首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Denote by xn,k(α,β) and xn,k(λ)=xn,k(λ−1/2,λ−1/2) the zeros, in decreasing order, of the Jacobi polynomial P(α,β)n(x) and of the ultraspherical (Gegenbauer) polynomial Cλn(x), respectively. The monotonicity of xn,k(α,β) as functions of α and β, α,β>−1, is investigated. Necessary conditions such that the zeros of P(a,b)n(x) are smaller (greater) than the zeros of P(α,β)n(x) are provided. A. Markov proved that xn,k(a,b)<xn,k(α,β) (xn,k(a,b)>xn,k(α,β)) for every n and each k, 1kn if a>α and b<β (a<α and b>β). We prove the converse statement of Markov's theorem. The question of how large the function fn(λ) could be such that the products fn(λ)xn,k(λ), k=1,…,[n/2] are increasing functions of λ, for λ>−1/2, is also discussed. Elbert and Siafarikas proved that fn(λ)=(λ+(2n2+1)/(4n+2))1/2 obeys this property. We establish the sharpness of their result.  相似文献   

2.
Suppose that n independent tasks are to be scheduled without preemption on a set of identical parallel processors. Each task Ti requires a given execution time τi and it may be started for execution on any processor at any of its prescribed starting times si1, si2, …, siki, with kik for some fixed integer k. We first prove that the problem of finding a feasible schedule on a single processor is NP-complete in the strong sense even when τi ε {τ, τ′} and ki ≤ 3 for 1 ≤ in. The same problem is, however, shown to be solvable in O(n log n) time, provided sikisi1 < τi for 1 ≤ in. We then show that the problem of finding a feasible schedule on an arbitrary number of processors is strongly NP-complete even when τi ε {τ, τ′}, ki = 2 and si2si1 = δ < τi for 1 ≤ in. Finally a special case with ki = 2 and si2si1 = 1, 1 ≤ in, of the above multiprocessor scheduling problem is shown to be solvable in polynomial time.  相似文献   

3.
Denis S. Krotov   《Discrete Mathematics》2008,308(22):5289-5297
An n-ary operation Q:ΣnΣ is called an n-ary quasigroup of order |Σ| if in the relation x0=Q(x1,…,xn) knowledge of any n elements of x0,…,xn uniquely specifies the remaining one. Q is permutably reducible if Q(x1,…,xn)=P(R(xσ(1),…,xσ(k)),xσ(k+1),…,xσ(n)) where P and R are (n-k+1)-ary and k-ary quasigroups, σ is a permutation, and 1<k<n. An m-ary quasigroup S is called a retract of Q if it can be obtained from Q or one of its inverses by fixing n-m>0 arguments. We prove that if the maximum arity of a permutably irreducible retract of an n-ary quasigroup Q belongs to {3,…,n-3}, then Q is permutably reducible.  相似文献   

4.
In this paper we show that the elements of certain families of integer partitions can be listed in a minimal change, or Gray code, order. In particular, we construct Gray code listings for the classes Pδ(n, k) and D(n, k) of partitions of n into parts of size at most k in which, for Pδ(n, k), the parts are congruent to one modulo δ and, for D(n, k), the parts are distinct. It is shown that the elements of these classes can be listed so that the only change between successive partitions is the increase of one part by δ (or the addition of δ ones) and the decrease of one part by δ (or the removal of δ ones), where, in the case of D(n, k), δ = 1.  相似文献   

5.
We present a parallel randomized algorithm running on aCRCW PRAM, to determine whether two planar graphs are isomorphic, and if so to find the isomorphism. We assume that we have a tree of separators for each planar graph (which can be computed by known algorithms inO(log2 n) time withn1 + εprocessors, for any ε > 0). Ifnis the number of vertices, our algorithm takesO(log(n)) time with processors and with a probability of failure of 1/nat most. The algorithm needs 2 · log(m) − log(n) + O(log(n)) random bits. The number of random bits can be decreased toO(log(n)) by increasing the number of processors ton3/2 + ε, for any ε > 0. Our parallel algorithm has significantly improved processor efficiency, compared to the previous logarithmic time parallel algorithm of Miller and Reif (Siam J. Comput.20(1991), 1128–1147), which requiresn4randomized processors orn5deterministic processors.  相似文献   

6.
Let {pk(x; q)} be any system of the q-classical orthogonal polynomials, and let be the corresponding weight function, satisfying the q-difference equation Dq(σ)=τ, where σ and τ are polynomials of degree at most 2 and exactly 1, respectively. Further, let {pk(1)(x;q)} be associated polynomials of the polynomials {pk(x; q)}. Explicit forms of the coefficients bn,k and cn,k in the expansions
are given in terms of basic hypergeometric functions. Here k(x) equals xk if σ+(0)=0, or (x;q)k if σ+(1)=0, where σ+(x)σ(x)+(q−1)xτ(x). The most important representatives of those two classes are the families of little q-Jacobi and big q-Jacobi polynomials, respectively.Writing the second-order nonhomogeneous q-difference equation satisfied by pn−1(1)(x;q) in a special form, recurrence relations (in k) for bn,k and cn,k are obtained in terms of σ and τ.  相似文献   

7.
We consider the problem of computing the minimum ofnvalues, and several well-known generalizations [prefix minima, range minima, and all nearest smaller values (ANSV)] for input elements drawn from the integer domain [1···s], wheresn. In this article we give simple and efficient algorithms for all of the preceding problems. These algorithms all takeO(log log log s) time using an optimal number of processors andO(nsε) space (for constant ε < 1) on the COMMON CRCW PRAM. The best known upper bounds for the range minima and ANSV problems were previouslyO(log log n) (using algorithms for unbounded domains). For the prefix minima and for the minimum problems, the improvement is with regard to the model of computation. We also prove a lower bound of Ω(log log n) for domain sizes = 2Ω(log n log log n). Since, forsat the lower end of this range, log log n = Ω(log log log s), this demonstrates that any algorithm running ino(log log log s) time must restrict the range ofson which it works.  相似文献   

8.
Suppose K is a nonempty closed convex nonexpansive retract of a real uniformly convex Banach space E with P as a nonexpansive retraction. Let T :KE be an asymptotically nonexpansive nonself-map with sequence {kn}n1[1,∞), limkn=1, F(T):={xK: Tx=x}≠. Suppose {xn}n1 is generated iteratively by
where {αn}n1(0,1) is such that ε<1−αn<1−ε for some ε>0. It is proved that (IT) is demiclosed at 0. Moreover, if ∑n1(kn2−1)<∞ and T is completely continuous, strong convergence of {xn} to some x*F(T) is proved. If T is not assumed to be completely continuous but E also has a Fréchet differentiable norm, then weak convergence of {xn} to some x*F(T) is obtained.  相似文献   

9.
Interval allocation has been suggested as a possible formalization for the PRAM of the (vaguely defined) processor allocation problem, which is of fundamental importance in parallel computing. The interval allocation problem is, given n nonnegative integers x1, . . ., xn, to allocate n nonoverlapping subarrays of sizes x1, . . ., xn from within a base array of Onj=1xj) cells. We show that interval allocation problems of size n can be solved in O((log log n)3) time with optimal speedup on a deterministic CRCW PRAM. In addition to a general solution to the processor allocation problem, this implies an improved deterministic algorithm for the problem of approximate summation. For both interval allocation and approximate summation, the fastest previous deterministic algorithms have running times of Θ(log n/log log n). We describe an application to the problem of computing the connected components of an undirected graph. Finally we show that there is a nonuniform deterministic algorithm that solves interval allocation problems of size n in O(log log n) time with optimal speedup.  相似文献   

10.
Caihui Lu  Haixia Xu   《Journal of Algebra》2003,260(2):570-576
In a symmetrizable Kac–Moody algebra g(A), let α=∑i=1nkiαi be an imaginary root satisfying ki>0 and α,αi<0 for i=1,2,…,n. In this paper, it is proved that for any xαgα{0}, satisfying [xα,fn]≠0 and [xα,fi]=0 for i=1,2,…,n−1, there exists a vector y such that the subalgebra generated by xα and y contains g′(A), the derived subalgebra of g(A).  相似文献   

11.
Let A = (aij) be an n × n Toeplitz matrix with bandwidth k + 1, K = r + s, that is, aij = aji, i, J = 1,… ,n, ai = 0 if i > s and if i < -r. We compute p(λ)= det(A - λI), as well as p(λ)/p′(λ), where p′(λ) is the first derivative of p(λ), by using O(k log k log n) arithmetic operations. Moreover, if ai are m × m matrices, so that A is a banded Toeplitz block matrix, then we compute p(λ), as well as p(λ)/p′(λ), by using O(m3k(log2 k + log n) + m2k log k log n) arithmetic operations. The algorithms can be extended to the computation of det(A − λB) and of its first derivative, where both A and B are banded Toeplitz matrices. The algorithms may be used as a basis for iterative solution of the eigenvalue problem for the matrix A and of the generalized eigenvalue problem for A and B.  相似文献   

12.
This thesis deals with a certain set function called entropy and its ápplications to some problems in classical Fourier analysis. For a set S [0, 1/e] the entropy of S is defined by E(S) = infSkIk,Ik intervals Σk | Ik | log(1/|Ik|). We begin by using notions related to entropy in order to investigate the maximal operator MΩ given by MΩ(f)(x) = supr>0(1/rn) ∫|t| ≤r Ω(t) |f(x + t)| dt, f ε L1(Rn), where Ω is a positive function, homogeneous of degree 0, and satisfying a certain weak smoothness condition. Then the set function entropy is investigated, and certain of its properties are derived. We then apply these to solve various problems in differentiation theory and the theory of singular integrals, deriving in the process, entropic versions of the theorems of Hardy and Littlewood and Calderón and Zygmund.  相似文献   

13.
For a fixed integer m ≥ 0, and for n = 1, 2, 3, ..., let λ2m, n(x) denote the Lebesgue function associated with (0, 1,..., 2m) Hermite-Fejér polynomial interpolation at the Chebyshev nodes {cos[(2k−1) π/(2n)]: k=1, 2, ..., n}. We examine the Lebesgue constant Λ2m, n max{λ2m, n(x): −1 ≤ x ≤ 1}, and show that Λ2m, n = λm, n(1), thereby generalising a result of H. Ehlich and K. Zeller for Lagrange interpolation on the Chebyshev nodes. As well, the infinite term in the asymptotic expansion of Λ2m, n) as n → ∞ is obtained, and this result is extended to give a complete asymptotic expansion for Λ2, n.  相似文献   

14.
It is known that if a smooth function h in two real variables x and y belongs to the class Σn of all sums of the form Σnk=1ƒk(x) gk(y), then its (n + 1)th order "Wronskian" det[hxiyj]ni,j=0 is identically equal to zero. The present paper deals with the approximation problem h(x, y) Σnk=1ƒk(x) gk(y) with a prescribed n, for general smooth functions h not lying in Σn. Two natural approximation sums T=T(h) Σn, S=S(h) Σn are introduced and the errors |h-T|, |h-S| are estimated by means of the above mentioned Wronskian of the function h. The proofs utilize the technique of ordinary linear differential equations.  相似文献   

15.
We present an efficient algorithm for finding a sparse k-edge-connectivity certificate of a multigraph G. Our algorithm runs in O((log kn)(log k)2(log n)2) time using O(k(n + m′)) processors on an ARBITRARY CRCW PRAM, where n and m′ stand for the numbers of vertices in G and edges in the simplified graph of G, respectively.  相似文献   

16.
Let k be a nonzero, commutative ring with 1, and let R be a k-algebra with a countably-infinite ordered free k-basis B = [pn: n 0]. We characterize and analyze those bases from which one can construct a k-algebra of ‘formal B-series’ of the form f=∑cnpn, with cn ε k, showing inter alia that many classical polynomial bases fail to have this property.  相似文献   

17.
Let X be a Banach space with closed unit ball B. Given k , X is said to be k-β, respectively, (k + 1)-nearly uniformly convex ((k + 1)-NUC), if for every ε > 0 there exists δ, 0 < δ < 1, so that for every x B and every ε-separated sequence (xn) B there are indices (ni)ki = 1, respectively, (ni)k + 1i = 1, such that (1/(k + 1))||x + ∑ki = 1 xni|| ≤ 1 − δ, respectively, (1/(k + 1))||∑k + 1i = 1 xni|| ≤ 1 − δ. It is shown that a Banach space constructed by Schachermayer is 2-β, but is not isomorphic to any 2-NUC Banach space. Modifying this example, we also show that there is a 2-NUC Banach space which cannot be equivalently renormed to be 1-β.  相似文献   

18.
Let Vn(q) denote a vector space of dimension n over the field with q elements. A set of subspaces of Vn(q) is a partition of Vn(q) if every nonzero element of Vn(q) is contained in exactly one element of . Suppose there exists a partition of Vn(q) into xi subspaces of dimension ni, 1 ≤ ik. Then x1, …, xk satisfy the Diophantine equation . However, not every solution of the Diophantine equation corresponds to a partition of Vn(q). In this article, we show that there exists a partition of Vn(2) into x subspaces of dimension 3 and y subspaces of dimension 2 if and only if 7x + 3y = 2n ? 1 and y ≠ 1. In doing so, we introduce techniques useful in constructing further partitions. We also show that partitions of Vn(q) induce uniformly resolvable designs on qn points. © 2007 Wiley Periodicals, Inc. J Combin Designs 16: 329–341, 2008  相似文献   

19.
For a given undirected graphG = (V, E, cG) with edges weighted by nonnegative realscG:ER + , let ΛG(k) stand for the minimum amount of weights which needs to be added to makeG k-edge-connected, and letG*(k) be the resulting graph obtained fromG. This paper first shows that function ΛGover the entire rangek [0, +∞] can be computed inO(nm + n2 log n) time, and then shows that allG*(k) in the entire range can be obtained fromO(n log n) weighted cycles, and such cycles can be computed inO(nm + n2 log n) time, wherenandmare the numbers of vertices and edges, respectively.  相似文献   

20.
Three related rectangle intersection problems in k-dimensional space are considered: (1) find the intersections of a rectangle with a given set of rectangles, (2) find the intersecting pairs of rectangles as they are inserted into or deleted from an existing set of rectangles, and (3) find the intersecting pairs of a given set of rectangles. By transforming these problems into range search problems, one need not divide the intersection problem into two subproblems, namely, the edge-intersecting problem and the containment problem, as done by many previous studies. Furthermore, this approach can also solve these subproblems separately, if required. For the first problem the running time is O((log n)2k−1 + s), where s is the number of intersecting pairs of rectangles. For the second problem the time needed to generate and maintain n rectangles is O(n(log n)2k) and the time for each query is O((log n)2k−1 + s). For the third problem the total time is O(n log n + n(log n)2(k−1) + s) for k ≥ 1.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号