首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Let us fix a function f(n)=o(nlnn)f(n)=o(nlnn) and real numbers 0≤α<β≤10α<β1. We present a polynomial time algorithm which, given a directed graph GG with nn vertices, decides either that one can add at most βnβn new edges to GG so that GG acquires a Hamiltonian circuit or that one cannot add αnαn or fewer new edges to GG so that GG acquires at least e−f(n)n!ef(n)n! Hamiltonian circuits, or both.  相似文献   

2.
In this paper, we consider Beta(2−α,α)(2α,α) (with 1<α<21<α<2) and related ΛΛ-coalescents. If T(n)T(n) denotes the length of a randomly chosen external branch of the nn-coalescent, we prove the convergence of nα−1T(n)nα1T(n) when nn tends to ∞, and give the limit. To this aim, we give asymptotics for the number σ(n)σ(n) of collisions which occur in the nn-coalescent until the end of the chosen external branch, and for the block counting process associated with the nn-coalescent.  相似文献   

3.
4.
We introduce (n+1)(n+1)-preprojective algebras of algebras of global dimension nn. We show that if an algebra is nn-representation-finite then its (n+1)(n+1)-preprojective algebra is self-injective. In this situation, we show that the stable module category of the (n+1)(n+1)-preprojective algebra is (n+1)(n+1)-Calabi–Yau, and, more precisely, it is the (n+1)(n+1)-Amiot cluster category of the stable nn-Auslander algebra of the original algebra. In particular this stable category contains an (n+1)(n+1)-cluster tilting object. We show that even if the (n+1)(n+1)-preprojective algebra is not self-injective, under certain assumptions (which are always satisfied for n∈{1,2}n{1,2}) the results above still hold for the stable category of Cohen–Macaulay modules.  相似文献   

5.
A dd-arc-dominated digraph is a digraph DD of minimum out-degree dd such that for every arc (x,y)(x,y) of DD, there exists a vertex uu of DD of out-degree dd such that (u,x)(u,x) and (u,y)(u,y) are arcs of DD. Henning and Yeo [Vertex disjoint cycles of different length in digraphs, SIAM J. Discrete Math. 26 (2012) 687–694] conjectured that a digraph with minimum out-degree at least four contains two vertex-disjoint cycles of different length. In this paper, we verify this conjecture for 4-arc-dominated digraphs.  相似文献   

6.
Let R(G)R(G) be the graph obtained from GG by adding a new vertex corresponding to each edge of GG and by joining each new vertex to the end vertices of the corresponding edge, and Q(G)Q(G) be the graph obtained from GG by inserting a new vertex into every edge of GG and by joining by edges those pairs of these new vertices which lie on adjacent edges of GG. In this paper, we determine the Laplacian polynomials of R(G)R(G) and Q(G)Q(G) of a regular graph GG; on the other hand, we derive formulae and lower bounds of the Kirchhoff index of these graphs.  相似文献   

7.
We prove that if for a continuous map ff on a compact metric space XX, the chain recurrent set, R(f)R(f) has more than one chain component, then ff does not satisfy the asymptotic average shadowing property. We also show that if a continuous map ff on a compact metric space XX has the asymptotic average shadowing property and if AA is an attractor for ff, then AA is the single attractor for ff and we have A=R(f)A=R(f). We also study diffeomorphisms with asymptotic average shadowing property and prove that if MM is a compact manifold which is not finite with dimM=2dimM=2, then the C1C1 interior of the set of all C1C1 diffeomorphisms with the asymptotic average shadowing property is characterized by the set of ΩΩ-stable diffeomorphisms.  相似文献   

8.
In this paper, we study degenerate CR embeddings ff of a strictly pseudoconvex hypersurface M⊂Cn+1MCn+1 into a sphere SS in a higher dimensional complex space CN+1CN+1. The degeneracy of the mapping ff will be characterized in terms of the ranks of the CR second fundamental form and its covariant derivatives. In 2004, the author, together with X. Huang and D. Zaitsev, established a rigidity result for CR embeddings ff into spheres in low codimensions. A key step in the proof of this result was to show that degenerate mappings are necessarily contained in a complex plane section of the target sphere (partial rigidity). In the 2004 paper, it was shown that if the total rank dd of the second fundamental form and all of its covariant derivatives is <n<n (here, nn is the CR dimension of MM), then f(M)f(M) is contained in a complex plane of dimension n+d+1n+d+1. The converse of this statement is also true, as is easy to see. When the total rank dd exceeds nn, it is no longer true, in general, that f(M)f(M) is contained in a complex plane of dimension n+d+1n+d+1, as can be seen by examples. In this paper, we carry out a systematic study of degenerate CR mappings into spheres. We show that when the ranks of the second fundamental form and its covariant derivatives exceed the CR dimension nn, then partial rigidity may still persist, but there is a “defect” kk that arises from the ranks exceeding nn such that f(M)f(M) is only contained in a complex plane of dimension n+d+k+1n+d+k+1. Moreover, this defect occurs in general, as is illustrated by examples.  相似文献   

9.
We consider a multidimensional diffusion XX with drift coefficient b(α,Xt)b(α,Xt) and diffusion coefficient ?σ(β,Xt)?σ(β,Xt). The diffusion sample path is discretely observed at times tk=kΔtk=kΔ for k=1…nk=1n on a fixed interval [0,T][0,T]. We study minimum contrast estimators derived from the Gaussian process approximating XX for small ??. We obtain consistent and asymptotically normal estimators of αα for fixed ΔΔ and ?→0?0 and of (α,β)(α,β) for Δ→0Δ0 and ?→0?0 without any condition linking ?? and ΔΔ. We compare the estimators obtained with various methods and for various magnitudes of ΔΔ and ?? based on simulation studies. Finally, we investigate the interest of using such methods in an epidemiological framework.  相似文献   

10.
In this paper, the approximation characteristic of a diagonal matrix in probabilistic and average case settings is investigated. And the asymptotic degree of the probabilistic linear (n,δ)(n,δ)-width and pp-average linear nn-width of diagonal matrix MM are determined.  相似文献   

11.
Let RR be a commutative ring with identity. We will say that an RR-module MM satisfies the weak Nakayama property, if IM=MIM=M, where II is an ideal of RR, implies that for any x∈MxM there exists a∈IaI such that (a−1)x=0(a1)x=0. In this paper, we will study modules satisfying the weak Nakayama property. It is proved that if RR is a local ring, then RR is a Max ring if and only if J(R)J(R), the Jacobson radical of RR, is TT-nilpotent if and only if every RR-module satisfies the weak Nakayama property.  相似文献   

12.
We consider a multidimensional diffusion XX with drift coefficient b(Xt,α)b(Xt,α) and diffusion coefficient εa(Xt,β)εa(Xt,β) where αα and ββ are two unknown parameters, while εε is known. For a high frequency sample of observations of the diffusion at the time points k/nk/n, k=1,…,nk=1,,n, we propose a class of contrast functions and thus obtain estimators of (α,β)(α,β). The estimators are shown to be consistent and asymptotically normal when n→∞n and ε→0ε0 in such a way that ε−1n−ρε1nρ remains bounded for some ρ>0ρ>0. The main focus is on the construction of explicit contrast functions, but it is noted that the theory covers quadratic martingale estimating functions as a special case. In a simulation study we consider the finite sample behaviour and the applicability to a financial model of an estimator obtained from a simple explicit contrast function.  相似文献   

13.
Berrizbeitia and Olivieri showed in a recent paper that, for any integer rr, the notion of ωω-prime to base aa leads to a primality test for numbers n≡1n1 mod rr, that under the Extended Riemann Hypothesis (ERH) runs in polynomial time. They showed that the complexity of their test is at most the complexity of the Miller primality test (MPT), which is O((logn)4+o(1))O((logn)4+o(1)). They conjectured that their test is more effective than the MPT if rr is large.  相似文献   

14.
In this paper, we consider a commonly used compression scheme called run-length encoding. We provide both lower and upper bounds for the problems of comparing two run-length encoded strings. Specifically, we prove the 3sum-hardness for both the wildcard matching problem and the kk-mismatch problem with run-length compressed inputs. Given two run-length encoded strings of mm and nn runs, such a result implies that it is very unlikely to devise an o(mn)o(mn)-time algorithm for either of them. We then present an inplace algorithm running in O(mnlogm)O(mnlogm) time for their combined problem, i.e. kk-mismatch with wildcards. We further demonstrate that if the aim is to report the positions of all the occurrences, there exists a stronger barrier of Ω(mnlogm)Ω(mnlogm)-time, matching the running time of our algorithm. Moreover, our algorithm can be easily generalized to a two-dimensional setting without impairing the time and space complexity.  相似文献   

15.
16.
A subset S⊆VSV in a graph G=(V,E)G=(V,E) is a [j,k][j,k]-set if, for every vertex v∈V?SvV?S, j≤|N(v)∩S|≤kj|N(v)S|k for non-negative integers jj and kk, that is, every vertex v∈V?SvV?S is adjacent to at least jj but not more than kk vertices in SS. In this paper, we focus on small jj and kk, and relate the concept of [j,k][j,k]-sets to a host of other concepts in domination theory, including perfect domination, efficient domination, nearly perfect sets, 2-packings, and kk-dependent sets. We also determine bounds on the cardinality of minimum [1, 2]-sets, and investigate extremal graphs achieving these bounds. This study has implications for restrained domination as well. Using a result for [1, 3]-sets, we show that, for any grid graph GG, the restrained domination number is equal to the domination number of GG.  相似文献   

17.
Let (X,d)(X,d) be a metric space endowed with a graph GG such that the set V(G)V(G) of vertices of GG coincides with XX. We define the notion of GG-Reich type maps and obtain a fixed point theorem for such mappings. This extends and subsumes many recent results which were obtained for other contractive type mappings on ordered metric spaces and for cyclic operators.  相似文献   

18.
Let FF be either the real number field RR or the complex number field CC and RPnRPn the real projective space of dimension n. Theorems A and C in Hemmi and Kobayashi (2008) [2] give necessary and sufficient conditions for a given FF-vector bundle over RPnRPn to be stably extendible to RPmRPm for every m?nm?n. In this paper, we simplify the theorems and apply them to the tangent bundle of RPnRPn, its complexification, the normal bundle associated to an immersion of RPnRPn in Rn+rRn+r(r>0)(r>0), and its complexification. Our result for the normal bundle is a generalization of Theorem A in Kobayashi et al. (2000) [8] and that for its complexification is a generalization of Theorem 1 in Kobayashi and Yoshida (2003) [5].  相似文献   

19.
20.
Representations are found for a limit law L(Z(k,p))L(Z(k,p)) obtained from an expanding sequence of random forests containing nn nodes with p∈(0,1]p(0,1] a probability controlling bond formation. One implies that Z(k,p)Z(k,p) is stochastically decreasing as kk increases and that norming gives an exponential limit law. Limit theorems are given for the order of component trees. The proofs exploit properties of the gamma function.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号