首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Let G be a primitive permutation group of order |G| and degree n. Then |G|≤ndm, where d is the minimal size of a nontrivial orbit of a one-point stabilizer of G and m is the minimal degree of a nonprincipal irreducible representation of G entering its permutation representation. Bibliography: 8 titles. Dedicated to L. D. Faddeev on occasion of his 60th birthday Translated fromZapiski Nauchnykh Seminarov POMI, Vol. 215, 1994, pp. 256–263. Translated by I. Ponomarenko.  相似文献   

2.
A hierarchical decomposition of a simple polygon is introduced. The hierarchy has logarithmic depth, linear size, and its regions have at most three neighbors. Using this hierarchy, circular ray shooting queries in a simple polygon on n vertices can be answered in O(log2 n) query time and O(n log n) space. If the radius of the circle is fixed, the query time can be improved to O(log n) and the space to O(n).  相似文献   

3.
4.
In parallel-batching machine scheduling, all jobs in a batch start and complete at the same time, and the processing time of the batch is the maximum processing time of any job in it. For the unbounded parallel-batching machine scheduling problem of minimizing the maximum lateness, denoted 1|p-batch|L_(max), a dynamic programming algorithm with time complexity O(n~2) is well known in the literature.Later, this algorithm is improved to be an O(n log n) algorithm. In this note, we present another O(n log n) algorithm with simplifications on data structure and implementation details.  相似文献   

5.
We consider the space A(\mathbbT)A(\mathbb{T}) of all continuous functions f on the circle \mathbbT\mathbb{T} such that the sequence of Fourier coefficients [^(f)] = { [^(f)]( k ), k ? \mathbbZ }\hat f = \left\{ {\hat f\left( k \right), k \in \mathbb{Z}} \right\} belongs to l 1(ℤ). The norm on A(\mathbbT)A(\mathbb{T}) is defined by || f ||A(\mathbbT) = || [^(f)] ||l1 (\mathbbZ)\left\| f \right\|_{A(\mathbb{T})} = \left\| {\hat f} \right\|_{l^1 (\mathbb{Z})}. According to the well-known Beurling-Helson theorem, if f:\mathbbT ? \mathbbT\phi :\mathbb{T} \to \mathbb{T} is a continuous mapping such that || einf ||A(\mathbbT) = O(1)\left\| {e^{in\phi } } \right\|_{A(\mathbb{T})} = O(1), n ∈ ℤ then φ is linear. It was conjectured by Kahane that the same conclusion about φ is true under the assumption that || einf ||A(\mathbbT) = o( log| n | )\left\| {e^{in\phi } } \right\|_{A(\mathbb{T})} = o\left( {\log \left| n \right|} \right). We show that if $\left\| {e^{in\phi } } \right\|_{A(\mathbb{T})} = o\left( {\left( {{{\log \log \left| n \right|} \mathord{\left/ {\vphantom {{\log \log \left| n \right|} {\log \log \log \left| n \right|}}} \right. \kern-\nulldelimiterspace} {\log \log \log \left| n \right|}}} \right)^{1/12} } \right)$\left\| {e^{in\phi } } \right\|_{A(\mathbb{T})} = o\left( {\left( {{{\log \log \left| n \right|} \mathord{\left/ {\vphantom {{\log \log \left| n \right|} {\log \log \log \left| n \right|}}} \right. \kern-\nulldelimiterspace} {\log \log \log \left| n \right|}}} \right)^{1/12} } \right), then φ is linear.  相似文献   

6.
In this paper, we study a strongly NP-hard single machine scheduling problem in which each job consists of two operations that are separated by a time delay which lies within a specified range. The objective is to minimize the makespan. Determining the feasibility and, if applicable, makespan of any proposed permutation of the operations is non-trivial, requiring a longest path algorithm with O(n2) complexity for each permutation. Several heuristic algorithms are proposed: a deterministic and randomized construction algorithm, three descent algorithms and two reactive tabu search algorithms. The local search algorithms use a first improvement neighbourhood and mainly visit only feasible solutions within the search space. Results of extensive computational tests are reported, showing that the heavy computational burden of testing potential solutions renders the local search algorithms uncompetitive in comparison to the construction algorithms. The iterated descent algorithm performs least well.  相似文献   

7.
We introduce the adaptive neighborhood graph as a data structure for modeling a smooth manifold M embedded in some Euclidean space Rd. We assume that M is known to us only through a finite sample P \subset M, as is often the case in applications. The adaptive neighborhood graph is a geometric graph on P. Its complexity is at most \min{2^{O(k)n, n2}, where n = |P| and k = dim M, as opposed to the n\lceil d/2 \rceil complexity of the Delaunay triangulation, which is often used to model manifolds. We prove that we can correctly infer the connected components and the dimension of M from the adaptive neighborhood graph provided a certain standard sampling condition is fulfilled. The running time of the dimension detection algorithm is d2O(k^{7} log k) for each connected component of M. If the dimension is considered constant, this is a constant-time operation, and the adaptive neighborhood graph is of linear size. Moreover, the exponential dependence of the constants is only on the intrinsic dimension k, not on the ambient dimension d. This is of particular interest if the co-dimension is high, i.e., if k is much smaller than d, as is the case in many applications. The adaptive neighborhood graph also allows us to approximate the geodesic distances between the points in P.  相似文献   

8.
The max-cut problem asks for partitioning the nodes V of a graph G=(V,E) into two sets (one of which might be empty), such that the sum of weights of edges joining nodes in different partitions is maximum. Whereas for general instances the max-cut problem is NP-hard, it is polynomially solvable for certain classes of graphs. For planar graphs, there exist several polynomial-time methods determining maximum cuts for arbitrary choice of edge weights. Typically, the problem is solved by computing a minimum-weight perfect matching in some associated graph. The most efficient known algorithms are those of Shih et al. (IEEE Trans. Comput. 39(5):694–697, 1990) and that of Berman et al. (WADS, Lecture Notes in Computer Science, vol. 1663, pp. 25–36, Springer, Berlin, 1999). The running time of the former can be bounded by O(|V|\frac32log|V|)O(|V|^{\frac{3}{2}}\log|V|). The latter algorithm is more generally for determining T-joins in graphs. Although it has a slightly larger bound on the running time of O(|V|\frac32(log|V|)\frac32)a(|V|)O(|V|^{\frac{3}{2}}(\log|V|)^{\frac{3}{2}})\alpha(|V|), where α(|V|) is the inverse Ackermann function, it can solve large instances in practice.  相似文献   

9.
We present a sequential dual-simplex algorithm for the linear problem which has the same complexity as the algorithms of Balinski [3,4] and Goldfarb [8]: O(n2) pivots, O(n2 log n + nm) time. Our algorithm works with the (dual) strongly feasible trees and can handle rectangular systems quite naturally.  相似文献   

10.
Consider a flat two-dimensional vortex sheet perturbed initially by a small analytic disturbance. By a formal perturbation analysis, Moore derived an approximate differential equation for the evolution of the vortex sheet. We present a simplified derivation of Moore's approximate equation and analyze errors in the approximation. The result is used to prove existence of smooth solutions for long time. If the initial perturbation is of size ? and is analytic in a strip |??m γ| < ρ, existence of a smooth solution of Birkhoff's equation is shown for time t < k2p, if ? is sufficiently small, with κ → 1 as ? → 0. For the particular case of sinusoidal data of wave length π and amplitude e, Moore's analysis and independent numerical results show singularity development at time tc = |log ?| + O(log|log ?|. Our results prove existence for t < κ|log ?|, if ? is sufficiently small, with k κ → 1 as ? → 0. Thus our existence results are nearly optimal.  相似文献   

11.
Considering the positive d-dimensional lattice point Z + d (d ≥ 2) with partial ordering ≤, let {X k: kZ + d } be i.i.d. random variables taking values in a real separable Hilbert space (H, ‖ · ‖) with mean zero and covariance operator Σ, and set $ S_n = \sum\limits_{k \leqslant n} {X_k } $ S_n = \sum\limits_{k \leqslant n} {X_k } , nZ + d . Let σ i 2, i ≥ 1, be the eigenvalues of Σ arranged in the non-increasing order and taking into account the multiplicities. Let l be the dimension of the corresponding eigenspace, and denote the largest eigenvalue of Σ by σ 2. Let logx = ln(xe), x ≥ 0. This paper studies the convergence rates for $ \sum\limits_n {\frac{{\left( {\log \log \left| n \right|} \right)^b }} {{\left| n \right|\log \left| n \right|}}} P\left( {\left\| {S_n } \right\| \geqslant \sigma \varepsilon \sqrt {2\left| n \right|\log \log \left| n \right|} } \right) $ \sum\limits_n {\frac{{\left( {\log \log \left| n \right|} \right)^b }} {{\left| n \right|\log \left| n \right|}}} P\left( {\left\| {S_n } \right\| \geqslant \sigma \varepsilon \sqrt {2\left| n \right|\log \log \left| n \right|} } \right) . We show that when l ≥ 2 and b > −l/2, E[‖X2(log ‖X‖) d−2(log log ‖X‖) b+4] < ∞ implies $ \begin{gathered} \mathop {\lim }\limits_{\varepsilon \searrow \sqrt {d - 1} } (\varepsilon ^2 - d + 1)^{b + l/2} \sum\limits_n {\frac{{\left( {\log \log \left| n \right|} \right)^b }} {{\left| n \right|\log \left| n \right|}}P\left( {\left\| {S_n } \right\| \geqslant \sigma \varepsilon \sqrt 2 \left| n \right|\log \log \left| n \right|} \right)} \hfill \\ = \frac{{K(\Sigma )(d - 1)^{\frac{{l - 2}} {2}} \Gamma (b + l/2)}} {{\Gamma (l/2)(d - 1)!}} \hfill \\ \end{gathered} $ \begin{gathered} \mathop {\lim }\limits_{\varepsilon \searrow \sqrt {d - 1} } (\varepsilon ^2 - d + 1)^{b + l/2} \sum\limits_n {\frac{{\left( {\log \log \left| n \right|} \right)^b }} {{\left| n \right|\log \left| n \right|}}P\left( {\left\| {S_n } \right\| \geqslant \sigma \varepsilon \sqrt 2 \left| n \right|\log \log \left| n \right|} \right)} \hfill \\ = \frac{{K(\Sigma )(d - 1)^{\frac{{l - 2}} {2}} \Gamma (b + l/2)}} {{\Gamma (l/2)(d - 1)!}} \hfill \\ \end{gathered} , where Γ(·) is the Gamma function and $ \prod\limits_{i = l + 1}^\infty {((\sigma ^2 - \sigma _i^2 )/\sigma ^2 )^{ - {1 \mathord{\left/ {\vphantom {1 2}} \right. \kern-\nulldelimiterspace} 2}} } $ \prod\limits_{i = l + 1}^\infty {((\sigma ^2 - \sigma _i^2 )/\sigma ^2 )^{ - {1 \mathord{\left/ {\vphantom {1 2}} \right. \kern-\nulldelimiterspace} 2}} } .  相似文献   

12.
We revisit the well-known problem of sorting under partial information: sort a finite set given the outcomes of comparisons between some pairs of elements. The input is a partially ordered set P, and solving the problem amounts to discovering an unknown linear extension of P, using pairwise comparisons. The information-theoretic lower bound on the number of comparisons needed in the worst case is log e(P), the binary logarithm of the number of linear extensions of P. In a breakthrough paper, Jeff Kahn and Jeong Han Kim (J. Comput. System Sci. 51 (3), 390–399, 1995) showed that there exists a polynomial-time algorithm for the problem achieving this bound up to a constant factor. Their algorithm invokes the ellipsoid algorithm at each iteration for determining the next comparison, making it impractical. We develop efficient algorithms for sorting under partial information. Like Kahn and Kim, our approach relies on graph entropy. However, our algorithms differ in essential ways from theirs. Rather than resorting to convex programming for computing the entropy, we approximate the entropy, or make sure it is computed only once, in a restricted class of graphs, permitting the use of a simpler algorithm. Specifically, we present:
  1. an O(n 2) algorithm performing O(logn·log e(P)) comparisons
  2. an O(n 2:5) algorithm performing at most (1+?) log e(P)+O ? (n) comparisons
  3. an O(n 2:5) algorithm performing O(log e(P)) comparisons.
All our algorithms can be implemented in such a way that their computational bottleneck is confined in a preprocessing phase, while the sorting phase is completed in O(q)+O(n) time, where q denotes the number of comparisons performed.  相似文献   

13.
We bring out upper bounds for the orders of Abelian subgroups in finite simple groups. (For alternating and classical groups, these estimates are, or are nearly, exact.) Precisely, the following result, Theorem A, is proved. Let G be a non-Abelian finite simple group and G L2 (q), where q=pt for some prime number p. Suppose A is an Abelian subgroup of G. Then |A|3<|G|. Our proof is based on a classification of finite simple groups. As a consequence we obtain Theorem B, which states that a non-Abelian finite simple group G can be represented as ABA, where A and B are its Abelian subgroups, iff G≌ L2(2t) for some t ≥ 2; moreover, |A|-2t+1, |B|=2t, and A is cyclic and B an elementary 2-group. Translated fromAlgebra i Logika, Vol. 38, No. 2, pp. 131–160, March–April, 1999.  相似文献   

14.
Given a set S of n sites (points), and a distance measure d , the nearest neighbor searching problem is to build a data structure so that given a query point q , the site nearest to q can be found quickly. This paper gives data structures for this problem when the sites and queries are in a metric space. One data structure, D(S) , uses a divide-and-conquer recursion. The other data structure, M(S,Q) , is somewhat like a skiplist. Both are simple and implementable. The data structures are analyzed when the metric space obeys a certain sphere-packing bound, and when the sites and query points are random and have distributions with an exchangeability property. This property implies, for example, that query point q is a random element of . Under these conditions, the preprocessing and space bounds for the algorithms are close to linear in n . They depend also on the sphere-packing bound, and on the logarithm of the distance ratio of S , the ratio of the distance between the farthest pair of points in S to the distance between the closest pair. The data structure M(S,Q) requires as input data an additional set Q , taken to be representative of the query points. The resource bounds of M(S,Q) have a dependence on the distance ratio of S Q . While M(S,Q) can return wrong answers, its failure probability can be bounded, and is decreasing in a parameter K . Here K≤ |Q|/n is chosen when building M(S,Q) . The expected query time for M(S,Q) is O(Klog n)log , and the resource bounds increase linearly in K . The data structure D(S) has expected O( log n) O(1) query time, for fixed distance ratio. The preprocessing algorithm for M(S,Q) can be used to solve the all nearest neighbor problem for S in O(n(log n) 2 (log ϒ(S)) 2 ) expected time. Received September 17, 1996, and in revised form November 1, 1998.  相似文献   

15.
何勇 《应用数学学报》1999,22(1):123-129
本文讨论两台同类平行机排序问题,首先给出Multifit算法在不同迭代初值下的紧界,然后利用一个新设计的对偶贪婪子过程构造出线性时间6/5-复合近似算法。  相似文献   

16.
Let G be a permutation group on a set Ω with no fixed points in,and m be a positive integer.Then the movement of G is defined as move(G):=sup Γ {|Γg\Γ| | g ∈ G}.It was shown by Praeger that if move(G) = m,then |Ω| 3m + t-1,where t is the number of G-orbits on.In this paper,all intransitive permutation groups with degree 3m+t-1 which have maximum bound are classified.Indeed,a positive answer to her question that whether the upper bound |Ω| = 3m + t-1 for |Ω| is sharp for every t > 1 is given.  相似文献   

17.
In the case of Zd (d ≥ 2)-the positive d-dimensional lattice points with partial ordering ≤, {Xk,k ∈ Zd } i.i.d. random variables with mean 0, Sn = ∑k≤nXk and Vn2 = ∑j≤nX2j, the precise asymptotics for ∑n1/|n|(log|n|)dP(|Sn/vn|≥ ε√loglog|n|) and ∑n(logn|)δ/|n|(log|n|)d-1 P(|Sn/Vn| ≥ ε√log n), as ε ↘ 0, is established.  相似文献   

18.
In cumulative and disjunctive constraint-based scheduling, the resource constraint is enforced by several filtering rules. Among these rules, we have (extended) edge-finding and not-first/not-last rules. The not-first/not-last rule detects tasks that cannot run first/last relatively to a set of tasks and prunes their time bounds. In this paper, it is presented a sound O (n 2 log n) algorithm for the cumulative not-first/not-last rule where n is the number of tasks. This algorithm reaches the same fix point as previous not-first/not-last algorithms, although it may take additional iterations to do so. The worst case complexity of this new algorithm for the maximal adjustment is the same as our previous complete O (n 2|H| log n) not-first/not-last algorithm [7] where |H| is the maximum between the number of distinct earliest completion and latest start times of tasks. But, experimental results on benchmarks from the Project Scheduling Problem Library (PSPLib) and the Baptiste and Le Pape data set (BL) suggest that the new not-first/not-last algorithm has a substantially reduced runtime. Furthermore, the results demonstrate that in practice the new algorithm rarely requires more propagations than previous not-first/not-last algorithms.  相似文献   

19.
We prove first that if G is a finite solvable group of derived length d ≥ 2, then k(G) > |G|1/(2d−1), where k(G) is the number of conjugacy classes in G. Next, a growth assumption on the sequence [G(i): G(i+1)] 1 d−1 , where G(i) is theith derived group, leads to a |G|1/(2d−1) lower bound for k(G), from which we derive a |G|c/log 2log2|G| lower bound, independent of d(G). Finally, “almost logarithmic” lower bounds are found for solvable groups with a nilpotent maximal subgroup, and for all Frobenius groups, solvable or not.  相似文献   

20.
Abstract. We introduce two new related metrics, the geodesic width and the link width , for measuring the ``distance' between two nonintersecting polylines in the plane. If the two polylines have n vertices in total, we present algorithms to compute the geodesic width of the two polylines in O(n 2 log n) time using O(n 2 ) space and the link width in O(n 3 log n) time using O(n 2 ) working space where n is the total number of edges of the polylines. Our computation of these metrics relies on two closely related combinatorial strutures: the shortest-path diagram and the link diagram of a simple polygon. The shortest-path (resp., link) diagram encodes the Euclidean (resp., link) shortest path distance between all pairs of points on the boundary of the polygon. We use these algorithms to solve two problems: • Compute a continuous transformation that ``morphs' one polyline into another polyline. Our morphing strategies ensure that each point on a polyline moves as little as necessary during the morphing, that every intermediate polyline is also simple and disjoint to any other intermediate polyline, and that no portion of the polylines to be morphed is stretched or compressed by more than a user-defined parameter during the entire morphing. We present an algorithm that computes the geodesic width of the two polylines and utilizes it to construct a corresponding morphing strategy in O(n 2 log 2 n) time using O(n 2 ) space. We also give an O(nlog n) time algorithm to compute a 2-approximation of the geodesic width and a corresponding morphing scheme. • Locate a continuously moving target using a group of guards moving inside a simple polygon. The guards always determine a simple polygonal chain within the polygon, with consecutive guards along the chain being mutually visible. We compute a strategy that sweeps such a chain of guards through the polygon in order to locate a target. We compute in O(n 3 ) time and O(n 2 ) working space the minimum number r * of guards needed to sweep an n -vertex polygon. We also give an approximation algorithm, using O(n log n) time and O(n) space, to compute an integer r such that max(r - 16, 2)≤ r * ≤ r and P can be swept with a chain of r guards.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号