首页 > 最新文献

Random Struct. Algorithms最新文献

英文 中文
Hamilton cycles in random graphs and directed graphs 随机图和有向图中的汉密尔顿环
Pub Date : 2000-07-01 DOI: 10.1002/1098-2418(200007)16:4%3C369::AID-RSA6%3E3.0.CO;2-J
C. Cooper, A. Frieze
{"title":"Hamilton cycles in random graphs and directed graphs","authors":"C. Cooper, A. Frieze","doi":"10.1002/1098-2418(200007)16:4%3C369::AID-RSA6%3E3.0.CO;2-J","DOIUrl":"https://doi.org/10.1002/1098-2418(200007)16:4%3C369::AID-RSA6%3E3.0.CO;2-J","url":null,"abstract":"","PeriodicalId":303496,"journal":{"name":"Random Struct. Algorithms","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124920401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Percolation in a dependent random environment 依赖随机环境中的渗透
Pub Date : 2000-07-01 DOI: 10.1002/1098-2418(200007)16:4%3C333::AID-RSA3%3E3.0.CO;2-C
J. Jonasson, Elchanan Mossel, Y. Peres
Draw planes in R3 that are orthogonal to the x axis, and intersect the x axis at the points of a Poisson process with intensity λ; similarly, draw planes orthogonal to the y and z axes using independent Poisson processes (with the same intensity). Taken together, these planes naturally define a randomly stretched rectangular lattice. Consider bond percolation on this lattice where each edge of length is open with probability e−, and these events are independent given the edge lengths. We show that this model exhibits a phase transition: for large enough λ there is an infinite open cluster a.s., and for small λ all open clusters are finite a.s. We prove this result using the method of paths with exponential intersection tails, which is not applicable in two dimensions. The question whether the analogous process in the plane exhibits a phase transition is open. Disciplines Statistics and Probability This journal article is available at ScholarlyCommons: https://repository.upenn.edu/statistics_papers/434 ! " # $ $ &% '( )* %+ , -/.1032/45-/.1432/676 .14 8 9;:<0=2/432/4?>?.1676 @A9 B,CEDF2/9HG#@AI @A6 J 032/9;KL@MI76ON 4=PQD1@AI 6 PQR ST./U#V#@A:<0=4=.19W.1X/S(2F4=Y5Z*@M[=I7@A]N*4=PWD/@MI76 PWR S^./U -/@AI C=6 2/9;@AK _3@M[=I7C32/I`S(aEbdc/e/e1e f*gEh7i`j
在R3中绘制与x轴正交的平面,并在泊松过程的点处与x轴相交,强度为λ;同样,使用独立的泊松过程(具有相同的强度)绘制与y轴和z轴正交的平面。这些平面合在一起,自然地定义了一个随机拉伸的矩形晶格。考虑这种晶格上的键渗透,其中每条长度的边都以e−的概率打开,并且这些事件在给定的边长度下是独立的。我们证明了该模型表现出一个相变:当λ足够大时,存在一个无限开簇,而当λ足够小时,所有开簇都是有限开簇。我们使用具有指数相交尾的路径方法证明了这一结果,该方法不适用于二维。平面上的类似过程是否表现出相变的问题是开放的。这篇期刊文章可以在ScholarlyCommons上找到:https://repository.upenn.edu/statistics_papers/434 !# $ $ &% '()* %+, -/.1032/45-/。1432/676 .14 8 9;;1676 @A9 B,CEDF2/9HG#@AI @A6 J 032/9;KL@MI76ON 4=PQD1@AI 6 PQR ST./ u# V#@A:=?;A@3ï ÙaEbdcLe f_g(=4Wih·ßDX1äkjl ma&eLnV^]N>^#b3No9 Spb3c =VcIq?9 > WrU cIfs = 4 cin # u†þyþ(t # u真空断路)ND9va > wx = y z | {i n eþe} y ~ 6þj8h·ßDX1a(~ 6€y‚ƒ{…„u W†b cL‡苏W ^ 9 s‹Œ9 c O问b3c‰_b cI‡_n”(u>= (n ND9c吗?N=‰# = u’‘(“1 y”“•u cm‹+ @ N > ^ = pn (u W W =Š/ u c‰9 > c–dq b W 9 db—g4a = VaOu†þD˜y”“•b W =™9 c‰—=šŠ/ = 4 c‰—= 4 cin;N > ^ = 4 cƒb);›aV;›@6N > ^ /大众= =œ= ')9 vavn > acE9 > c wžcI9 > Nˆ= oU3W&9 = VcINˆ=(‰xŠ/ = 4 wrn&uAb3ND9DU3c NŸe # Nˆ= 4 w¡^–9 dn4 ^†9 vaxndwrb cLa&9 = VcIN3S4U w + 9 f >œŠ= w‚b c‰)U¢f + bŸ£;ß1 eoUIo‹e”÷盟†iFU U†W‚U cLf_ = VcINka4b3ND9va > &‡9 > c–N > ^ = 9 c‰—=:Š/ = Vc‰–= Vc N =ƒN U c‰9 dnd9 ^ = _N”> ^ = U3W‚= 4 f™@œa&eLnV ^…N > ^ # b3N _ yþ”y S4U W 1 c Yb‰‘ƒ;!S_X Z [b c‰#”ßr % h·美元ßDX1a一(4 ~ 6@en > ^ / = Vc % b);›aV;†N > ^ = = =(大众' 39 a N >] NDW‚b c / a 9 7 U 8 G ^]美元)_ !D“# a”?> a ' b ' 4$?—广州G c_ = /美元’Z) DdƒG YeHgfIh 1美元e UUe中U†我•o3,œU eoU e·æ1 e = UOu™U†iFU÷AomioU†我™æ1 = onu‹U‹i /æ‹我÷̧我7 U你÷AomivuŸo¥U我÷̧我(< n我žæ‹ioo‹U eoU < eæ1 e e o̧÷›<æ1 U÷奥米o3 U e UŸeoU < o‹e U†U o™e e非统‹UŸeoUŸ紫外线¤o÷̧U U†iL你œo3,”æe eæ‹我UœU eæ‹我÷÷̧U Aomi6
{"title":"Percolation in a dependent random environment","authors":"J. Jonasson, Elchanan Mossel, Y. Peres","doi":"10.1002/1098-2418(200007)16:4%3C333::AID-RSA3%3E3.0.CO;2-C","DOIUrl":"https://doi.org/10.1002/1098-2418(200007)16:4%3C333::AID-RSA3%3E3.0.CO;2-C","url":null,"abstract":"Draw planes in R3 that are orthogonal to the x axis, and intersect the x axis at the points of a Poisson process with intensity λ; similarly, draw planes orthogonal to the y and z axes using independent Poisson processes (with the same intensity). Taken together, these planes naturally define a randomly stretched rectangular lattice. Consider bond percolation on this lattice where each edge of length is open with probability e−, and these events are independent given the edge lengths. We show that this model exhibits a phase transition: for large enough λ there is an infinite open cluster a.s., and for small λ all open clusters are finite a.s. We prove this result using the method of paths with exponential intersection tails, which is not applicable in two dimensions. The question whether the analogous process in the plane exhibits a phase transition is open. Disciplines Statistics and Probability This journal article is available at ScholarlyCommons: https://repository.upenn.edu/statistics_papers/434 ! \" # $ $ &% '( )* %+ , -/.1032/45-/.1432/676 .14 8 9;:<0=2/432/4?>?.1676 @A9 B,CEDF2/9HG#@AI @A6 J 032/9;KL@MI76ON 4=PQD1@AI 6 PQR ST./U#V#@A:<0=4=.19W.1X/S(2F4=Y5Z*@M[=I7@A]N*4=PWD/@MI76 PWR S^./U -/@AI C=6 2/9;@AK _3@M[=I7C32/I`S(aEbdc/e/e1e f*gEh7i`j<kmlni o#prqtsvuxwyqnzm{7| }~zO €‚ ƒ\u0085„xq†ƒ qnp\u0085{H‡Apˆƒ‰„m‡nŠA‡nzxqnw‹ƒ\u0085‡ ƒ‰„m{‚Œ q<‹}Ž|`Mq†zxO}~zMƒ\u0085{7p‰|\u0085{7‘ ƒdƒ\u0085„x{‚Œ q†‹}y| q<ƒ ƒ\u0085„m{&u/‡n}yzMƒ‰|‚‡†’dqO“=‡n}Ž|‰|ˆ‡Az ump‰‡‹‘ { |\u0085|”sH}~ƒ\u0085„•}yzMƒ\u0085{7zx|ˆ}~ƒ—–™˜ š1|ˆ}y›œ}~wŽq†p‰wy–nFmp‰qts5umwŽq†zm{ |H‡np\u0085ƒ\u0085„m‡AŠn‡Azxq†w ƒ\u0085‡&ƒ‰„m{žŸq†zx ¡q†‹{7| ¢x|ˆ}yzmŠ }~zxm{`u/{`zx‹{7zMƒH“=‡A}y|‰|\u0085‡nzŸump‰‡‹‘ {7|‰|\u0085{7|‚£QsH}¤ƒ‰„*ƒ‰„m{ž|\u0085qn›¡{¥}yzAƒ‰{`zx|\u0085}~ƒ—–‹¦ § ̈ qn©n{`z(ƒ\u0085‡nŠA{ ƒ‰„m{`p Hƒ\u0085„x{7|\u0085{aumwŽq†zx{7| zxq<ƒ‰¢mp‰qnw~wy–T‹{ «Fzm{ q prq†zx‹‡A›œw~–T|ˆƒ\u0085p‰{ ƒ‰‘r„x{7Tp‰{7‘ ƒ‰q†zxŠn¢mwŽq†p wyq†ƒˆƒ\u0085}Ž‘ {A§ ¬ ‡nzF|ˆ}Ž‹{`p ­F‡Azx®u/{`pr‘ ‡Awyq†ƒ\u0085}y‡nz ̄‡nz®ƒ‰„m}Ž|,wŽq<ƒ\u0085ƒ\u0085}Ž‘ {*sH„x{`p‰{O{7qA‘r„®{7‹ŠA{O‡†’ wy{`zmŠnƒ\u0085„®°Ÿ}Ž| ‡nu/{`z¡sH}¤ƒ‰„¡uxp\u0085‡A­xq†­m}ywy}¤ƒ—–,±A2F3`Aqnzx ƒ\u0085„m{ |ˆ{”{` ́A{`zMƒ‰|3qnp\u0085{”}yzx‹{7uF{7zx‹{`zMƒdŠA}~ ́A{`z ƒ\u0085„m{H{ ‹Šn{”wy{`zmŠnƒ\u0085„x|7§ μa{¥|ˆ„m‡<svƒ‰„xq<ƒ ƒ\u0085„m}Ž|d›œ‡‹‹{`w/{ ‹„m}y­m}~ƒ‰| q&um„Fqn|\u0085{Hƒ\u0085prq†zx|\u0085}~ƒ\u0085}y‡nz ¶·’ ̧‡np wyqnp\u0085ŠA{H{`zm‡A¢mŠn„*˜Oƒ\u0085„m{7p\u0085{#}y| q†z }~z‹«Fzm}¤ƒ‰{,‡AuF{7z•‘ wy¢x|—ƒ‰{`p¥qm§ |`§yFqnzx$’ ̧‡np‚|\u0085›Ÿq†wywE˜aq†wyw·‡AuF{7z•‘ wy¢x|—ƒ‰{`pr| q†p‰{ž«xzm}~ƒ\u0085{¡qm§ |`§”μ {,ump‰‡< ́n{ ƒ\u0085„m}Ž| p‰{7|\u0085¢mw¤ƒ&¢F|ˆ}yzmŠ ƒ\u0085„x{O›œ{ ƒ\u0085„x‡1 ̄‡n’ ox»<1⁄4 ̧1⁄2M3⁄4O¿3ÀÁ1⁄4 ̧1⁄2 Â\u0085à oxÄ<Å/Â`Åx1⁄4;ÀQ»<Æ ÀÁÅx1⁄4Ç Èr3⁄4`ÂrÉ 1⁄4;ÀQÄ<Å 1⁄4Ê»†ÀÁÆË3⁄4 =sH„m}y‘r„ ̄}Ž| zm‡†ƒžq†umumwy}Ž‘`q†­xw~{ }~z̃—s ‡$‹}~›œ{7zx|ˆ}y‡nzF|`§ ̈”„m{¡ÍA¢x{7|ˆƒ\u0085}y‡nz•sH„m{`ƒ\u0085„m{7p¥ƒ\u0085„m{œq†zxqnw~‡AŠn‡A¢x|Hump‰‡‹‘ {7|‰|#}~z ƒ\u0085„m{ umwŽq†zx{¥{`‹„m}~­x}¤ƒr| q¡um„xqn|\u0085{¥ƒ\u0085prq†zx|\u0085}~ƒ\u0085}y‡nz$}y|”‡AuF{7z § Î Ï ÐœÑEÒ3ÓOÔ•Õ Ö Ñ3× Ó Ð ØdÙ<ÚÜÛÞÝàߗáHâ ã ä•å=Ùvæèç‹é`æ1ê ë3ì&æ‹í îðï ñòê ê=ómï Ù®Ú ë æ1Ú Ú ëòÙvنîòç‹Ù†ï ̄æ1é Ù^ô ̧æ1å=نôÁنîöõ,÷ ̧Ú ë\"ß;ê=ómï ï ÷Áå ôÁø îòÙ<ê=نí îòنíFÚ7äOé`æ‹í îòómùûú1æ1é`÷ ̧æ1å·ôÁنïÌü†ý•þnÿnþ #ì‚Ú æ /÷ ̧í çvú1","PeriodicalId":303496,"journal":{"name":"Random Struct. Algorithms","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131401590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Average-case analyses of first fit and random fit bin packing 首次拟合和随机拟合装箱的平均情况分析
Pub Date : 2000-05-01 DOI: 10.1002/(SICI)1098-2418(200005)16:3%3C240::AID-RSA2%3E3.0.CO;2-V
S. Albers, M. Mitzenmacher
We prove that the First Fit bin packing algorithm is stable under the input distribution U”k − 2; k• for all k ≥ 3, settling an open question from the recent survey by Coffman, Garey, and Johnson [“Approximation algorithms for bin backing: A survey,” Approximation algorithms for NP-hard problems, D. Hochbaum (Editor), PWS, Boston, 1996]. Our proof generalizes the multidimensional Markov chain analysis used by Kenyon, Sinclair, and Rabani to prove that Best Fit is also stable under these distributions [Proc Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, 1995, pp. 351–358]. Our proof is motivated by an analysis of Random Fit, a new simple packing algorithm related to First Fit, that is interesting in its own right. We show that Random Fit is stable under the input distributions U”k− 2; k•, as well as present worst case bounds and some results on distributions U”k− 1; k• and U”k; k• for Random Fit. © 2000 John Wiley & Sons, Inc. Random Struct. Alg., 16, 240–259, 2000 Correspondence to: Michael Mitzenmacher. *Most of this work was done while at the Max-Planch-Institut fur Informatik, Saarbrucken, Germany. † A substantial portion of this research was done while at the Computer Science Department, UC Berkeley and Digital Equipment Corporation Systems Research Center. Contract grant sponsor: National Science Foundation. Contract grant number: CCR-9505448. © 2000 John Wiley & Sons, Inc.
证明了First Fit装箱算法在输入分布U′k−2下是稳定的;k *对于所有k≥3,解决了Coffman, Garey和Johnson最近调查中的一个开放问题[“bin支持的近似算法:调查”,np困难问题的近似算法,D. Hochbaum(编辑),PWS, Boston, 1996]。我们的证明推广了Kenyon, Sinclair和Rabani使用的多维马尔可夫链分析,以证明在这些分布下最佳拟合也是稳定的[Proc第七届ACM-SIAM离散算法研讨会,1995,pp. 351-358]。我们的证明是由对Random Fit的分析激发的,Random Fit是一种与First Fit相关的新的简单打包算法,它本身就很有趣。我们证明了随机拟合在输入分布k−2下是稳定的;k *,以及在分布U * k−1上给出的最坏情况边界和一些结果;k & & k;k·表示随机拟合。©2000 John Wiley & Sons, Inc随机结构。Alg。通讯作者:Michael Mitzenmacher。*大部分工作是在德国萨尔布吕肯的马克斯-普朗奇信息研究所完成的。†这项研究的很大一部分是在加州大学伯克利分校计算机科学系和数字设备公司系统研究中心完成的。合同资助单位:美国国家科学基金会。合同授予号:CCR-9505448。©2000 John Wiley & Sons, Inc
{"title":"Average-case analyses of first fit and random fit bin packing","authors":"S. Albers, M. Mitzenmacher","doi":"10.1002/(SICI)1098-2418(200005)16:3%3C240::AID-RSA2%3E3.0.CO;2-V","DOIUrl":"https://doi.org/10.1002/(SICI)1098-2418(200005)16:3%3C240::AID-RSA2%3E3.0.CO;2-V","url":null,"abstract":"We prove that the First Fit bin packing algorithm is stable under the input distribution U”k − 2; k• for all k ≥ 3, settling an open question from the recent survey by Coffman, Garey, and Johnson [“Approximation algorithms for bin backing: A survey,” Approximation algorithms for NP-hard problems, D. Hochbaum (Editor), PWS, Boston, 1996]. Our proof generalizes the multidimensional Markov chain analysis used by Kenyon, Sinclair, and Rabani to prove that Best Fit is also stable under these distributions [Proc Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, 1995, pp. 351–358]. Our proof is motivated by an analysis of Random Fit, a new simple packing algorithm related to First Fit, that is interesting in its own right. We show that Random Fit is stable under the input distributions U”k− 2; k•, as well as present worst case bounds and some results on distributions U”k− 1; k• and U”k; k• for Random Fit. © 2000 John Wiley & Sons, Inc. Random Struct. Alg., 16, 240–259, 2000 Correspondence to: Michael Mitzenmacher. *Most of this work was done while at the Max-Planch-Institut fur Informatik, Saarbrucken, Germany. † A substantial portion of this research was done while at the Computer Science Department, UC Berkeley and Digital Equipment Corporation Systems Research Center. Contract grant sponsor: National Science Foundation. Contract grant number: CCR-9505448. © 2000 John Wiley & Sons, Inc.","PeriodicalId":303496,"journal":{"name":"Random Struct. Algorithms","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126712417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
On random orderings of variables for parity ordered binary decision diagrams 奇偶排序二元决策图中变量的随机排序
Pub Date : 2000-05-01 DOI: 10.1002/(SICI)1098-2418(200005)16:3%3C233::AID-RSA1%3E3.0.CO;2-Q
P. Savický
Ordered binary decision diagrams (OBDDs) are a model for representing Boolean functions. There is also a more powerful variant called parity OBDDs. The size of the representation of a given function depends in both these models on the chosen ordering of the variables. It is known that there are functions such that almost all orderings of their variables yield an OBDD of polynomial size, but there are also some exceptional orderings, for which the size is exponential. We prove that for parity OBDDs, the size for a random ordering and the size for the worst ordering are polynomially related. More exactly, for every ϵ>0 there is a number c>0 such that the following holds. If a Boolean function f of n variables is such that a random ordering of the variables yields a parity OBDD for f of size at most s with probability at least ϵ, where s≥n, then every ordering of the variables yields a parity OBDD for f of size at most sc. © 2000 John Wiley & Sons, Inc. Random Struct. Alg., 16: 233–239, 2000
有序二元决策图(obdd)是一种表示布尔函数的模型。还有一种更强大的变体称为奇偶obdd。在这两种模型中,给定函数表示的大小取决于所选择的变量顺序。众所周知,有些函数几乎所有变量的排序都会产生多项式大小的OBDD,但也有一些特殊的排序,其大小是指数级的。我们证明了对于奇偶obdd,随机排序的大小和最差排序的大小是多项式相关的。更确切地说,对于每一个大于0的λ,都存在一个大于0的数c,使得以下成立。如果一个有n个变量的布尔函数f使得变量的随机排序产生一个最大为s的奇偶OBDD,且概率至少为λ,其中s≥n,则变量的每次排序产生一个最大为sc的奇偶OBDD。©2000 John Wiley & Sons, Inc。随机结构。Alg。科学通报,16 (6):393 - 393,2000
{"title":"On random orderings of variables for parity ordered binary decision diagrams","authors":"P. Savický","doi":"10.1002/(SICI)1098-2418(200005)16:3%3C233::AID-RSA1%3E3.0.CO;2-Q","DOIUrl":"https://doi.org/10.1002/(SICI)1098-2418(200005)16:3%3C233::AID-RSA1%3E3.0.CO;2-Q","url":null,"abstract":"Ordered binary decision diagrams (OBDDs) are a model for representing Boolean functions. There is also a more powerful variant called parity OBDDs. The size of the representation of a given function depends in both these models on the chosen ordering of the variables. It is known that there are functions such that almost all orderings of their variables yield an OBDD of polynomial size, but there are also some exceptional orderings, for which the size is exponential. We prove that for parity OBDDs, the size for a random ordering and the size for the worst ordering are polynomially related. More exactly, for every ϵ>0 there is a number c>0 such that the following holds. If a Boolean function f of n variables is such that a random ordering of the variables yields a parity OBDD for f of size at most s with probability at least ϵ, where s≥n, then every ordering of the variables yields a parity OBDD for f of size at most sc. © 2000 John Wiley & Sons, Inc. Random Struct. Alg., 16: 233–239, 2000","PeriodicalId":303496,"journal":{"name":"Random Struct. Algorithms","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133346002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the rank of random matrices 在随机矩阵的秩上
Pub Date : 2000-03-01 DOI: 10.1002/(SICI)1098-2418(200003)16:2%3C209::AID-RSA6%3E3.0.CO;2-1
C. Cooper
Let M=(mij) be a random n×n matrix over GF(2). Each matrix entry mij is independently and identically distributed, with Pr(mij=0)=1−p(n) and Pr(mij=1)=p(n). The probability that the matrix M is nonsingular tends to c2≈0.28879 provided min(p, 1−p)≥(log n+d(n))/n for any d(n)∞. Sharp thresholds are also obtained for constant d(n). This answers a question posed in a paper by J. Blomer, R. Karp, and E. Welzl (Random Struct Alg, 10(4) (1997)). ©2000 John Wiley & Sons, Inc. Random Struct. Alg., 16, 209–232, 2000
设M=(mij)是GF(2)上的随机n×n矩阵。每个矩阵项mij是独立同分布的,Pr(mij=0)=1−p(n), Pr(mij=1)=p(n)。对于任意d(n)∞,当min(p, 1−p)≥(log n+d(n))/n时,矩阵M非奇异的概率趋于c2≈0.28879。对于恒定的d(n),也可以得到明显的阈值。这回答了J. Blomer, R. Karp和E. Welzl (Random Struct Alg, 10(4)(1997))在一篇论文中提出的问题。©2000 John Wiley & Sons, Inc随机结构。Alg。中文信息学报,16,209 - 232,2000
{"title":"On the rank of random matrices","authors":"C. Cooper","doi":"10.1002/(SICI)1098-2418(200003)16:2%3C209::AID-RSA6%3E3.0.CO;2-1","DOIUrl":"https://doi.org/10.1002/(SICI)1098-2418(200003)16:2%3C209::AID-RSA6%3E3.0.CO;2-1","url":null,"abstract":"Let M=(mij) be a random n×n matrix over GF(2). Each matrix entry mij is independently and identically distributed, with Pr(mij=0)=1−p(n) and Pr(mij=1)=p(n). The probability that the matrix M is nonsingular tends to c2≈0.28879 provided min(p, 1−p)≥(log n+d(n))/n for any d(n)∞. Sharp thresholds are also obtained for constant d(n). This answers a question posed in a paper by J. Blomer, R. Karp, and E. Welzl (Random Struct Alg, 10(4) (1997)). ©2000 John Wiley & Sons, Inc. Random Struct. Alg., 16, 209–232, 2000","PeriodicalId":303496,"journal":{"name":"Random Struct. Algorithms","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131334235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
The length of random subsets of Boolean lattices 布尔格的随机子集的长度
Pub Date : 2000-03-01 DOI: 10.1002/(SICI)1098-2418(200003)16:2%3C177::AID-RSA4%3E3.0.CO;2-9
Y. Kohayakawa, Bernd Kreuter, Deryk Osthus
We form the random poset (n, p) by including each subset of [n]={1,…,n} with probability p and ordering the subsets by inclusion. We investigate the length of the longest chain contained in (n, p). For p≥e/n we obtain the limit distribution of this random variable. For smaller p we give thresholds for the existence of chains which imply that almost surely the length of (n, p) is asymptotically n(log n−log log 1/p)/log 1/p. ©2000 John Wiley & Sons, Inc. Random Struct. Alg., 16, 177–194, 2000
我们以p的概率包含[n]={1,…,n}的每个子集,并通过包含对子集排序,形成随机偏序集(n, p)。我们研究了(n, p)中最长链的长度。当p≥e/n时,我们得到该随机变量的极限分布。对于较小的p,我们给出链存在的阈值,这意味着(n, p)的长度几乎肯定是渐近的n(log n - log log 1/p)/log 1/p。©2000 John Wiley & Sons, Inc随机结构。Alg。中文信息学报,16,177-194,2000
{"title":"The length of random subsets of Boolean lattices","authors":"Y. Kohayakawa, Bernd Kreuter, Deryk Osthus","doi":"10.1002/(SICI)1098-2418(200003)16:2%3C177::AID-RSA4%3E3.0.CO;2-9","DOIUrl":"https://doi.org/10.1002/(SICI)1098-2418(200003)16:2%3C177::AID-RSA4%3E3.0.CO;2-9","url":null,"abstract":"We form the random poset (n, p) by including each subset of [n]={1,…,n} with probability p and ordering the subsets by inclusion. We investigate the length of the longest chain contained in (n, p). For p≥e/n we obtain the limit distribution of this random variable. For smaller p we give thresholds for the existence of chains which imply that almost surely the length of (n, p) is asymptotically n(log n−log log 1/p)/log 1/p. ©2000 John Wiley & Sons, Inc. Random Struct. Alg., 16, 177–194, 2000","PeriodicalId":303496,"journal":{"name":"Random Struct. Algorithms","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126680461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Finding and certifying a large hidden clique in a semirandom graph 在半随机图中寻找和证明一个大的隐藏团
Pub Date : 2000-03-01 DOI: 10.1002/(SICI)1098-2418(200003)16:2%3C195::AID-RSA5%3E3.0.CO;2-A
U. Feige, Robert Krauthgamer
Alon, Krivelevich, and Sudakov [Random Struct Algorithms 13(3–4) (1998), 457–466.] designed an algorithm based on spectral techniques that almost surely finds a clique of size hidden in an otherwise random graph. We show that a different algorithm, based on the Lovasz theta function, almost surely both finds the hidden clique and certifies its optimality. Our algorithm has an additional advantage of being more robust: it also works in a semirandom hidden clique model, in which an adversary can remove edges from the random portion of the graph. ©2000 John Wiley & Sons, Inc. Random Struct. Alg., 16, 195–208, 2000
Alon, Krivelevich, and Sudakov[随机结构算法13(3-4)(1998),457-466]。]设计了一种基于谱技术的算法,几乎可以肯定地找到隐藏在随机图中的大小集团。我们展示了一种基于Lovasz theta函数的不同算法,几乎可以肯定地找到隐藏集团并证明其最优性。我们的算法还有一个更健壮的优势:它也适用于半随机隐藏的派系模型,在这种模型中,对手可以从图的随机部分删除边。©2000 John Wiley & Sons, Inc随机结构。Alg。, 16, 195 - 208,2000
{"title":"Finding and certifying a large hidden clique in a semirandom graph","authors":"U. Feige, Robert Krauthgamer","doi":"10.1002/(SICI)1098-2418(200003)16:2%3C195::AID-RSA5%3E3.0.CO;2-A","DOIUrl":"https://doi.org/10.1002/(SICI)1098-2418(200003)16:2%3C195::AID-RSA5%3E3.0.CO;2-A","url":null,"abstract":"Alon, Krivelevich, and Sudakov [Random Struct Algorithms 13(3–4) (1998), 457–466.] designed an algorithm based on spectral techniques that almost surely finds a clique of size hidden in an otherwise random graph. We show that a different algorithm, based on the Lovasz theta function, almost surely both finds the hidden clique and certifies its optimality. Our algorithm has an additional advantage of being more robust: it also works in a semirandom hidden clique model, in which an adversary can remove edges from the random portion of the graph. ©2000 John Wiley & Sons, Inc. Random Struct. Alg., 16, 195–208, 2000","PeriodicalId":303496,"journal":{"name":"Random Struct. Algorithms","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124132351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 214
Analysis of algorithms 算法分析
Pub Date : 2000-01-13 DOI: 10.1002/(SICI)1098-2418(199701)10:1/2%3C1::AID-RSA1%3E3.0.CO;2-4
P. Flajolet, W. Szpankowski
3. Binary search has the following algorithm. Look at the middle element in an array. If the element is the one begin looked for (the target), return FOUND. Otherwise, if the element is greater than the target, recursively search the lower half of the array. Otherwise, recursively search the upper half of the array. If the array consists of three or fewer elements, perform a linear search of the array, returning FOUND if found and MISSING otherwise. Which of the following recurrence equations describe binary search?
3.二分查找有以下算法。看一下数组的中间元素。如果元素是开始查找的元素(目标),则返回FOUND。否则,如果元素大于目标,则递归搜索数组的下半部分。否则,递归地搜索数组的上半部分。如果数组包含三个或更少的元素,则对数组执行线性搜索,如果找到则返回FOUND,否则返回MISSING。下面哪个递归式描述了二分搜索?
{"title":"Analysis of algorithms","authors":"P. Flajolet, W. Szpankowski","doi":"10.1002/(SICI)1098-2418(199701)10:1/2%3C1::AID-RSA1%3E3.0.CO;2-4","DOIUrl":"https://doi.org/10.1002/(SICI)1098-2418(199701)10:1/2%3C1::AID-RSA1%3E3.0.CO;2-4","url":null,"abstract":"3. Binary search has the following algorithm. Look at the middle element in an array. If the element is the one begin looked for (the target), return FOUND. Otherwise, if the element is greater than the target, recursively search the lower half of the array. Otherwise, recursively search the upper half of the array. If the array consists of three or fewer elements, perform a linear search of the array, returning FOUND if found and MISSING otherwise. Which of the following recurrence equations describe binary search?","PeriodicalId":303496,"journal":{"name":"Random Struct. Algorithms","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131201547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 247
How to couple from the past using a read-once source of randomness 如何使用只读一次的随机性源从过去进行耦合
Pub Date : 1999-10-09 DOI: 10.1002/(SICI)1098-2418(200001)16:1%3C85::AID-RSA6%3E3.0.CO;2-H
D. Wilson
We give a new method for generating perfectly random samples from the stationary distribution of a Markov chain. The method is related to coupling from the past (CFTP), but only runs the Markov chain forwards in time, and never restarts it at previous times in the past. The method is also related to an idea known as PASTA (Poisson arrivals see time averages) in the operations research literature. Because the new algorithm can be run using a read-once stream of randomness, we call it read-once CFTP. The memory and time requirements of read-once CFTP are on par with the requirements of the usual form of CFTP, and for a variety of applications the requirements may be noticeably less. Some perfect sampling algorithms for point processes are based on an extension of CFTP known as coupling into and from the past; for completeness, we give a read-once version of coupling into and from the past, but it remains unpractical. For these point process applications, we give an alternative coupling method with which read-once CFTP may be efficiently used.
给出了一种从马尔可夫链的平稳分布生成完全随机样本的新方法。该方法与过去耦合(CFTP)有关,但只在时间上向前运行马尔可夫链,而不会在过去的先前时间重新启动它。该方法也与运筹学文献中的PASTA(泊松到达见时间平均值)概念有关。因为新算法可以使用一次读的随机流来运行,所以我们称之为一次读的CFTP。一次读取的CFTP对内存和时间的需求与通常形式的CFTP的需求相当,而且对于各种应用程序,需求可能明显更少。一些完美的点过程采样算法是基于CFTP的扩展,称为过去耦合;为了完整起见,我们给出了过去和过去耦合的一次读取版本,但它仍然不实用。对于这些点进程应用程序,我们给出了一种可选的耦合方法,该方法可以有效地使用只读一次的CFTP。
{"title":"How to couple from the past using a read-once source of randomness","authors":"D. Wilson","doi":"10.1002/(SICI)1098-2418(200001)16:1%3C85::AID-RSA6%3E3.0.CO;2-H","DOIUrl":"https://doi.org/10.1002/(SICI)1098-2418(200001)16:1%3C85::AID-RSA6%3E3.0.CO;2-H","url":null,"abstract":"We give a new method for generating perfectly random samples from the stationary distribution of a Markov chain. The method is related to coupling from the past (CFTP), but only runs the Markov chain forwards in time, and never restarts it at previous times in the past. The method is also related to an idea known as PASTA (Poisson arrivals see time averages) in the operations research literature. Because the new algorithm can be run using a read-once stream of randomness, we call it read-once CFTP. The memory and time requirements of read-once CFTP are on par with the requirements of the usual form of CFTP, and for a variety of applications the requirements may be noticeably less. Some perfect sampling algorithms for point processes are based on an extension of CFTP known as coupling into and from the past; for completeness, we give a read-once version of coupling into and from the past, but it remains unpractical. For these point process applications, we give an alternative coupling method with which read-once CFTP may be efficiently used.","PeriodicalId":303496,"journal":{"name":"Random Struct. Algorithms","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115525582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
2+p-SAT: Relation of typical-case complexity to the nature of the phase transition 2+p-SAT:典型情况下的复杂性与相变性质的关系
Pub Date : 1999-10-01 DOI: 10.1002/(SICI)1098-2418(199910/12)15:3/4%3C414::AID-RSA10%3E3.0.CO;2-G
R. Monasson, R. Zecchina, S. Kirkpatrick, B. Selman, Lidror Troyansky
Heuristic methods for solution of problems in the NP-complete class of decision problems often reach exact solutions, but fail badly at “phase boundaries,” across which the decision to be reached changes from almost always having one value to almost always having a different value. We report an analytic solution and experimental investigations of the phase transition that occurs in the limit of very large problems in K-SAT. Studying a model which interpolates K-SAT between K=2 and K=3, we find a change from a continuous to a discontinuous phase transition when K, the average number of inputs per clause, exceeds 0.4. The cost of finding solutions also increases dramatically above this changeover. The nature of its “random first-order” phase transition, seen at values of K large enough to make the computational cost of solving typical instances increase exponentially with problem size, suggests a mechanism for the cost increase. There has been evidence for features like the “backbone” of frozen inputs which characterizes the UNSAT phase in K-SAT in the study of models of disordered materials, but this feature and this transition are uniquely accessible to analysis in K-SAT. The random first-order transition combines properties of the first-order (discontinuous onset of order) and second-order (with power law scaling, e.g., of the width of the critical region in a finite system) transitions known in the physics of pure solids. Such transitions should occur in other combinatoric problems in the large N limit. Finally, improved search heuristics may be developed when a “backbone” is known to exist. ©1999 John Wiley & Sons, Inc. Random Struct. Alg., 15, 414–435, 1999
在np完全类的决策问题中,启发式方法通常会得到精确的解,但在“阶段边界”上严重失败,在“阶段边界”上,要达成的决策几乎总是从一个值变化到几乎总是具有不同的值。我们报告了K-SAT中发生在非常大问题极限的相变的解析解和实验研究。研究了K- sat在K=2和K=3之间插值的模型,我们发现当每个子句的平均输入数K超过0.4时,从连续相变到不连续相变的变化。在这种转换之后,寻找解决方案的成本也会急剧增加。其“随机一阶”相变的性质,在K值大到足以使解决典型实例的计算成本随着问题规模呈指数增长时,表明了成本增加的机制。在无序材料模型的研究中,有证据表明冻结输入的“骨干”特征是K-SAT中UNSAT阶段的特征,但这一特征和这种转变是K-SAT中唯一可以分析的。随机一阶跃迁结合了纯固体物理学中已知的一阶(不连续的开始顺序)和二阶(幂律缩放,例如,有限系统中临界区域的宽度)跃迁的性质。在大N极限下的其他组合问题中也会出现这种过渡。最后,当已知存在“主干”时,可以开发改进的搜索启发式。©1999 John Wiley & Sons, Inc随机结构。Alg。中文信息学报,15,414-435,1999
{"title":"2+p-SAT: Relation of typical-case complexity to the nature of the phase transition","authors":"R. Monasson, R. Zecchina, S. Kirkpatrick, B. Selman, Lidror Troyansky","doi":"10.1002/(SICI)1098-2418(199910/12)15:3/4%3C414::AID-RSA10%3E3.0.CO;2-G","DOIUrl":"https://doi.org/10.1002/(SICI)1098-2418(199910/12)15:3/4%3C414::AID-RSA10%3E3.0.CO;2-G","url":null,"abstract":"Heuristic methods for solution of problems in the NP-complete class of decision problems often reach exact solutions, but fail badly at “phase boundaries,” across which the decision to be reached changes from almost always having one value to almost always having a different value. We report an analytic solution and experimental investigations of the phase transition that occurs in the limit of very large problems in K-SAT. Studying a model which interpolates K-SAT between K=2 and K=3, we find a change from a continuous to a discontinuous phase transition when K, the average number of inputs per clause, exceeds 0.4. The cost of finding solutions also increases dramatically above this changeover. The nature of its “random first-order” phase transition, seen at values of K large enough to make the computational cost of solving typical instances increase exponentially with problem size, suggests a mechanism for the cost increase. There has been evidence for features like the “backbone” of frozen inputs which characterizes the UNSAT phase in K-SAT in the study of models of disordered materials, but this feature and this transition are uniquely accessible to analysis in K-SAT. The random first-order transition combines properties of the first-order (discontinuous onset of order) and second-order (with power law scaling, e.g., of the width of the critical region in a finite system) transitions known in the physics of pure solids. Such transitions should occur in other combinatoric problems in the large N limit. Finally, improved search heuristics may be developed when a “backbone” is known to exist. ©1999 John Wiley & Sons, Inc. Random Struct. Alg., 15, 414–435, 1999","PeriodicalId":303496,"journal":{"name":"Random Struct. Algorithms","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121646538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 120
期刊
Random Struct. Algorithms
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1