首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Let G be a connected graph. We reformulate Stark and Terras' Galois Theory for a quotient H of a regular covering K of a graph G by using voltage assignments. As applications, we show that the weighted Bartholdi L-function of H associated to the representation of the covering transformation group of H is equal to that of G associated to its induced representation in the covering transformation group of K. Furthermore, we express the weighted Bartholdi zeta function of H as a product of weighted Bartholdi L-functions of G associated to irreducible representations of the covering transformation group of K. We generalize Stark and Terras' Galois Theory to digraphs, and apply to weighted Bartholdi L-functions of digraphs.  相似文献   

2.
3.
The problem of scheduling the production and delivery of a supplier to feed the production of F manufacturers is studied. The orders fulfilled by the supplier are delivered to the manufacturers in batches of the same size. The supplier's production line has to be set up whenever it switches from processing an order of one manufacturer to an order of another manufacturer. The objective is to minimize the total setup cost, subject to maintaining continuous production for all manufacturers. The problem is proved to be NP-hard. It is reduced to a single machine scheduling problem with deadlines and jobs belonging to F part types. An O(NlogF) algorithm, where N is the number of delivery batches, is presented to find a feasible schedule. A dynamic programming algorithm with O(N F /F F–2) running time is presented to find an optimal schedule. If F=2 and setup costs are unit, an O(N) time algorithm is derived.  相似文献   

4.
In this paper, we consider a portfolio of n dependent risks X1,…,Xn and we study the stochastic behavior of the aggregate claim amount S=X1+?+Xn. Our objective is to determine the amount of economic capital needed for the whole portfolio and to compute the amount of capital to be allocated to each risk X1,…,Xn. To do so, we use a top-down approach. For (X1,…,Xn), we consider risk models based on multivariate compound distributions defined with a multivariate counting distribution. We use the TVaR to evaluate the total capital requirement of the portfolio based on the distribution of S, and we use the TVaR-based capital allocation method to quantify the contribution of each risk. To simplify the presentation, the claim amounts are assumed to be continuously distributed. For multivariate compound distributions with continuous claim amounts, we provide general formulas for the cumulative distribution function of S, for the TVaR of S and the contribution to each risk. We obtain closed-form expressions for those quantities for multivariate compound distributions with gamma and mixed Erlang claim amounts. Finally, we treat in detail the multivariate compound Poisson distribution case. Numerical examples are provided in order to examine the impact of the dependence relation on the TVaR of S, the contribution to each risk of the portfolio, and the benefit of the aggregation of several risks.  相似文献   

5.
The major drawback of the s-step iterative methods for nonsymmetric linear systems of equations is that, in the floating-point arithmetic, a quick loss of orthogonality of s-dimensional direction subspaces can occur, and consequently slow convergence and instability in the algorithm may be observed as s gets larger than 5. In [18], Swanson and Chronopoulos have demonstrated that the value of s in the s-step Orthomin(k) algorithm can be increased beyond s=5 by orthogonalizing the s direction vectors in each iteration, and have shown that the ATA-orthogonal s-step Orthomin(k) is stable for large values of s (up to s=16). The subject of this paper is to show how by using the CADNA library, it is possible to determine a good value of s for ATA-orthogonal s-step Orthomin(k), and during the run of its code to detect the numerical instabilities and to stop the process correctly, and to restart the ATA-orthogonal s-step Orthomin(k) in order to improve the computed solution. Numerical examples are used to show the good numerical properties. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   

6.
7.
We discuss the Fredholm and properness properties of second-order quasilinear elliptic operators viewed as mappings from W2,p( R N) to Lp( R N) with N < p < ∞. The unboundedness of the domain makes the standard Sobolev embedding theorems inadequate to investigate such issues. Instead, we develop several new tools and methods to obtain fairly simple necessary and suffcient conditions for such operators to be Fredholm with a given index and to be proper on the closed bounded subsets of W2,p( R N). It is noteworthy that the translation invariance of the domain, well-known to be responsible for the lack of compactness in the Sobolev embedding theorems, is taken advantage of to establish results in the opposite direction and is indeed crucial to the proof of the properness criteria. The limitation to second-order and scalar equations chosen in our exposition is relatively unimportant, as none of the arguments involved here relies upon either of these assumptions. Generalizations to higher order equations or to systems are thus clearly possible with a variableamount of extra work. Various applications, notably but not limited, to global bifurcation problems, are described elsewhere.  相似文献   

8.
We consider a generalization of the classical facility location problem, where we require the solution to be fault-tolerant. In this generalization, every demand point j must be served by rj facilities instead of just one. The facilities other than the closest one are “backup” facilities for that demand, and any such facility will be used only if all closer facilities (or the links to them) fail. Hence, for any demand point, we can assign nonincreasing weights to the routing costs to farther facilities. The cost of assignment for demand j is the weighted linear combination of the assignment costs to its rj closest open facilities. We wish to minimize the sum of the cost of opening the facilities and the assignment cost of each demand j. We obtain a factor 4 approximation to this problem through the application of various rounding techniques to the linear relaxation of an integer program formulation. We further improve the approximation ratio to 3.16 using randomization and to 2.41 using greedy local-search type techniques.  相似文献   

9.
A Fuzzy Vault Scheme   总被引:2,自引:0,他引:2  
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value κ in a fuzzy vault and “lock” it using a set A of elements from some public universe U. If Bob tries to “unlock” the vault using a set B of similar length, he obtains κ only if B is close to A, i.e., only if A and B overlap substantially. In constrast to previous constructions of this flavor, ours possesses the useful feature of order invariance, meaning that the ordering of A and B is immaterial to the functioning of the vault. As we show, our scheme enjoys provable security against a computationally unbounded attacker. Fuzzy vaults have potential application to the problem of protecting data in a number of real-world, error-prone environments. These include systems in which personal information serves to authenticate users for, e.g., the purposes of password recovery, and also to biometric authentication systems, in which readings are inherently noisy as a result of the refractory nature of image capture and processing.  相似文献   

10.
Several improvements are made to an algorithm of Higham and Smith for computing the matrix cosine. The original algorithm scales the matrix by a power of 2 to bring the ∞-norm to 1 or less, evaluates the [8/8] Padé approximant, then uses the double-angle formula cos (2A)=2cos 2AI to recover the cosine of the original matrix. The first improvement is to phrase truncation error bounds in terms of ‖A21/2 instead of the (no smaller and potentially much larger quantity) ‖A‖. The second is to choose the degree of the Padé approximant to minimize the computational cost subject to achieving a desired truncation error. A third improvement is to use an absolute, rather than relative, error criterion in the choice of Padé approximant; this allows the use of higher degree approximants without worsening an a priori error bound. Our theory and experiments show that each of these modifications brings a reduction in computational cost. Moreover, because the modifications tend to reduce the number of double-angle steps they usually result in a more accurate computed cosine in floating point arithmetic. We also derive an algorithm for computing both cos (A) and sin (A), by adapting the ideas developed for the cosine and intertwining the cosine and sine double angle recurrences. AMS subject classification 65F30 Numerical Analysis Report 461, Manchester Centre for Computational Mathematics, February 2005. Gareth I. Hargreaves: This work was supported by an Engineering and Physical Sciences Research Council Ph.D. Studentship. Nicholas J. Higham: This work was supported by Engineering and Physical Sciences Research Council grant GR/T08739 and by a Royal Society–Wolfson Research Merit Award.  相似文献   

11.
In 2003, Maróti showed that one could use the machinery of -cores and -quotients of partitions to establish lower bounds for p(n), the number of partitions of n. In this paper we explore these ideas in the case =2, using them to give a largely combinatorial proof of an effective upper bound on p(n), and to prove asymptotic formulae for the number of self-conjugate partitions, and the number of partitions with distinct parts. In a further application we give a combinatorial proof of an identity originally due to Gauss. Dedicated to the memory of Dr. Manfred Schocker (1970–2006)  相似文献   

12.
We consider the spectrally hyperviscous Navier–Stokes equations (SHNSE) which add hyperviscosity to the NSE but only to the higher frequencies past a cutoff wavenumber m0m0. In Guermond and Prudhomme (2003) [18], subsequence convergence of SHNSE Galerkin solutions to dissipative solutions of the NSE was achieved in a specific spectral-vanishing-viscosity setting. Our goal is to obtain similar results in a more general setting and to obtain convergence to the stronger class of Leray solutions. In particular we obtain subsequence convergence of SHNSE strong solutions to Leray solutions of the NSE by fixing the hyperviscosity coefficient μμ while the spectral hyperviscosity cutoff m0m0 goes to infinity. This formulation presents new technical challenges, and we discuss how its motivation can be derived from computational experiments, e.g. those in Borue and Orszag (1996, 1998)  and . We also obtain weak subsequence convergence to Leray weak solutions under the general assumption that the hyperviscous coefficient μμ goes to zero with no constraints imposed on the spectral cutoff. In both of our main results the Aubin Compactness Theorem provides the underlying framework for the convergence to Leray solutions.  相似文献   

13.
Sums across the rows of Pascal's triangle yield n2 while certain diagonal sums yield the Fibonacci numbers which are asymptotic to ?n where ? is the golden ratio. Sums across other diagonals yield quantities asymptotic to cn where c depends on the directions of the diagonals. We generalize this to the continuous case. Using the gamma function, we generalize the binomial coefficients to real variables and thus form a generalization of Pascal's triangle. Integration over various families of lines and curves yields quantities asymptotic to cx where c is determined by the family and x is a parameter. Finally, we revisit the discrete case to get results on sums along curves.  相似文献   

14.
We introducegeneral starvation and consider cyclic networks withgeneral blocking and starvation (GBS). The mechanism of general blocking allows the server to process a limited number of jobs when the buffer downstream is full, and that of general starvation allows the server to perform a limited number of services in anticipation of jobs that are yet to arrive. The two main goals of this paper are to investigate how the throughput of cyclic GBS networks is affected by varying (1) the total number of jobsJ, and (2) the buffer allocationk=(k1..., km) subject to a fixed total buffer capacityK=k 1 +... + km. In particular, we obtain sufficient conditions for the throughput to be symmetric inJ and to be maximized whenJ=K/2. We also show that the equal buffer allocation is optimal under the two regimes of light or heavy usage. In order to establish these results, we obtain several intermediate structural properties of the throughput, using duality, reversibility, and concavity, which are of independent interest.Research supported in part by NSF Grant No. ECS-8919818.  相似文献   

15.
16.
17.
This paper provides new developments in generalized differentiation theory of variational analysis with their applications to metric regularity of parameterized constraint and variational systems in finite-dimensional and infinite-dimensional spaces. Our approach to the study of metric regularity for these two major classes of parametric systems is based on appropriate coderivative constructions for set-valued mappings and on extended calculus rules supporting their computation and estimation. The main attention is paid in this paper to the so-called reversed mixed coderivative, which is of crucial importance for efficient pointwise characterizations of metric regularity in the general framework of set-valued mappings between infinite-dimensional spaces. We develop new calculus results for the latter coderivative that allow us to compute it for large classes of parametric constraint and variational systems. On this basis we derive verifiable sufficient conditions, necessary conditions as well as complete characterizations for metric regularity of such systems with computing the corresponding exact bounds of metric regularity constants/moduli. This approach allows us to reveal general settings in which metric regularity fails for major classes of parametric variational systems. Furthermore, the developed coderivative calculus leads us also to establishing new formulas for computing the radius of metric regularity for constraint and variational systems, which characterize the maximal region of preserving metric regularity under linear (and other types of) perturbations and are closely related to conditioning aspects of optimization.  相似文献   

18.
We define an aggregation function to be (at most) k-intolerant if it is bounded from above by its kth lowest input value. Applying this definition to the discrete Choquet integral and its underlying capacity, we introduce the concept of k-intolerant capacities which, when varying k from 1 to n, cover all the possible capacities on n objects. Just as the concepts of k-additive capacities and p-symmetric capacities have been previously introduced essentially to overcome the problem of computational complexity of capacities, k-intolerant capacities are proposed here for the same purpose but also for dealing with intolerant or tolerant behaviors of aggregation. We also introduce axiomatically indices to appraise the extent to which a given capacity is k-intolerant and we apply them on a particular recruiting problem.  相似文献   

19.
A k-product uncapacitated facility location problem can be described as follows. There is a set of demand points where clients are located and a set of potential sites where facilities of unlimited capacities can be set up. There are k different kinds of products. Each client needs to be supplied with k kinds of products by a set of k different facilities and each facility can be set up to supply only a distinct product with a non-negative fixed cost determined by the product it intends to supply. There is a non-negative cost of shipping goods between each pair of locations. These costs are assumed to be symmetric and satisfy the triangle inequality. The problem is to select a set of facilities to be set up and their designated products and to find an assignment for each client to a set of k   facilities so that the sum of the setup costs and the shipping costs is minimized. In this paper, an approximation algorithm within a factor of 2k+12k+1 of the optimum cost is presented. Assuming that fixed setup costs are zero, we give a 2k-12k-1 approximation algorithm for the problem. In addition we show that for the case k=2k=2, the problem is NP-complete when the cost structure is general and there is a 2-approximation algorithm when the costs are symmetric and satisfy the triangle inequality. The algorithm is shown to produce an optimal solution if the 2-product uncapacitated facility location problem with no fixed costs happens to fall on a tree graph.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号