47 results on '"analysis of algorithm"'
Search Results
2. Proof of Optimality based on Greedy Algorithm for Offline Cache Replacement Algorithm.
- Author
-
Srivastava, Swapnita and Singh, P. K.
- Subjects
GREEDY algorithms ,ALGORITHMS ,CACHE memory - Abstract
The optimal offline cache replacement algorithm is a MIN algorithm that chooses which data item to remove when a new data item is brought from lower level of cache or main memory. The optimal offline algorithm evicts a cache item whose next request is the furthest away. For a particular program, the performance behavior of the cache memory is determined by memory and block sizes and by the nature of the replacement algorithm. Replacement algorithms, however, deserve analysis because they are based on a variety of assumptions and design considerations. This paper presents a simpler proof based on the greedy algorithm. The paper demonstrates that every ideal solution can be repeatedly transformed into the solution provided by the greedy algorithm without increasing the miss of the optimal solution, hence demonstrating that the greedy solution is providing optimality. This paper also presents a new replacement algorithm named Greedy Weight-based Cache Replacement Algorithm (GWCRA), on the basis of the Greedy algorithm and it also incorporates the weighted access-based parameter, recency and frequency. The GWCRA achieves an average speedup of 57.29% when compared to LRU and SRRIP which is 55.58% and 55.65%, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2022
3. On Weighted Depths in Random Binary Search Trees.
- Author
-
Aguech, Rafik, Amri, Anis, and Sulzbach, Henning
- Abstract
Following the model introduced by Aguech et al. (Probab Eng Inf Sci 21:133-141, 2007), the weighted depth of a node in a labelled rooted tree is the sum of all labels on the path connecting the node to the root. We analyse weighted depths of nodes with given labels, the last inserted node, nodes ordered as visited by the depth first search process, the weighted path length and the weighted Wiener index in a random binary search tree. We establish three regimes of nodes depending on whether the second-order behaviour of their weighted depths follows from fluctuations of the keys on the path, the depth of the nodes or both. Finally, we investigate a random distribution function on the unit interval arising as scaling limit for weighted depths of nodes with at most one child. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
4. Convergence analysis of standard particle swarm optimization algorithm and its improvement.
- Author
-
Qian, Weiyi and Li, Ming
- Subjects
- *
STOCHASTIC convergence , *PARTICLE swarm optimization , *ALGORITHMS , *PROBLEM solving , *CLOUD computing - Abstract
Standard particle swarm optimization (PSO) algorithm is a kind of stochastic optimization algorithm. Its convergence, based on probability theory, is analyzed in detail. We prove that the standard PSO algorithm is convergence with probability 1 under certain condition. Then, a new improved particle swarm optimization (IPSO) algorithm is proposed to ensure that IPSO algorithm is convergence with probability 1. In order to balance the exploration and exploitation abilities of IPSO algorithm, we propose the exploration and exploitation operators and weight the two operators in IPSO algorithm. Finally, IPSO algorithm is tested on 13 benchmark test functions and compared with the other algorithms published in the recent literature. The numerical results confirm that IPSO algorithm has the better performance in solving nonlinear functions. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
5. Note on time bounds of two-phase algorithms for L-convex function minimization.
- Author
-
Murota, Kazuo and Shioura, Akiyoshi
- Abstract
We analyze minimization algorithms, called the two-phase algorithms, for L $$^{\natural }$$ -convex functions in discrete convex analysis and derive tight bounds for the number of iterations. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
6. Randomized Rendezvous
- Author
-
Métivier, Yves, Saheb, Nasser, Zemmari, Akka, Gardy, Danièle, editor, and Mokkadem, Abdelkader, editor
- Published
- 2000
- Full Text
- View/download PDF
7. In-place linear probing sort
- Author
-
Carlsson, Svante, Katajainen, Jyrki, Teuhola, Jukka, Goos, Gerhard, editor, Hartmanis, Juris, editor, Finkel, Alain, editor, and Jantzen, Matthias, editor
- Published
- 1992
- Full Text
- View/download PDF
8. JPROFILE102: A system for experimental analysis of algorithms.
- Author
-
Krajangthong, Tanin and Prasitjutrakul, Somchai
- Abstract
This paper presents a system called JPROFILE102 used for experimental analysis of algorithms. The system accepts algorithms implemented as Java methods along with experiment parameters specifying characteristics and sizes of input data. The objective is to count the number of times each source code instruction gets executed during the experiments. Source-code instrumentation technique is used by parsing the source code to obtain its associated abstract syntax tree, traversing the tree, inserting extra counting instructions at instruction nodes and finally transforming the tree back into an instrumented source code ready for experiments. To correctly handle method calls in the code (especially recursive calls), a separate run-time call stack has to be implemented to keep non-duplicated counter IDs in the call chain. All profiling data obtained from the experiments are summarized and reformatted into an HTML page with two views. One shows a histogram of execution counts. The other shows line plots of selected instruction counts vs. input data size to visualize efficiency behavior of the algorithm. The system is embedded into a Java IDE and effectively used as a teaching aid in several algorithm analysis courses. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
9. Incremental Facility Location Problem and Its Competitive Algorithms.
- Author
-
Dai, Wenqiang and Zeng, Xianju
- Abstract
We consider the incremental version of the k-Facility Location Problem, which is a common generalization of the facility location and the k-median problems. The objective is to produce an incremental sequence of facility sets F⊆ F⊆ ⋅⋅⋅⊆ F, where each F contains at most k facilities. An incremental facility sequence or an algorithm producing such a sequence is called c -competitive if the cost of each F is at most c times the optimum cost of corresponding k-facility location problem, where c is called competitive ratio. In this paper we present two competitive algorithms for this problem. The first algorithm produces competitive ratio 8 α, where α is the approximation ratio of k-facility location problem. By recently result (Zhang, Theor. Comput. Sci. 384:126–135, ), we obtain the competitive ratio $16+8\sqrt{3}+\epsilon$ . The second algorithm has the competitive ratio Δ+1, where Δ is the ratio between the maximum and minimum nonzero interpoint distances. The latter result has its self interest, specially for the small metric space with Δ≤8 α−1. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
10. Two semi-online scheduling problems on two uniform machines
- Author
-
Ng, C.T., Tan, Zhiyi, He, Yong, and Cheng, T.C.E.
- Subjects
- *
COMPUTER networks , *SCHEDULING software , *ALGORITHMS , *MACHINE learning , *MATHEMATICAL optimization , *MATHEMATICAL analysis , *MAXIMA & minima - Abstract
Abstract: This paper considers two semi-online scheduling problems, one with known optimal value and the other with known total sum, on two uniform machines with a machine speed ratio of . For the first problem, we provide an optimal algorithm for , and improved algorithms or/and lower bounds for , over which the optimal algorithm is unknown. As a result, the largest gap between the competitive ratio and the lower bound decreases to 0.02192. For the second problem, we also present algorithms and lower bounds for . The largest gap between the competitive ratio and the lower bound is 0.01762, and the length of the interval over which the optimal algorithm is unknown is 0.47382. Our algorithms and lower bounds for these two problems provide insights into their differences, which are unusual from the viewpoint of the known results on these two semi-online scheduling problems in the literature. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
11. Asymptotic distributions for Random Median Quicksort.
- Author
-
Okasha, H.M. and Rösler, U.
- Subjects
STOCHASTIC analysis ,ESTIMATION theory ,STOCHASTIC processes ,ASYMPTOTIC distribution - Abstract
Abstract: The first complete running time analysis of a stochastic divide and conquer algorithm was given for Quicksort, a sorting algorithm invented 1961 by Hoare. We analyse here the variant Random Median Quicksort. The analysis includes the expectation, the asymptotic distribution, the moments and exponential moments. The asymptotic distribution is characterized by a stochastic fixed point equation. The basic technic will be generating functions and the contraction method. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
12. SEMI-ONLINE MACHINE COVERING.
- Author
-
Sheng-Yi Cai
- Subjects
ONLINE data processing ,VARIATIONAL inequalities (Mathematics) ,GAP analysis (Planning) ,MATHEMATICAL optimization ,NUMERICAL analysis - Abstract
This paper investigates two different semi-online versions of the machine covering, which is the problem of assigning a set of jobs to a system of m(m ⩾ 3) identical parallel machines so as to maximize the earliest machine completion time. In the first case, we assume that the largest processing times is known in advance. In the second case, we assume that the total processing times of all jobs is known in advance. For each version we propose a semi-online algorithm and investigate its competitive ratio. The competitive ratio of each algorithm is (Multiple line equation(s) cannot be represented in ASCII text) which is shown to be the best possible competitive ratio for each semi-online problem. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
13. Semi-online scheduling problems on two identical machines with inexact partial information
- Author
-
Tan, Zhiyi and He, Yong
- Subjects
- *
ALGORITHMS , *COMPUTER scheduling , *TIME-sharing computer systems , *ONLINE data processing , *ELECTRONIC data processing - Abstract
Abstract: In semi-online scheduling problems, we always assume that some partial additional information is exactly known in advance. This may not be true in some applications. This paper considers semi-online scheduling problems on two identical machines with inexact partial information. Three versions are considered, where we know in advance that the total size of all jobs, the optimal value, and the largest job size are in given intervals, respectively, while their exact values are unknown. We give both lower bounds of the problems and competitive ratios of algorithms as functions of a so-called disturbance parameter . We establish for which the inexact partial information is useful to improve the performance of a semi-online algorithm with respect to its pure online problem. Optimal or near optimal algorithms are then obtained. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
14. k-Partitioning problems with partition matroid constraint
- Author
-
Wu, Biao and Yao, Enyue
- Subjects
- *
PARTITIONS (Mathematics) , *MATROIDS , *ALGORITHMS , *NUMBER theory , *COMBINATORICS - Abstract
Abstract: In this paper, we consider the k-partitioning problems with partition matroid constraint and present an algorithm called the layered LPT algorithm. With the objective of minimizing the maximum load, we show that the layered LPT algorithm has a tight worst case ratio of . With the objective of maximizing the minimum load, we show that the layered LPT algorithm has a tight worst case ratio of for the general case and, with certain conditions, the worst ratio can be improved to for the general case and to for the case. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
15. Extension of algorithm list scheduling for a semi-online scheduling problem.
- Author
-
Yong He and Dósa, György
- Subjects
ALGORITHMS ,PRODUCTION scheduling ,SCHEDULING ,MATHEMATICAL models ,MATHEMATICAL analysis ,ECONOMICS - Abstract
A general algorithm, called ALG, for online and semi-online scheduling problem Pm∣∣C
max with m ≥ 2 is introduced. For the semi-online version, it is supposed that all job have their processing times within the interval [p, rp], where p > 0 1 < r ≤ m/m - 1. ALG is a generalization of LS and is optimal in the sense that there is not an algorithm with smaller competitive ratio than that of ALG. [ABSTRACT FROM AUTHOR]- Published
- 2007
- Full Text
- View/download PDF
16. Semi-online scheduling jobs with tightly-grouped processing times on three identical machines
- Author
-
He, Yong and Dósa, György
- Subjects
- *
SCHEDULING , *MACHINERY , *ALGORITHMS , *ALGEBRA - Abstract
Abstract: This paper investigates the semi-online version of scheduling problem on a three-machine system. We assume that all jobs have their processing times between p and rp (). We give a comprehensive competitive ratio of LS algorithm which is a piecewise function on . It shows that LS is an optimal semi-online algorithm for every , and . We further present an optimal algorithm for every , and an almost optimal algorithm for every where the largest gap between its competitive ratio and the lower bound of the problem is at most 0.01417. We also present an improved algorithm with smaller competitive ratio than that of LS for every . [Copyright &y& Elsevier]
- Published
- 2005
- Full Text
- View/download PDF
17. Optimal on-line algorithms for the uniform machine scheduling problem with ordinal data
- Author
-
Tan, Zhiyi, He, Yong, and Epstein, Leah
- Subjects
- *
PRODUCTION scheduling , *ALGORITHMS , *TASK performance , *TASKS - Abstract
Abstract: In this paper, we consider an ordinal on-line scheduling problem. A sequence of n independent jobs has to be assigned non-preemptively to two uniformly related machines. We study two objectives which are maximizing the minimum machine completion time, and minimizing the l p norm of the completion times. It is assumed that the values of the processing times of jobs are unknown at the time of assignment. However it is known in advance that the processing times of arriving jobs are sorted in a non-increasing order. We are asked to construct an assignment of all jobs to the machines at time zero, by utilizing only ordinal data rather than actual magnitudes of jobs. For the problem of maximizing the minimum completion time we first present a comprehensive lower bound on the competitive ratio, which is a piecewise function of machine speed ratio s. Then, we propose an algorithm which is optimal for any s ⩾1. For minimizing the l p norm, we study the case of identical machines (s =1) and present tight bounds as a function of p. [Copyright &y& Elsevier]
- Published
- 2005
- Full Text
- View/download PDF
18. κ-Partitioning problems for maximizing the minimum load
- Author
-
He, Yong, Tan, Zhiyi, Zhu, Jing, and Yao, Enyu
- Subjects
- *
REGRESSION analysis , *ALGORITHMS , *ALGEBRA , *MATHEMATICAL optimization , *MATHEMATICAL analysis - Abstract
The optimization versions of the k-PARTITIONING problems are considered in this paper. For the objective to maximize the minimum load of m subsets, we first show that the FOLDING algorithm has a tight worst case ratio of max{2/k,1/m}. Then, we present an algorithm called HARMONIC1 with a worst case ratio at least
max{ 1/k, 1/(⌈Σi=1m 1/i ⌉ +1)} . It concludes the HARMONIC1 is better than FOLDING fork > 2(⌈ Σi=1m 1/i ⌉ + 1). We further show that HARMONICI is asymptotically optimal ordinal algorithm. We also present an algorithm HARMONIC2 for solving the generalκi-PARTITIONING problem. [Copyright &y& Elsevier]- Published
- 2003
- Full Text
- View/download PDF
19. Analysis of a randomized rendezvous algorithm
- Author
-
Métivier, Yves, Saheb, Nasser, and Zemmari, Akka
- Subjects
- *
ALGORITHMS , *GRAPH theory - Abstract
In this paper we propose and analyze a randomized algorithm to get rendezvous between neighbours in an anonymous graph. We examine in particular the probability to obtain at least one rendezvous and the expected number of rendezvous. We study the rendezvous number distribution in the cases of chain graphs, rings, and complete graphs. The last part is devoted to the efficiency of the proposed algorithm. [Copyright &y& Elsevier]
- Published
- 2003
- Full Text
- View/download PDF
20. A unifying look at the Apostolico–Giancarlo string-matching algorithm.
- Author
-
Crochemore, Maxime, Hancart, Christophe, and Lecroq, Thierry
- Subjects
MATCHING theory ,BRANCH & bound algorithms ,COMBINATORICS ,ALGORITHMS - Abstract
String matching is the problem of finding all the occurrences of a pattern in a text. We present a new method to compute the combinatorial shift function (“matching shift”) of the well-known Boyer–Moore string matching algorithm. This method implies the computation of the length of the longest suffixes of the pattern ending at each position in this pattern. These values constituted an extra-preprocessing for a variant of the Boyer–Moore algorithm designed by Apostolico and Giancarlo. We give here a new presentation of this algorithm that avoids extra preprocessing together with a tight bound of
1.5n character comparisons (wheren is the length of the text). [Copyright &y& Elsevier]- Published
- 2003
- Full Text
- View/download PDF
21. Semi-online scheduling with machine cost.
- Author
-
He, Yong and Cai, Shengyi
- Abstract
For most scheduling problems the set of machines is fixed initially and remains unchanged for the duration of the problem. Recently Imreh and Nogaproposed to add the concept of machine cost to scheduling problems and considered the so-called List Model problem. An online algorithm with a competitive ratio 1.618 was given while the lower bound is 4/3. In this paper, two different semi-online versions of this problem are studied. In the first case, it is assumed that the processing time of the largest job is known a priori. A semi-online algorithm is presented with the competitive ratio at most 1.5309 while the lower bound is 4/3. In the second case, it is assumed that the total processing time of all jobs is known in advance. A semi-online algorithm is presented with the competitive ratio at most 1.414 while the lower bound is 1.161. It is shown that the additional partial available information about the jobs leads to the possibility of constructing a schedule with a smaller competitive ratio than that of online algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2002
- Full Text
- View/download PDF
22. Ordinal On-Line Scheduling for Maximizing the Minimum Machine Completion Time.
- Author
-
He, Yong and Tan, Zhiyi
- Abstract
This paper considers the on-line problem of scheduling nonpreemptively n independent jobs on m > 1 identical and parallel machines with the objective to maximize the minimum machine completion time. It is assumed that the values of the processing times are unknown but the order of the jobs by their processing times is known in advance. We are asked to decide the assignment of all the jobs to some machines at time zero by utilizing only ordinal data rather than the actual magnitudes of jobs. Algorithms to slove the problem are called ordinal algorithms. In this paper, we give lower bounds and ordinal algorithms. We first propose an algorithm MIN which is at most $$(\left\lceil {\sum {_{i = 1}^m {\text{ }}1/} i} \right\rceil + 1)$$ -competitive for any m machine case, while the lower bound is ∑ 1/i. Both are on the order of Θ(ln m). Furthermore, for m = 3, we present an optimal algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2002
- Full Text
- View/download PDF
23. Phase transitions and complexity in computer science: an overview of the statistical physics approach to the random satisfiability problem
- Author
-
Biroli, Giulio, Cocco, Simona, and Monasson, Rémi
- Subjects
- *
PHASE transitions , *CONDENSED matter , *COMPUTER science , *STATISTICAL decision making - Abstract
Phase transitions, ubiquitous in condensed matter physics, are encountered in computer science too. The existence of critical phenomena has deep consequences on computational complexity, that is the resolution times of various optimization or decision problems. Concepts and methods borrowed from the statistical physics of disordered and out-of-equilibrium systems shed new light on the dynamical operation of solving algorithms. [Copyright &y& Elsevier]
- Published
- 2002
- Full Text
- View/download PDF
24. 3-Partitioning Problems for Maximizing the Minimum Load.
- Author
-
Chen, Shi, He, Yong, and Lin, Guohui
- Abstract
The optimization versions of the 3-Partitioning and the Kernel 3-Partitioning problems are considered in this paper. For the objective to maximize the minimum load of the m subsets, it is shown that the MODIFIED LPT algorithm has performance ratios (3 m − 1)/(4 m − 2) and (2 m − 1)/(3 m − 2), respectively, in the worst case. [ABSTRACT FROM AUTHOR]
- Published
- 2002
- Full Text
- View/download PDF
25. Algorithms for semi on-line multiprocessor scheduling problems.
- Author
-
Yong, He, Qi-fan, Yang, Zhi-yi, Tan, and En-yu, Yao
- Abstract
In the classical multiprocessor scheduling problems, it is assumed that the problems are considered in off-line or on-line environment. But in practice, problems are often not really off-line or on-line but somehow in between. This means that, with respect to the on-line problem, some further information about the tasks is available, which allows the improvement of the performance of the best possible algorithms. Problems of this class are called semi on-line ones. The authors studied two semi on-line multiprocessor scheduling problems, in which, the total processing time of all tasks is known in advance, or all processing times lie in a given interval. They proposed approximation algorithms for minimizing the makespan and analyzed their performance guarantee. The algorithms improve the known results for 3 or more processor cases in the literature. [ABSTRACT FROM AUTHOR]
- Published
- 2002
- Full Text
- View/download PDF
26. Semi-on-line scheduling problems for maximizing the minimum machine completion time.
- Author
-
Yong, He
- Abstract
This paper investigates several different semi-on-line two-machine scheduling problems for maximizing the minimum machine completion time. For each problem, we propose a best possible algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2001
- Full Text
- View/download PDF
27. A linear compound algorithm for uniform machine scheduling.
- Author
-
Burkard, R., He, Y., and Kellerer, H.
- Abstract
In this paper, we consider the classical two uniform machine scheduling problem. We present a compound algorithm which consists of three Greedy-like subprocedures running independently. We prove that the algorithm has a worst-case bound of 7/6 and runs in linear time. [ABSTRACT FROM AUTHOR]
- Published
- 1998
- Full Text
- View/download PDF
28. On constructing the relative neighborhood graphs in Euclidean K-dimensional spaces.
- Author
-
Su, Tung-Hsin and Chang, Ruei-Chuan
- Abstract
Copyright of Computing is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 1991
- Full Text
- View/download PDF
29. Analyse réaliste d'algorithmes standards
- Author
-
Auger, Nicolas, Laboratoire d'Informatique Gaspard-Monge (LIGM), Centre National de la Recherche Scientifique (CNRS)-Fédération de Recherche Bézout-ESIEE Paris-École des Ponts ParisTech (ENPC)-Université Paris-Est Marne-la-Vallée (UPEM), Université Paris-Est, Cyril Nicaud, and STAR, ABES
- Subjects
Sorting algorithms ,Cache oblivious ,[INFO.INFO-CL] Computer Science [cs]/Computation and Language [cs.CL] ,Modèle de cache ,Analysis of algorithm ,Prédiction de branchement ,Branch prediction ,Algorithmes de tri ,Analyse d'algorithmes ,[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL] - Abstract
At first, we were interested in TimSort, a sorting algorithm which was designed in 2002, at a time where it was hard to imagine new results on sorting. Although it is used in many programming languages, the efficiency of this algorithm has not been studied formally before our work. The fine-grain study of TimSort leads us to take into account, in our theoretical models, some modern features of computer architecture. In particular, we propose a study of the mechanisms of branch prediction. This theoretical analysis allows us to design variants of some elementary algorithms (like binary search or exponentiation by squaring) that rely on this feature to achieve better performance on recent computers. Even if uniform distributions are usually considered for the average case analysis of algorithms, it may not be the best framework for studying sorting algorithms. The choice of using TimSort in many programming languages as Java and Python is probably driven by its efficiency on almost-sorted input. To conclude this dissertation, we propose a mathematical model of non-uniform distribution on permutations, for which permutations that are almost sorted are more likely, and provide a detailed probabilistic analysis, À l'origine de cette thèse, nous nous sommes intéressés à l'algorithme de tri TimSort qui est apparu en 2002, alors que la littérature sur le problème du tri était déjà bien dense. Bien qu'il soit utilisé dans de nombreux langages de programmation, les performances de cet algorithme n'avaient jamais été formellement analysées avant nos travaux. L'étude fine de TimSort nous a conduits à enrichir nos modèles théoriques, en y incorporant des caractéristiques modernes de l'architecture des ordinateurs. Nous avons, en particulier, étudié le mécanisme de prédiction de branchement. Grâce à cette analyse théorique, nous avons pu proposer des modifications de certains algorithmes élémentaires (comme l'exponentiation rapide ou la dichotomie) qui utilisent ce principe à leur avantage, améliorant significativement leurs performances lorsqu'ils sont exécutés sur des machines récentes. Enfin, même s'il est courant dans le cadre de l'analyse en moyenne de considérer que les entrées sont uniformément distribuées, cela ne semble pas toujours refléter les distributions auxquelles nous sommes confrontés dans la réalité. Ainsi, une des raisons du choix d'implanter TimSort dans des bibliothèques standard de Java et Python est probablement sa capacité à s'adapter à des entrées partiellement triées. Nous proposons, pour conclure cette thèse, un modèle mathématique de distribution non-uniforme sur les permutations qui favorise l'apparition d'entrées partiellement triées, et nous en donnons une analyse probabiliste détaillée
- Published
- 2018
30. Around a few statistics on binary search trees and on accessible deterministic automata
- Author
-
Amri, Anis, UL, Thèses, Institut Élie Cartan de Lorraine (IECL), Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Université de Lorraine, Philippe Chassaing, and Rafik Aguech
- Subjects
Méthode de contraction ,Data structures ,Mesures de probabilités ,Binary search trees ,Saddle-point ,Stirling number ,Random probability measures ,Coupon collector problem ,[MATH] Mathematics [math] ,Complete accessible automata ,Arbres binaires de recherche ,Problème de collectionneur de coupons ,Automates déterministes ,Contraction method ,Analyse d’algorithme ,Analysis of algorithm ,Central limit theorems ,[MATH]Mathematics [math] ,Nombre de Stirling de seconde espèce ,Structures de données ,Méthode de point col - Abstract
This Phd thesis is divided into two independent parts. In the first part, we provide an asymptotic analysis of some statistics on the binary search tree. In the second part, we study the coupon collector problem with a constraint. In the first part, following the model introduced by Aguech, Lasmar and Mahmoud [Probab. Engrg. Inform. Sci. 21 (2007) 133—141], the weighted depth of a node in a labelled rooted tree is the sum of all labels on the path connecting the node to the root. We analyze the following statistics : the weighted depths of nodes with given labels, the last inserted node, nodes ordered as visited by the depth first search procees, the weighted path length, the weighted Wiener index and the weighted depths of nodes with at most one child in a random binary search tree. In the second part, we study the asymptotic shape of the completion curve of the collection conditioned to T_n≤ (1+Λ), Λ>0, where T_n≃n lnn is the time needed to complete accessible automata, we provide a new derivation of a formula due to Korsunov [Kor78, Kor86], Cette thèse comporte deux parties indépendantes. Dans la première partie, nous nous intéressons à l’analyse asymptotique de quelques statistiques sur les arbres binaires de recherche (ABR). Dans la deuxième partie, nous nous intéressons à l’étude du problème du collectionneur de coupons impatient. Dans la première partie, en suivant le modèle introduit par Aguech, Lasmar et Mahmoud [Probab. Engrg. Inform. Sci. 21 (2007) 133—141], on définit la profondeur pondérée d’un nœud dans un arbre binaire enraciné étiqueté comme la somme de toutes les clés sur le chemin qui relie ce nœud à la racine. Nous analysons alors dans ABR, les profondeurs pondérées des nœuds avec des clés données, le dernier nœud inséré, les nœuds ordonnés selon le processus de recherche en profondeur, la profondeur pondérée des trajets, l’indice de Wiener pondéré et les profondeurs pondérées des nœuds avec au plus un enfant. Dans la deuxième partie, nous étudions la forme asymptotique de la courbe de la complétion de la collection conditionnée à T_n≤ (1+Λ), Λ>0, où T_n≃n lnn désigne le temps nécessaire pour compléter la collection. Puis, en tant qu’application, nous étudions les automates déterministes et accessibles et nous fournissons une nouvelle dérivation d’une formule due à Korsunov [Kor78, Kor86]
- Published
- 2018
31. On selecting the largest element in spite of erroneous information
- Author
-
Ravikumar, B., Ganesan, K., Lakshmanan, K. B., Goos, G., editor, Hartmanis, J., editor, Barstow, D., editor, Brauer, W., editor, Brinch Hansen, P., editor, Gries, D., editor, Luckham, D., editor, Moler, C., editor, Pnueli, A., editor, Seegmüller, G., editor, Stoer, J., editor, Wirth, N., editor, Brandenburg, Franz J., editor, Vidal-Naquet, Guy, editor, and Wirsing, Martin, editor
- Published
- 1987
- Full Text
- View/download PDF
32. Asymptotic distributions for Random Median Quicksort
- Author
-
Hassan M. Okasha and U. Rösler
- Subjects
Divide and conquer algorithms ,Discrete mathematics ,Recursive equation ,Sorting algorithm ,Kleene's recursion theorem ,Asymptotic distribution ,Fixed point equation ,Exponential function ,Theoretical Computer Science ,Stochastic fixed point equation ,Computational Theory and Mathematics ,Contraction method ,Analysis of algorithm ,Discrete Mathematics and Combinatorics ,Quicksort ,Euler differential equation ,Divide-and-conquer algorithm ,Mathematics - Abstract
The first complete running time analysis of a stochastic divide and conquer algorithm was given for Quicksort, a sorting algorithm invented 1961 by Hoare. We analyse here the variant Random Median Quicksort. The analysis includes the expectation, the asymptotic distribution, the moments and exponential moments. The asymptotic distribution is characterized by a stochastic fixed point equation. The basic technic will be generating functions and the contraction method.
- Published
- 2007
- Full Text
- View/download PDF
33. On the Greedy Algorithm for the Shortest Common Superstring Problem with Reversals
- Author
-
Tomasz Kociumaka, Jakub Radoszewski, Wojciech Rytter, Gabriele Fici, Tomasz Waleń, Fici, G., Kociumaka, T., Radoszewski, J., Rytter, W., and Waleń, T.
- Subjects
FOS: Computer and information sciences ,0102 computer and information sciences ,02 engineering and technology ,Information System ,01 natural sciences ,String (physics) ,Theoretical Computer Science ,Combinatorics ,High Energy Physics::Theory ,Analysis of algorithm ,Greedy algorithm ,Computer Science - Data Structures and Algorithms ,0202 electrical engineering, electronic engineering, information engineering ,Data Structures and Algorithms (cs.DS) ,Finite set ,Analysis of algorithms ,Mathematics ,Superstring theory ,Shortest Common Superstring ,Computer Science Applications1707 Computer Vision and Pattern Recognition ,Computer Science Applications ,Reversal ,Shortest Path Faster Algorithm ,010201 computation theory & mathematics ,Compression ratio ,Signal Processing ,020201 artificial intelligence & image processing ,K shortest path routing ,Information Systems - Abstract
We study a variation of the classical Shortest Common Superstring (SCS) problem in which a shortest superstring of a finite set of strings $S$ is sought containing as a factor every string of $S$ or its reversal. We call this problem Shortest Common Superstring with Reversals (SCS-R). This problem has been introduced by Jiang et al., who designed a greedy-like algorithm with length approximation ratio $4$. In this paper, we show that a natural adaptation of the classical greedy algorithm for SCS has (optimal) compression ratio $\frac12$, i.e., the sum of the overlaps in the output string is at least half the sum of the overlaps in an optimal solution. We also provide a linear-time implementation of our algorithm., Published in Information Processing Letters
- Published
- 2015
34. Online coupon consumption problem
- Author
-
Jiang, Yiwei, Zhang, An, and Tan, Zhiyi
- Published
- 2008
- Full Text
- View/download PDF
35. Multiple Sequence Alignment as a Facility-Location Problem
- Author
-
Winfried Just, Gianluca Della Vedova, Just, W, and DELLA VEDOVA, G
- Subjects
Scheme (programming language) ,Mathematical optimization ,computational complexity ,Multiple sequence alignment ,General Engineering ,INF/01 - INFORMATICA ,multiple sequence location ,Topology ,Facility location problem ,Connection (mathematics) ,facilities-equipment planning ,analysis of algorithm ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,computer ,location ,Mathematics ,computer.programming_language - Abstract
A connection is made between certain multiple-sequence alignment problems and facility-location problems, and the existence of a PTAS (polynomial-time approximation scheme) for these problems is shown. Moreover, it is shown that multiple sequence alignment with SP-score and fixed gap penalties is MAX SNP-hard.
- Published
- 2004
- Full Text
- View/download PDF
36. Extension of algorithm list scheduling for a semi-online scheduling problem
- Author
-
He, Yong and Dósa, György
- Published
- 2007
- Full Text
- View/download PDF
37. Intrinsic convergence properties of entropic sampling algorithms
- Author
-
Victor Daniel Pereyra, Bruno Jeferson Lourenço, Ronald Dickman, and R. E. Belardinelli
- Subjects
Física Atómica, Molecular y Química ,Statistics and Probability ,Statistical Mechanics (cond-mat.stat-mech) ,ANALYSIS OF ALGORITHM ,Stochastic process ,Ciencias Físicas ,Monte Carlo method ,FOS: Physical sciences ,Statistical and Nonlinear Physics ,purl.org/becyt/ford/1.3 [https] ,STOCHASTIC PROCESSES ,purl.org/becyt/ford/1 [https] ,symbols.namesake ,MONTE CARLO SIMULATION ,ENTROPIC SAMPLING ,symbols ,Applied mathematics ,Statistics, Probability and Uncertainty ,CIENCIAS NATURALES Y EXACTAS ,Condensed Matter - Statistical Mechanics ,Analysis of algorithms ,Mathematics ,Gibbs sampling - Abstract
We study the convergence of the density of states and thermodynamic properties in three flat-histogram simulation methods, the Wang-Landau (WL) algorithm, the 1/t algorithm, and tomographic sampling (TS). In the first case the refinement parameter f is rescaled (f -> f/2) each time the flat-histogram condition is satisfied, in the second f ~ 1/t after a suitable initial phase, while in the third f is constant (t corresponds to Monte Carlo time). To examine the intrinsic convergence properties of these methods, free of any complications associated with a specific model, we study a featureless entropy landscape, such that for each allowed energy E = 1,...,L, there is exactly one state, that is, g(E) = 1 for all E. Convergence of sampling corresponds to g(E,t) -> const. as t -> infinity, so that the standard deviation sigma_g of g over energy values is a measure of the overall sampling error. Neither the WL algorithm nor TS converge: in both cases sigma_g saturates at long times. In the 1/t algorithm, by contrast, sigma_g decays \propto 1/\sqrt{t}. Modified TS and 1/t procedures, in which f \propto 1/t^alpha, converge for alpha values between 0 and 1. There are two essential facets to convergence of flat-histogram methods: elimination of initial errors in g(E), and correction of the sampling noise accumulated during the process. For a simple example, we demonstrate analytically, using a Langevin equation, that both kinds of errors can be eliminated, asymptotically, if f ~ 1/t^alpha with 0 < ��\leq 1. Convergence is optimal for alpha = 1. For alpha \leq 0 the sampling noise never decays, while for alpha > 1 the initial error is never completely eliminated., 17 pages, 6 figures
- Published
- 2014
- Full Text
- View/download PDF
38. The optimal on-line parallel machine scheduling
- Author
-
Yong He
- Subjects
Earliest deadline first scheduling ,Rate-monotonic scheduling ,Mathematical optimization ,Computer science ,Worst-case ratio ,Dynamic priority scheduling ,Flow shop scheduling ,Round-robin scheduling ,Fair-share scheduling ,Computational Mathematics ,Fixed-priority pre-emptive scheduling ,Computational Theory and Mathematics ,On-line scheduling ,Modelling and Simulation ,Modeling and Simulation ,Analysis of algorithm ,Parallel random-access machine ,Computer Science::Operating Systems - Abstract
This paper investigates on-line parallel machine scheduling problems. We show the optimality of the classical LS algorithm.
- Published
- 2000
- Full Text
- View/download PDF
39. The online Prize-Collecting Traveling Salesman Problem
- Author
-
Giorgio Ausiello, Vincenzo Bonifaci, Luigi Laura, Ausiello, G., Bonifaci, V., and Laura, L.
- Subjects
Traveling purchaser problem ,Mathematical optimization ,Competitive analysis ,On-line algorithms ,Nearest neighbour algorithm ,combinatorial problems ,Lin–Kernighan heuristic ,2-opt ,Travelling salesman problem ,on-line algorithms ,Computer Science Applications ,Theoretical Computer Science ,analysis of algorithms ,Signal Processing ,Christofides algorithm ,Analysis of algorithm ,Combinatorial problem ,Bottleneck traveling salesman problem ,Information Systems ,Mathematics ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
We study the online version of the Prize-Collecting Traveling Salesman Problem (PCTSP), a generalization of the Traveling Salesman Problem (TSP). In the TSP, the salesman has to visit a set of cities while minimizing the length of the overall tour. In the PCTSP, each city has a given weight and penalty, and the goal is to collect a given quota of the weights of the cities while minimizing the length of the tour plus the penalties of the cities not in the tour. In the online version, cities are disclosed over time. We give a 7/3-competitive algorithm for the problem, which compares with a lower bound of 2 on the competitive ratio of any deterministic algorithm. We also show how our approach can be combined with an approximation algorithm in order to obtain an O (1)-competitive algorithm that runs in polynomial time. © 2008 Elsevier B.V. All rights reserved.
- Published
- 2008
40. On constructing the relative neighborhood graphs in EuclideanK-dimensional spaces
- Author
-
Su, Tung-Hsin and Chang, Ruei-Chuan
- Published
- 1991
- Full Text
- View/download PDF
41. Exemplar Longest Common Subsequence
- Author
-
Raffaella Rizzi, Stéphane Vialette, Guillaume Fertin, Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi, Dipartimento di Informatica Sistemistica e Comunicazione (DISCo), Università degli Studi di Milano-Bicocca = University of Milano-Bicocca (UNIMIB), Dipartimento di Statistica, Dipartimento di Scienze dei Linguaggi, della Comunicazione e degli Studi Culturali, Università degli Studi di Bergamo = University of Bergamo (UniBg), Laboratoire d'Informatique de Nantes Atlantique (LINA), Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS), Laboratoire d'Informatique Gaspard-Monge (LIGM), Université Paris-Est Marne-la-Vallée (UPEM)-École des Ponts ParisTech (ENPC)-ESIEE Paris-Fédération de Recherche Bézout-Centre National de la Recherche Scientifique (CNRS), Bonizzoni, P, DELLA VEDOVA, G, Dondi, R, Fertin, G, Rizzi, R, Vialette, S, Università degli Studi di Milano-Bicocca [Milano] (UNIMIB), Università degli studi di Bergamo (UniBG), and Centre National de la Recherche Scientifique (CNRS)-Fédération de Recherche Bézout-ESIEE Paris-École des Ponts ParisTech (ENPC)-Université Paris-Est Marne-la-Vallée (UPEM)
- Subjects
[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC] ,combinatorial algorithms ,Computational complexity theory ,problem complexity ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,0211 other engineering and technologies ,combinatorial algorithm ,0102 computer and information sciences ,02 engineering and technology ,Longest increasing subsequence ,Disjoint sets ,comparative genomics ,01 natural sciences ,Combinatorics ,Longest common subsequence problem ,analysis of algorithm ,Genetics ,Time complexity ,analysis of algorithms and problem complexity ,Analysis of algorithms ,Mathematics ,algorithm design and analysi ,Models, Statistical ,021103 operations research ,Longest common subsequence ,Computers ,Applied Mathematics ,Computational Biology ,Approximation algorithm ,INF/01 - INFORMATICA ,Sequence Analysis, DNA ,Models, Theoretical ,16. Peace & justice ,[SDV.BIBS]Life Sciences [q-bio]/Quantitative Methods [q-bio.QM] ,010201 computation theory & mathematics ,Symbol (programming) ,Data Interpretation, Statistical ,algorithm design and analysis ,comparative genomic ,[INFO.INFO-BI]Computer Science [cs]/Bioinformatics [q-bio.QM] ,Algorithms ,Software ,Biotechnology - Abstract
International audience; In this paper, we investigate the computational and approximation complexity of the Exemplar Longest Common Subsequence of a set of sequences (ELCS problem), a generalization of the Longest Common Subsequence problem, where the input sequences are over the union of two disjoint sets of symbols, a set of mandatory symbols and a set of optional symbols. We show that different versions of the problem are APX-hard even for instances with two sequences. Moreover, we show that the related problem of determining the existence of a feasible solution of the Exemplar Longest Common Subsequence of two sequences is NP-hard. On the positive side, we first present an efficient algorithm for the ELCS problem over instances of two sequences where each mandatory symbol can appear in total at most three times in the sequences. Furthermore, we present two fixed parameter algorithms for the ELCS problem over instances of two sequences where the parameter is the number of mandatory symbols.
- Published
- 2007
42. Exemplar longest common subsequence
- Author
-
Bonizzoni, P, DELLA VEDOVA, G, Dondi, R, Fertin, G, Rizzi, R, Vialette, S, BONIZZONI, PAOLA, DELLA VEDOVA, GIANLUCA, RIZZI, RAFFAELLA, Vialette, S., Bonizzoni, P, DELLA VEDOVA, G, Dondi, R, Fertin, G, Rizzi, R, Vialette, S, BONIZZONI, PAOLA, DELLA VEDOVA, GIANLUCA, RIZZI, RAFFAELLA, and Vialette, S.
- Abstract
In this paper, we investigate the computational and approximation complexity of the Exemplar Longest Common Subsequence (ELCS) of a set of sequences (ELCS problem), a generalization of the Longest Common Subsequence problem, where the input sequences are over the union of two disjoint sets of symbols, a set of mandatory symbols and a set of optional symbols. We show that different versions of the problem are APX-hard even for instances with two sequences. Moreover, we show that the related problem of determining the existence of a feasible solution of the ELCS of two sequences is NP-hard. On the positive side, we first present an efficient algorithm for the ELCS problem over instances of two sequences where each mandatory symbol can appear in total at most three times in the sequences. Furthermore, we present two fixed-parameter algorithms for the ELCS problem over instances of two sequences where the parameter is the number of mandatory symbols.
- Published
- 2007
43. A unifying look at the Apostolico-Giancarlo string-matching algorithm
- Author
-
Christophe Hancart, Maxime Crochemore, Thierry Lecroq, Laboratoire d'Informatique Gaspard-Monge (LIGM), Centre National de la Recherche Scientifique (CNRS)-Fédération de Recherche Bézout-ESIEE Paris-École des Ponts ParisTech (ENPC)-Université Paris-Est Marne-la-Vallée (UPEM), Laboratoire d'informatique fondamentale et appliquée de Rouen (LIFAR ), Université de Rouen Normandie (UNIROUEN), Normandie Université (NU)-Normandie Université (NU), and Université Paris-Est Marne-la-Vallée (UPEM)-École des Ponts ParisTech (ENPC)-ESIEE Paris-Fédération de Recherche Bézout-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Bitap algorithm ,Matching (graph theory) ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,Commentz-Walter algorithm ,0102 computer and information sciences ,02 engineering and technology ,String searching algorithm ,01 natural sciences ,Theoretical Computer Science ,law.invention ,Combinatorics ,law ,Analysis of algorithm ,0202 electrical engineering, electronic engineering, information engineering ,Discrete Mathematics and Combinatorics ,Boyer–Moore string search algorithm ,Mathematics ,Discrete mathematics ,020207 software engineering ,Function (mathematics) ,Approximate string matching ,16. Peace & justice ,Rabin–Karp algorithm ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,String matching - Abstract
International audience; String matching is the problem of finding all the occurrences of a pattern in a text. We present a new method to compute the combinatorial shift function ("matching shift") of the well-known Boyer-Moore string matching algorithm. This method implies the computation of the length of the longest suffixes of the pattern ending at each position in this pattern. These values constituted an extra-preprocessing for a variant of the Boyer-Moore algorithm designed by Apostolico and Giancarlo. We give here a new presentation of this algorithm that avoids extra preprocessing together with a tight bound of 1.5n character comparisons (where n is the length of the text).
- Published
- 2003
- Full Text
- View/download PDF
44. Multiple sequence alignment as a facility location problem
- Author
-
Just, W, DELLA VEDOVA, G, DELLA VEDOVA, GIANLUCA, Just, W, DELLA VEDOVA, G, and DELLA VEDOVA, GIANLUCA
- Abstract
A connection is made between certain multiple-sequence alignment problems and facility-location problems, and the existence of a PTAS (polynomial-time approximation scheme) for these problems is shown. Moreover, it is shown that multiple sequence alignment with SP-score and fixed gap penalties is MAX SNP-hard
- Published
- 2004
45. Récurrences mahlériennes, suites automatiques, études asymptotiques
- Author
-
Dumas, Philippe, Algorithms (ALGORITHMS), Inria Paris-Rocquencourt, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Université Sciences et Technologies - Bordeaux I, and Jean-Paul ALLOUCHE(allouche@math.jussieu.fr)
- Subjects
asymptotic expansion ,algebra of linear operators ,théorie des langages ,équation fonctionnelle de Mahler ,fonction génératrice ,développement asymptotique ,Mahler's functional equation ,formal languages theory ,generating function ,suite automatique ,analysis of algorithm ,analyse d'algorithme ,algèbre d'opérateurs linéaires ,[INFO]Computer Science [cs] ,[MATH]Mathematics [math] - Abstract
The purpose of this thesis is to study a class of power series, which we call Mahlerian, solutions to certain functional equations. These series arise in combinatorial theory, for problems involving counting words, and in the analysis of algorithms, where they are related to divide and conquer recurrences. Methods of solution of Mahlerian equations are based on the properties of rational functions with respect to the fundamental operation, analogue of the derivative for differential equations, and on the arithmetic of operators implicit in these equations. The methods we describe furnish efficient procedures for calculation, qualitative results concerning the closure of this class, and, in the complex case, analytic properties of the solutions. An important subclass of Mahlerian series is provided by B-regular series, a generalization of B-automatic series. They are the translation, via base B arithmetic, of rational series in non- commutative variables, inheriting their properties, familiar in the theory of formal languages. One can define, for example, notions of linear representation, of rank, and of Hankel matrix. Under certain simple conditions, a Mahlerian series is B-regular; in particular most divide and conquer recurrences provide B-regular series. The asymptotic analysis of coefficients of complex Mahlerian series relies on a classification which reveals the significance of B-regular series, on methods from linear algebra, and on methods from the analytic theory of numbers. The results here obtained permit us to handle a number of frequently encountered practical examples. They show, for B-regular series, a connection between the asymptotic behavior of coefficients and the spectra of linear representations. In many cases we exhibit a phenomenon of logarithmic periodicity.; L'objet de cette thèse est l'étude d'une classe de séries entières solutions de certaines équations fonctionnelles, dites mahlériennes. Ces séries interviennent en combinatoire avec des problèmes de comptage de mots et en analyse d'algorithmes où elles sont liées aux récurrences diviser pour régner. La résolution des équations mahlériennes est fondée sur les propriétés des fractions rationnelles vis à vis de l'opérateur fondamental, analogue de la dérivation pour les équations différentielles, et sur l'arithmétique des opérateurs sous-jacents à ces équations. Les méthodes décrites fournissent à la fois des procédés effectifs de calcul et des résultats qualitatifs sur les propriétés de clôture de cette classe et, dans le cas complexe, sur les propriétés analytiques des solutions. Une sous-classe importante de séries mahlériennes est fournie par les séries B-régulières, généralisation des séries B-automatiques. Elles sont la traduction, via la numération en base B, des séries rationnelles en indéterminées non commutatives de la théorie des langages formels et héritent de leurs propriétés. On peut par exemple définir les notions de représentation linéaire, de rang et de matrice de Hankel. Sous certaines conditions simples, une série mahlérienne est B-régulière ; en particulier la plupart des récurrences diviser pour régner fournissent des séries B-régulières. L'analyse asymptotique des coefficients des séries mahlériennes complexes sàppuie sur une classification qui met en valeur l'importance des séries B-régulières, sur des techniques d'algèbre linéaire et sur des méthodes de théorie analytique des nombres. Les résultats obtenus permettent de traiter les exemples rencontrés dans la pratique. Ils montrent pour les séries B-régulières un lien entre le comportement asymptotique des coefficients et le spectre des représentations linéaires et dans beaucoup de cas un phénomène de périodicité en échelle logarithmique.
- Published
- 1993
46. Mahlerian recurrences, automatic sequences, asymptotic studies
- Author
-
Dumas, Philippe, Algorithms (ALGORITHMS), Inria Paris-Rocquencourt, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Université Sciences et Technologies - Bordeaux I, and Jean-Paul ALLOUCHE(allouche@math.jussieu.fr)
- Subjects
asymptotic expansion ,algebra of linear operators ,théorie des langages ,équation fonctionnelle de Mahler ,fonction génératrice ,développement asymptotique ,Mahler's functional equation ,formal languages theory ,generating function ,suite automatique ,analysis of algorithm ,analyse d'algorithme ,algèbre d'opérateurs linéaires ,[INFO]Computer Science [cs] ,[MATH]Mathematics [math] - Abstract
The purpose of this thesis is to study a class of power series, which we call Mahlerian, solutions to certain functional equations. These series arise in combinatorial theory, for problems involving counting words, and in the analysis of algorithms, where they are related to divide and conquer recurrences. Methods of solution of Mahlerian equations are based on the properties of rational functions with respect to the fundamental operation, analogue of the derivative for differential equations, and on the arithmetic of operators implicit in these equations. The methods we describe furnish efficient procedures for calculation, qualitative results concerning the closure of this class, and, in the complex case, analytic properties of the solutions. An important subclass of Mahlerian series is provided by B-regular series, a generalization of B-automatic series. They are the translation, via base B arithmetic, of rational series in non- commutative variables, inheriting their properties, familiar in the theory of formal languages. One can define, for example, notions of linear representation, of rank, and of Hankel matrix. Under certain simple conditions, a Mahlerian series is B-regular; in particular most divide and conquer recurrences provide B-regular series. The asymptotic analysis of coefficients of complex Mahlerian series relies on a classification which reveals the significance of B-regular series, on methods from linear algebra, and on methods from the analytic theory of numbers. The results here obtained permit us to handle a number of frequently encountered practical examples. They show, for B-regular series, a connection between the asymptotic behavior of coefficients and the spectra of linear representations. In many cases we exhibit a phenomenon of logarithmic periodicity.; L'objet de cette thèse est l'étude d'une classe de séries entières solutions de certaines équations fonctionnelles, dites mahlériennes. Ces séries interviennent en combinatoire avec des problèmes de comptage de mots et en analyse d'algorithmes où elles sont liées aux récurrences diviser pour régner. La résolution des équations mahlériennes est fondée sur les propriétés des fractions rationnelles vis à vis de l'opérateur fondamental, analogue de la dérivation pour les équations différentielles, et sur l'arithmétique des opérateurs sous-jacents à ces équations. Les méthodes décrites fournissent à la fois des procédés effectifs de calcul et des résultats qualitatifs sur les propriétés de clôture de cette classe et, dans le cas complexe, sur les propriétés analytiques des solutions. Une sous-classe importante de séries mahlériennes est fournie par les séries B-régulières, généralisation des séries B-automatiques. Elles sont la traduction, via la numération en base B, des séries rationnelles en indéterminées non commutatives de la théorie des langages formels et héritent de leurs propriétés. On peut par exemple définir les notions de représentation linéaire, de rang et de matrice de Hankel. Sous certaines conditions simples, une série mahlérienne est B-régulière ; en particulier la plupart des récurrences diviser pour régner fournissent des séries B-régulières. L'analyse asymptotique des coefficients des séries mahlériennes complexes sàppuie sur une classification qui met en valeur l'importance des séries B-régulières, sur des techniques d'algèbre linéaire et sur des méthodes de théorie analytique des nombres. Les résultats obtenus permettent de traiter les exemples rencontrés dans la pratique. Ils montrent pour les séries B-régulières un lien entre le comportement asymptotique des coefficients et le spectre des représentations linéaires et dans beaucoup de cas un phénomène de périodicité en échelle logarithmique.
- Published
- 1993
47. On the Efficiency of Algorithms for Polynomial Factoring
- Author
-
Moenck, Robert T.
- Published
- 1977
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.