首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In this paper, we propose and analyze an accelerated augmented Lagrangian method (denoted by AALM) for solving the linearly constrained convex programming. We show that the convergence rate of AALM is O(1/k 2) while the convergence rate of the classical augmented Lagrangian method (ALM) is O(1/k). Numerical experiments on the linearly constrained l 1?l 2 minimization problem are presented to demonstrate the effectiveness of AALM.  相似文献   

2.
In this paper, we consider the Radar Placement and Power Assignment problem (RPPA) along a river. In this problem, a set of crucial points in the river are required to be monitored by a set of radars which are placed along the two banks. The goal is to choose the locations for the radars and assign powers to them such that all the crucial points are monitored and the total power is minimized. If each crucial point is required to be monitored by at least k radars, the problem is a k-Coverage RPPA problem (k-CRPPA). Under the assumption that the river is sufficiently smooth, one may focus on the RPPA problem along a strip (RPPAS). In this paper, we present an O(n 9) dynamic programming algorithm for the RPPAS, where n is the number of crucial points to be monitored. In the special case where radars are placed only along the upper bank, we present an O(kn 5) dynamic programming algorithm for the k-CRPPAS. For the special case that the power is linearly dependent on the radius, we present an O(n log n)-time \({2\sqrt 2}\)-approximation algorithm for the RPPAS.  相似文献   

3.
We study vertex cut and flow sparsifiers that were recently introduced by Moitra (2009), and Leighton and Moitra (2010). We improve and generalize their results. We give a new polynomial-time algorithm for constructing O(log k/ log log k) cut and flow sparsifiers, matching the best known existential upper bound on the quality of a sparsifier, and improving the previous algorithmic upper bound of O(log2k/ log log k). We show that flow sparsifiers can be obtained from linear operators approximating minimum metric extensions. We introduce the notion of (linear) metric extension operators, prove that they exist, and give an exact polynomialtime algorithm for finding optimal operators.  相似文献   

4.
Locating proximal points is a component of numerous minimization algorithms. This work focuses on developing a method to find the proximal point of a convex function at a point, given an inexact oracle. Our method assumes that exact function values are at hand, but exact subgradients are either not available or not useful. We use approximate subgradients to build a model of the objective function, and prove that the method converges to the true prox-point within acceptable tolerance. The subgradient g k used at each step k is such that the distance from g k to the true subdifferential of the objective function at the current iteration point is bounded by some fixed ε > 0. The algorithm includes a novel tilt-correct step applied to the approximate subgradient.  相似文献   

5.
It was proved that the complexity of square root computation in the Galois field GF(3s), s = 2kr, is equal to O(M(2k)M(r)k + M(r) log2r) + 2kkr1+o(1), where M (n) is the complexity of multiplication of polynomials of degree n over fields of characteristics 3. The complexity of multiplication and division in the field GF(3s) is equal to O(M(2k)M(r)) and O(M(2k)M(r)) + r1+o(1), respectively. If the basis in the field GF(3r) is determined by an irreducible binomial over GF(3) or is an optimal normal basis, then the summands 2kkr1+o(1) and r1+o(1) can be omitted. For M(n) one may take n log2nψ(n) where ψ(n) grows slower than any iteration of the logarithm. If k grow and r is fixed, than all the estimates presented here have the form Or (M (s) log 2s) = s (log 2s)2ψ(s).  相似文献   

6.
In 1982 Thomassen asked whether there exists an integer f(k,t) such that every strongly f(k,t)-connected tournament T admits a partition of its vertex set into t vertex classes V 1,…V t such that for all i the subtournament T[V i] induced on T by V i is strongly k-connected. Our main result implies an affirmative answer to this question. In particular we show that f(k, t)=O(k 7 t 4) suffices. As another application of our main result we give an affirmative answer to a question of Song as to whether, for any integer t, there exists aninteger h(t) such that every strongly h(t)-connected tournament has a 1-factor consisting of t vertex-disjoint cycles of prescribed lengths. We show that h(t)=O(t 5) suffices.  相似文献   

7.
Suppose each of kn o(1) players holds an n-bit number x i in its hand. The players wish to determine if ∑ ik x i =s. We give a public-coin protocol with error 1% and communication O(k logk). The communication bound is independent of n, and for k≥3 improves on the O(k logn) bound by Nisan (Bolyai Soc. Math. Studies; 1993).  相似文献   

8.
In this paper, we develop a parameterized proximal point algorithm (P-PPA) for solving a class of separable convex programming problems subject to linear and convex constraints. The proposed algorithm is provable to be globally convergent with a worst-case O(1 / t) convergence rate, where t denotes the iteration number. By properly choosing the algorithm parameters, numerical experiments on solving a sparse optimization problem arising from statistical learning show that our P-PPA could perform significantly better than other state-of-the-art methods, such as the alternating direction method of multipliers and the relaxed proximal point algorithm.  相似文献   

9.
A new computational algorithm based on a fast way of computing integral operators describing the coagulation process is proposed for a mathematical model of coagulating particles. Using this algorithm, the computational complexity of each timestep of an explicit difference scheme can be substantially reduced. For each step, the complexity of execution is reduced from O(NM2) arithmetic operations to O(NMRlnM), where N is the number of mesh points along the physical coordinates of particles, M is the number of mesh points in a grid corresponding to sizes of coagulating particles, and R is the rank of a matrix corresponding to the values of the function of a coagulation kernel at mesh points. Using this approach, computations can be greatly accelerated, provided that kernel rank R is small.  相似文献   

10.
In this paper we consider a super-Brownian motion X with branching mechanism k(x)zα, where k(x) > 0 is a bounded Holder continuous function on Rd and infx∈Rd k(x) = 0. We prove that if k(x) ≥ //x// -l(0 ≤l < ∞) for sufficiently large x, then X has compact support property, and for dimension d = 1, if k(x) ≥exp(-l‖x‖)(0≤l < ∞) for sufficiently large x, then X also has compact support property. The maximal order of k(x) for finite time extinction is different between d = 1, d = 2 and d ≥ 3: it is O(‖x‖-(α+1)) in one dimension, O(‖x‖-2(log‖x‖)-(α+1) ) in two dimensions, and O(‖x‖2) in higher dimensions. These growth orders also turn out to be the maximum order for the nonexistence of a positive solution for 1/2Δu =k(x)uα.  相似文献   

11.
In this paper we consider the k-fixed-endpoint path cover problem on proper interval graphs, which is a generalization of the path cover problem. Given a graph G and a set T of k vertices, a k-fixed-endpoint path cover of G with respect to T is a set of vertex-disjoint simple paths that covers the vertices of G, such that the vertices of T are all endpoints of these paths. The goal is to compute a k-fixed-endpoint path cover of G with minimum cardinality. We propose an optimal algorithm for this problem with runtime O(n), where n is the number of intervals in G. This algorithm is based on the Stair Normal Interval Representation (SNIR) matrix that characterizes proper interval graphs. In this characterization, every maximal clique of the graph is represented by one matrix element; the proposed algorithm uses this structural property, in order to determine directly the paths in an optimal solution.  相似文献   

12.
In this paper we present an infeasible-interior-point algorithm, based on a new wide neighbourhood N(τ1, τ2, η), for linear programming over symmetric cones. We treat the classical Newton direction as the sum of two other directions. We prove that if these two directions are equipped with different and appropriate step sizes, then the new algorithm has a polynomial convergence for the commutative class of search directions. In particular, the complexity bound is O(r1.5logε?1) for the Nesterov-Todd (NT) direction, and O(r2logε?1) for the xs and sx directions, where r is the rank of the associated Euclidean Jordan algebra and ε > 0 is the required precision. If starting with a feasible point (x0, y0, s0) in N(τ1, τ2, η), the complexity bound is \(O\left( {\sqrt r \log {\varepsilon ^{ - 1}}} \right)\) for the NT direction, and O(rlogε?1) for the xs and sx directions. When the NT search direction is used, we get the best complexity bound of wide neighborhood interior-point algorithm for linear programming over symmetric cones.  相似文献   

13.
A variant of Simulated Annealing termed Simulated Annealing with Multiplicative Weights (SAMW) has been proposed in the literature. However, convergence was dependent on a parameter β(T), which was calculated a-priori based on the total iterations T the algorithm would run for. We first show the convergence of SAMW even when a diminishing stepsize βk → 1 is used, where k is the index of iteration. Using this SAMW as a kernel, a stochastic multi-armed bandit (SMAB) algorithm called SOFTMIX can be improved to obtain the minimum-possible log regret, as compared to log2 regret of the original. Another modification of SOFTMIX is proposed which avoids the need for a parameter that is dependent on the reward distribution of the arms. Further, a variant of SOFTMIX that uses a comparison term drawn from another popular SMAB algorithm called UCB1 is then described. It is also shown why the proposed scheme is computationally more efficient over UCB1, and an alternative to this algorithm with simpler stepsizes is also proposed. Numerical simulations for all the proposed algorithms are then presented.  相似文献   

14.
The paper considers cubature formulas for calculating integrals of functions f(X), X = (x 1, …, x n ) which are defined on the n-dimensional unit hypercube K n = [0, 1] n and have integrable mixed derivatives of the kind \(\partial _{\begin{array}{*{20}c} {\alpha _1 \alpha _n } \\ {x_1 , \ldots , x_n } \\ \end{array} } f(X)\), 0 ≤ α j ≤ 2. We estimate the errors R[f] = \(\smallint _{K^n } \) f(X)dX ? Σ k = 1 N c k f(X(k)) of cubature formulas (c k > 0) as functions of the weights c k of nodes X(k) and properties of integrable functions. The error is estimated in terms of the integrals of the derivatives of f over r-dimensional faces (rn) of the hypercube K n : |R(f)| ≤ \(\sum _{\alpha _j } \) G j )\(\int_{K^r } {\left| {\partial _{\begin{array}{*{20}c} {\alpha _1 \alpha _n } \\ {x_1 , \ldots , x_n } \\ \end{array} } f(X)} \right|} \) dX r , where coefficients G j ) are criteria which depend only on parameters c k and X(k). We present an algorithm to calculate these criteria in the two- and n-dimensional cases. Examples are given. A particular case of the criteria is the discrepancy, and the algorithm proposed is a generalization of those used to compute the discrepancy. The results obtained can be used for optimization of cubature formulas as functions of c k and X(k).  相似文献   

15.
We prove generalized Hyers-Ulam–Rassias stability of the cubic functional equation f(kx+y)+f(kx?y)=k[f(x+y)+f(x?y)]+2(k 3?k)f(x) for all \(k\in \Bbb{N}\) and the quartic functional equation f(kx+y)+f(kx?y)=k 2[f(x+y)+f(x?y)]+2k 2(k 2?1)f(x)?2(k 2?1)f(y) for all \(k\in \Bbb{N}\) in non-Archimedean normed spaces.  相似文献   

16.
An exclusive-OR sum of pseudoproducts (ESPP), or a pseudopolynomial over a finite field is a sum of products of linear functions. The length of an ESPP is defined as the number of its pairwise distinct summands. The length of a function f over this field in the class of ESPPs is the minimum length of an ESPP representing this function. The Shannon length function L k ESPP (n) on the set of functions over a finite field of k elements in the class of ESPPs is considered; it is defined as the maximum length of a function of n variables over this field in the class of ESPPs. It is proved that L k ESPP (n) = O(k n /n 2).  相似文献   

17.
Let G = (V,A) be a digraph and k ≥ 1 an integer. For u, vV, we say that the vertex u distance k-dominate v if the distance from u to v at most k. A set D of vertices in G is a distance k-dominating set if each vertex of V D is distance k-dominated by some vertex of D. The distance k-domination number of G, denoted by γ k (G), is the minimum cardinality of a distance k-dominating set of G. Generalized de Bruijn digraphs G B (n, d) and generalized Kautz digraphs G K (n, d) are good candidates for interconnection networks. Denote Δ k := (∑ j=0 k d j )?1. F. Tian and J. Xu showed that ?nΔ k ? γ k (G B (n, d)) ≤?n/d k? and ?nΔ k ? ≤ γ k (G K (n, d)) ≤ ?n/d k ?. In this paper, we prove that every generalized de Bruijn digraph G B (n, d) has the distance k-domination number ?nΔ k ? or ?nΔ k ?+1, and the distance k-domination number of every generalized Kautz digraph G K (n, d) bounded above by ?n/(d k?1+d k )?. Additionally, we present various sufficient conditions for γ k (G B (n, d)) = ?nΔ k ? and γ k (G K (n, d)) = ?nΔ k ?.  相似文献   

18.
We study the number of k-element sets A? {1,...,N} with |A+A| ≤ K|A| for some (fixed) K > 0. Improving results of the first author and of Alon, Balogh, Samotij and the second author, we determine this number up to a factor of 2 o ( k ) N o (1) for most N and k. As a consequence of this and a further new result concerning the number of sets A??/N? with |A+A| ≤ c|A|2, we deduce that the random Cayley graph on ?/N? with edge density ½ has no clique or independent set of size greater than (2+o(1)) log2 N, asymptotically the same as for the Erd?s-Rényi random graph. This improves a result of the first author from 2003 in which a bound of 160log2 N was obtained. As a second application, we show that if the elements of A ? ? are chosen at random, each with probability 1/2, then the probability that A+A misses exactly k elements of ? is equal to (2+O(1))?k/2 as k → ∞.  相似文献   

19.
A fast algorithm is proposed for solving symmetric Toeplitz systems. This algorithm continuously transforms the identity matrix into the inverse of a given Toeplitz matrix T. The memory requirements for the algorithm are O(n), and its complexity is O(log κ(T)nlogn), where (T) is the condition number of T. Numerical results are presented that confirm the efficiency of the proposed algorithm.  相似文献   

20.
We establish necessary and sufficient conditions for embeddings of Bessel potential spaces H σ X(IR n ) with order of smoothness σ?∈?(0, n), modelled upon rearrangement invariant Banach function spaces X(IR n ), into generalized Hölder spaces (involving k-modulus of smoothness). We apply our results to the case when X(IR n ) is the Lorentz-Karamata space \(L_{p,q;b}({{\rm I\kern-.17em R}}^n)\). In particular, we are able to characterize optimal embeddings of Bessel potential spaces \(H^{\sigma}L_{p,q;b}({{\rm I\kern-.17em R}}^n)\) into generalized Hölder spaces. Applications cover both superlimiting and limiting cases. We also show that our results yield new and sharp embeddings of Sobolev-Orlicz spaces W k?+?1 L n/k(logL) α (IR n ) and W k L n/k(logL) α (IR n ) into generalized Hölder spaces.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号