首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
We address the problem of finding the K best paths connecting a given pair of nodes in a directed acyclic graph (DAG) with arbitrary lengths. One of the main results in this paper is the proof that a tree representing the kth shortest path is obtained by an arc exchange in one of the previous (k − 1) trees (each of which contains a previous best path). An O(m + K(n + log K)) time and O(K + m) space algorithm is designed to explicitly determine the K shortest paths in a DAG with n nodes and m arcs. The algorithm runs in O(m + Kn) time using O(K + m) space in DAGs with integer length arcs. Empirical results confirming the superior performance of the algorithm to others found in the literature for randomly generated graphs are reported.  相似文献   

2.
The tree partition number of an r‐edge‐colored graph G, denoted by tr(G), is the minimum number k such that whenever the edges of G are colored with r colors, the vertices of G can be covered by at most k vertex‐disjoint monochromatic trees. We determine t2(K(n1, n2,…, nk)) of the complete k‐partite graph K(n1, n2,…, nk). In particular, we prove that t2(K(n, m)) = ? (m‐2)/2n? + 2, where 1 ≤ nm. © 2004 Wiley Periodicals, Inc. J Graph Theory 48: 133–141, 2005  相似文献   

3.
Let ??(n, m) denote the class of simple graphs on n vertices and m edges and let G ∈ ?? (n, m). There are many results in graph theory giving conditions under which G contains certain types of subgraphs, such as cycles of given lengths, complete graphs, etc. For example, Turan's theorem gives a sufficient condition for G to contain a Kk + 1 in terms of the number of edges in G. In this paper we prove that, for m = αn2, α > (k - 1)/2k, G contains a Kk + 1, each vertex of which has degree at least f(α)n and determine the best possible f(α). For m = ?n2/4? + 1 we establish that G contains cycles whose vertices have certain minimum degrees. Further, for m = αn2, α > 0 we establish that G contains a subgraph H with δ(H) ≥ f(α, n) and determine the best possible value of f(α, n).  相似文献   

4.
In "Elements of small orders in K2(F)" (Algebraic K-Theory, Lecture Notes in Math., 966, 1982, 1-6.), the author investigates elements of the form {a, Φn(a)} in the Milnor group K2F of a field F, where Φn(x) is the n-th cyclotomic polynomial. In this paper, these elements are generalized. Applying the explicit formulas of Rosset and Tate for the transfer homomorphism for K2, the author proves some new results on elements of small orders in K2F.  相似文献   

5.
An integer sequence π is said to be graphic if it is the degree sequence of some simple graph G. In this case we say that G is a realization of π. Given a graph H, and a graphic sequence π we say that π is potentially H-graphic if there is some realization of π that contains H as a subgraph. We define σ(H,n) to be the minimum even integer such that every graphic sequence with sum at least σ(H,n) is potentially H-graphic. In this paper, we determine σ(H,n) for the graph H = Km1Km2∪...∪ Kmk when n is a sufficiently large integer. This is accomplished by determining σ(Kj + kK2,n) where j and k are arbitrary positive integers, and considering the case where j = m − 2k and m = ∑ mi.  相似文献   

6.
Let Top 0 be the category of topological T 0-spaces, QU 0 the category of quasi-uniform T 0-spaces, T : QU 0 Top 0 the usual forgetful functor and K : QU 0 QU 0 the bicompletion reflector with unit k : 1 → K. Any T-section F : Top 0 QU 0 is called K-true if KF = FTKF, and upper (lower) K-true if KF is finer (coarser) than FTKF. The literature considers important T-sections F that enjoy all three, or just one, or none of these properties. It is known that T(K,k)F is well-pointed if and only if F is upper K-true. We prove the surprising fact that T(K,k)F is the reflection to Fix(TkF) whenever it is idempotent. We also prove a new characterization of upper K-trueness. We construct examples to set apart some natural cases. In particular we present an upper K-true F for which T(K,k)F is not idempotent, and a K-true F for which the coarsest associated T-preserving coreflector in QU 0 is not stable under K. We dedicate this paper to the memory of Sérgio de Ornelas Salbany (1941–2005).  相似文献   

7.
This paper addresses sensitivity analysis questions concerning the shortest path problem and the maximum capacity path problem in an undirected network. For both problems, we determine the maximum and minimum weights that each edge can have so that a given path remains optimal. For both problems, we show how to determine these maximum and minimum values for all edges in O(m + K log K) time, where m is the number of edges in the network, and K is the number of edges on the given optimal path.  相似文献   

8.
Let a(Kr,+1 - K3,n) be the smallest even integer such that each n-term graphic sequence п= (d1,d2,…dn) with term sum σ(п) = d1 + d2 +…+ dn 〉 σ(Kr+1 -K3,n) has a realization containing Kr+1 - K3 as a subgraph, where Kr+1 -K3 is a graph obtained from a complete graph Kr+1 by deleting three edges which form a triangle. In this paper, we determine the value σ(Kr+1 - K3,n) for r ≥ 3 and n ≥ 3r+ 5.  相似文献   

9.
 Let K n be the complete graph on n vertices. A C(n,k,λ) design is a multiset of k-cycles in K n in which each 2-path (path of length 2) of K n occurs exactly λ times. A C(lk,k,1) design is resolvable if its k-cycles can be partitioned into classes so that every vertex appears exactly once in each class. A C(n,n,1) design gives a solution of Dudeney's round table problem. It is known that there exists a C(n,n,1) design when n is even and there exists a C(n,n,2) design when n is odd. In general the problem of constructing a C(n,n,1) design is still open when n is odd. Necessary and sufficient conditions for the existence of C(n,k,λ) designs and resolvable C(lk,k,1) designs are known when k=3,4. In this paper, we construct a resolvable C(n,k,1) design when n=p e +1 ( p is a prime number and e≥1) and k is any divisor of n with k≠1,2. Received: October, 2001 Final version received: September 4, 2002 RID="*" ID="*" This research was supported in part by Grant-in-Aid for Scientific Research (C) Japan  相似文献   

10.
A graph G of order p and size q is called (a,d)-edge-antimagic total if there exists a bijective function f:V(G)E(G)→{1,2,…,p+q} such that the edge-weights w(uv)=f(u)+f(v)+f(uv), uvE(G), form an arithmetic sequence with first term a and common difference d. The graph G is said to be super (a,d)-edge-antimagic total if the vertex labels are 1,2,…,p. In this paper we study super (a,d)-edge-antimagic properties of mKn, that is, of the graph formed by the disjoint union of m copies of Kn.  相似文献   

11.
Starovoitov  A. P. 《Mathematical Notes》2003,74(3-4):578-582
For a given nonincreasing vanishing sequence {a n } n = 0 of nonnegative real numbers, we find necessary and sufficient conditions for a sequence {n k } k = 0 to have the property that for this sequence there exists a function f continuous on the interval [0,1] and satisfying the condition that , k = 0,1,2,..., where E n (f) and R n,m (f) are the best uniform approximations to the function f by polynomials whose degree does not exceed n and by rational functions of the form r n,m (x) = p n (x)/q m (x), respectively.  相似文献   

12.
We develop the general theory for a new functor K e on the category of C *-algebras. The extremal K-set, K e (A), of a C *-algebra A is defined by means of homotopy classes of extreme partial isometries. It contains K 1 (A) and admits a partially defined addition extending the addition in K 1 (A), so that we have an action of K 1 (A) on K e (A). We show how this functor relates to K 0 and K 1, and how it can be used as a carrier of information relating the various K-groups of ideals and quotients of A. The extremal K-set is then used to extend the classical theory of index for Fredholm and semi-Fredholm operators.  相似文献   

13.
C(n, k) is a graph obtained from n-cycle by adding edges v i v i+k (i = 1, 2,...,n, i + k (mod n)). There are several known results on the crossing numbers of the Cartesian products of C(n, k) (n ≤ 7) with paths, cycles and stars. In this paper we extend these results, and show that the crossing number of the Cartesian product of C(8, 2) with P n is 8n. Yuanqiu Huang: Research supported by NSFC (10771062) and New Century Excellent Talents in University (NCET-07-0276). Jinwang Liu: Research supported by NSFC (10771058) and Hunan NSFC(O6jj20053).  相似文献   

14.
We study the L path partition problem: given a path of n weighted vertices and an integer k, remove k−1 edges from the path so that the maximum absolute deviation of the weights of the resulting k sub-paths from their mean is minimized. Previously, the best algorithm solves this problem in O(nklogk) time. We present an O(nk) time algorithm. We also give improved solutions for two related problems: the Ld path partition problem and the web proxies placement problem.  相似文献   

15.
16.
In this paper, we study the Hodge decompositions ofK-theory and cyclic homology induced by the operations k and k , and in particular the decomposition of the Loday symbols x,y, ...z. Except in special cases, these Loday symbols do not have pure Hodge index. InK n (A) they can project into every componentK n (i) for 2in, and the projection of the Loday symbol x,y, ...,z intoK n (n) is a multiple of the generalized Dennis-Stein symbol x,y, ...,z. Our calculations disprove conjectures of Beilinson and Soulé inK-theory, and of Gerstenhaber and Schack in Hochschild homology.Partially supported by National Security Agency grant MDA904-90-H-4019.Partially supported by National Science Foundation grant DMS-8803497.  相似文献   

17.
Let Bn( f,q;x), n=1,2,… be q-Bernstein polynomials of a function f : [0,1]→C. The polynomials Bn( f,1;x) are classical Bernstein polynomials. For q≠1 the properties of q-Bernstein polynomials differ essentially from those in the classical case. This paper deals with approximating properties of q-Bernstein polynomials in the case q>1 with respect to both n and q. Some estimates on the rate of convergence are given. In particular, it is proved that for a function f analytic in {z: |z|<q+} the rate of convergence of {Bn( f,q;x)} to f(x) in the norm of C[0,1] has the order qn (versus 1/n for the classical Bernstein polynomials). Also iterates of q-Bernstein polynomials {Bnjn( f,q;x)}, where both n→∞ and jn→∞, are studied. It is shown that for q(0,1) the asymptotic behavior of such iterates is quite different from the classical case. In particular, the limit does not depend on the rate of jn→∞.  相似文献   

18.
When G is a finite-dimensional Haar subspace of C(X,Rk), the vector-valued functions (including complex-valued functions when k is 2) from a finite set X to Euclidean k-dimensional space, it is well-known that at any function f in C(X,Rk) the best approximation operator satisfies the strong unicity condition of order 2 and a Lipschitz (Hőlder) condition of order . This note shows that in fact the best approximation operator satisfies the usual Lipschitz condition of order 1 and has a Gateaux derivative on a dense set of functions in C(X,Rk).  相似文献   

19.
Given anm-tempered strongly continuous action α of ℝ by continuous*-automorphisms of a Frechet*-algebraA, it is shown that the enveloping ↡-C *-algebraE(S(ℝ, A, α)) of the smooth Schwartz crossed productS(ℝ,A , α) of the Frechet algebra A of C-elements ofA is isomorphic to the Σ-C *-crossed productC *(ℝ,E(A), α) of the enveloping Σ-C *-algebraE(A) ofA by the induced action. WhenA is a hermitianQ-algebra, one getsK-theory isomorphismRK *(S(ℝ, A, α)) =K *(C *(ℝ,E(A), α) for the representableK-theory of Frechet algebras. An application to the differential structure of aC *-algebra defined by densely defined differential seminorms is given.  相似文献   

20.
In this paper, the problem of finding a shortest path tree rooted at a given source node on a directed graph (SPT) is considered. A new efficient algorithm based on a primal-dual approach is presented, which improves both the convergence and the complexity of the best known auction-like algorithm. It uses the virtual source (VS) concept based on the following consideration: when a node i is visited for the first time by any algorithm which preserves verified the dual admissibility conditions, then the shortest path (SP) from the source node to i is found. Therefore, the SP from the source to the remaining nodes may be computed by considering i as a virtual source.We propose a very efficient implementation of an auction-like algorithm that uses this concept and enables us to obtain a computational cost of O(n 2), where n is the number of nodes.Numerical experimentsare reported showing that the new method outdoes previously proposed auction-like algorithms and is highly competitive with other state-of-art SP approaches.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号