, we define and study some subclasses of analytic functions by using fractional derivative operator. Some interesting properties, coefficients problems and inclusion results of these classes are investigated. It is also shown that these classes are closed under convolution with convex functions and some applications are given.  相似文献   

14.
In this paper we study the Riemann and Hilbert problems of k-monogenic functions. By using Euler operator, we transform the boundary value problem of k-monogenic functions into the boundary value problems of monogenic functions. Then by the Almansi-type theorem of k-monogenic functions, we get the solutions of these problems.  相似文献   

15.
We propose a new genetic algorithm for a well-known facility location problem. The algorithm is relatively simple and it generates good solutions quickly. Evolution is facilitated by a greedy heuristic. Computational tests with a total of 80 problems from four different sources with 100 to 1,000 nodes indicate that the best solution generated by the algorithm is within 0.1% of the optimum for 85% of the problems. The coding effort and the computational effort required are minimal, making the algorithm a good choice for practical applications requiring quick solutions, or for upper-bound generation to speed up optimal algorithms.  相似文献   

16.
In this paper, we prove that a non-negative rational number sequence (a 1,a 2, ...,a k+1) isk-Hamilton-nice, if (1)a k+12, and (2) j =1/h (i j –1)k–1 implies for arbitraryi 1,i 2,...i h {1,2,... ,k}. This result was conjectured by Guantao Chen and R.H. Schelp, and it generalizes several well-known sufficient conditions for graphs to be Hamiltonian.This project is supported by the National Natural Science Foundation of China.  相似文献   

17.
The double loop network (DLN) is a circulant digraph with n nodes and outdegree 2. DLN has been widely used in the designing of local area networks and distributed systems. In this paper, a new method for constructing infinite families of k-tight optimal DLN is presented. For k = 0, 1, ..., 40, the infinite families of k-tight optimal DLN can be constructed by the new method, where the number n k (t, a) of their nodes is a polynomial of degree 2 in t and contains a parameter a. And a conjecture is proposed.  相似文献   

18.
本文通过对网络中有向支撑出树性质的研究,提出了在有向网络图中寻找以某一定点为根的最小有向支撑出树一种较简便的计算方法,并给出了应用该算法进行实际操作的一个算例.  相似文献   

19.
The maximum weight k-independent set problem has applications in many practical problems like k-machines job scheduling problem, k-colourable subgraph problem, VLSI design layout and routing problem. Based on DAG (Directed Acyclic Graph) approach, an O(kn 2) time sequential algorithm is designed in this paper to solve the maximum weight k-independent set problem on weighted trapezoid graphs. The weights considered here are all non-negative and associated with each of the n vertices of the graph.  相似文献   

20.
A robust search algorithm should ideally exhibit reasonable performance on a diverse and varied set of problems. In an earlier paper Lim et al. (Computational Optimization and Applications, vol. 15, no. 3, 2000), we outlined a class of hybrid genetic algorithms based on the k-gene exchange local search for solving the quadratic assignment problem (QAP). We follow up on our development of the algorithms by reporting in this paper the results of comprehensive testing of the hybrid genetic algorithms (GA) in solving QAP. Over a hundred instances of QAP benchmarks were tested using a standard set of parameters setting and the results are presented along with the results obtained using simple GA for comparisons. Results of our testing on all the benchmarks show that the hybrid GA can obtain good quality solutions of within 2.5% above the best-known solution for 98% of the instances of QAP benchmarks tested. The computation time is also reasonable. For all the instances tested, all except for one require computation time not exceeding one hour. The results will serve as a useful baseline for performance comparison against other algorithms using the QAP benchmarks as a basis for testing.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号