We introduce the generalized notion of automata synchronization, so called partial synchronization, which holds for automata with partial transition function. We give a lower bound for the length of minimal synchroniz...
详细信息
ISBN:
(数字)9783540775669
ISBN:
(纸本)9783540775652
We introduce the generalized notion of automata synchronization, so called partial synchronization, which holds for automata with partial transition function. We give a lower bound for the length of minimal synchronizing words for partial synchronizing automata. the difference, in comparison to the 'classical' synchronization, lies in the initial conditions: let A = (Q, A, delta) be an automaton representing the dynamics of a particular system. In case of partial synchronization we assume that initial conditions (initial state of the system) can be represented by some particular states, that is by some P C Q, not necessarily by all possible states from Q. At first glance the above assumption limits our room for manoeuvre for constructing possibly long minimal synchronizing words (because of the lower number of states at the beginning). Unexpectedly this assumption allows us to construct longer minimal synchronizing words than in a standard case. In our proof we use Sperner's theorem and some basic combinatorics.
In John Tantalo's on-line game Planarity the player is given a non-plane straight-line drawing of a planar graph. the aim is to make the drawing plane as quickly as possible by moving vertices. Pach and Tardos hav...
详细信息
ISBN:
(数字)9783540775669
ISBN:
(纸本)9783540775652
In John Tantalo's on-line game Planarity the player is given a non-plane straight-line drawing of a planar graph. the aim is to make the drawing plane as quickly as possible by moving vertices. Pach and Tardos have posed a related problem: can any straight-line drawing of any planar graph with n vertices be made plane by vertex moves while keeping Omega(n(epsilon)) vertices fixed for some absolute constant epsilon > 0? It is known that three vertices can always be kept (if n > 5). We still do not solve the problem of Pach and Tardos, but we report some progress. We prove that the number of vertices that can be kept actually grows withthe size of the graph. More specifically, we give a lower bound of Omega(root log n/ log log n) on this number. By the same technique we show that in the case of outerplanar graphs we can keep a lot more, namely Omega(root n) vertices. We also construct a family of outerplanar graphs for which this bound is asymptotically tight.
Model complexity of feedforward neural networks is studied in terms of rates of variable-basis approximation. Sets of functions, for which the errors in approximation by neural networks with n hidden units converge to...
详细信息
taDOM* protocols are designed to provide lock-based approach to handle multiple access to XML databases. the notion of taDOM+ protocol is formalized and generalized and a formal model of taDOM+ lock manager that is pa...
详细信息
the technical literature in cognitive science informs that working in groups reaps more benefits than working alone. We are seeing a variety of innovative group programming methodologies like the agile methods. this w...
详细信息
the technical literature in cognitive science informs that working in groups reaps more benefits than working alone. We are seeing a variety of innovative group programming methodologies like the agile methods. this work examines the findings of a pilot study carried out during the first academic semester of 2007. the subjects were 110 freshmen computing and engineering students taking their first programming course at the Federal University of Amazonas. Based on these findings, it is proposed a programming progression learning scheme, from individual (currentpractice) to group programming (the desired practice based on the literature review). Such transition is necessary for students are not used to programming in groups. In order to evaluate such progression learning scheme a case study is outlined.
Students of computerscience freshman year usually develop assembler programs to learn processor architecture. Homework exercises are done on paper, while those in lab sessions are solved withthe aid of programming t...
详细信息
Students of computerscience freshman year usually develop assembler programs to learn processor architecture. Homework exercises are done on paper, while those in lab sessions are solved withthe aid of programming tools. Students perceive theory and lab as different subjects, so they donpsilat use lab tools to test their theory solved problems. Moreover, during lab sessions, students often tend to ask for the teacherpsilas guide and advice instead of using the debugging tools because these are new and unfriendly for them, and do not offer a quick and clear feedback. In this paper we present an automatic and friendly assessment tool, SISA-EMU, with a novel feature: exercise driven feedback with teacherpsilas expertise. It provides correctness information and clues to help the students solve their most common mistakes for each individual problem (and not typical generic debug information) without the physical support of a teacher. SISA-EMU is currently in pre-deploy phase via a Moodle learning platform and we will have first evaluation results by the end of the current term.
We consider a problem of computing the maximal value associated to the nodes of a network in the model of unknown symmetric radio network with availability of collision detection. We assume that the nodes have no init...
详细信息
ISBN:
(纸本)9783540695066
We consider a problem of computing the maximal value associated to the nodes of a network in the model of unknown symmetric radio network with availability of collision detection. We assume that the nodes have no initial knowledge about the network topology, number of nodes and even they have no identifiers. the network contains one distinguished node, called initiator, that starts the process of computing. We design a series of algorithms that result into an asymptotically optimal deterministic algorithm completing the task in theta(ecc + log Max) rounds, where ecc is the eccentricity of the initiator and Max is the maximal value among the integer values associated to the nodes. Some other utilisations of the developed algorithm are presented as well.
We design a formal model of an amorphous computer suitable for theoretical investigation of its computational properties. the model consists of a finite set of nodes created by RAMs with restricted memory, which are d...
详细信息
ISBN:
(纸本)9783540695066
We design a formal model of an amorphous computer suitable for theoretical investigation of its computational properties. the model consists of a finite set of nodes created by RAMs with restricted memory, which are dispersed uniformly in a given area. Within a limited radius the nodes can communicate withtheir neighbors via a single-channel radio. the assumptions on low-level communication abilities are among the weakest possible: the nodes work asynchronously, there is no broadcasting collision detection mechanism and no network addresses. For the underlying network we design a randomized communication protocol and analyze its efficiency. the subsequent experiments and combinatorial analysis of random networks show that the expectations under which our protocol was designed are met by the vast majority of the instances of our amorphous computer model.
We examine the parameterized complexity of t-DOMINATING SET, the problem of finding a set of at most k nodes that dominate at least t nodes of a graph G = (V, E). the classic NP-complete problem DOMINATING SET, which ...
详细信息
ISBN:
(纸本)9783540695066
We examine the parameterized complexity of t-DOMINATING SET, the problem of finding a set of at most k nodes that dominate at least t nodes of a graph G = (V, E). the classic NP-complete problem DOMINATING SET, which can be seen to be t-DOMINATING SET withthe restriction that t = n, has long been known to be W[2]-complete when parameterized in k. Whereas this implies W[2]-hardness for t-DOMINATING SET and the parameter k, we are able to prove fixed-parameter tractability for t-DOMINATING SET and the parameter t. More precisely, we obtain a quintic problem kernel and a randomized O((4 + epsilon)(t) poly(n)) algorithm. the algorithm is based on the divide-and-color method introduced to the community earlier this year, rather intuitive and can be derandomized using a standard framework.
暂无评论