共查询到20条相似文献,搜索用时 31 毫秒
1.
Tatsuya Akutsu 《Journal of Combinatorial Optimization》1999,3(2-3):321-336
For a basic version (i.e., maximizing the number of base-pairs) of the RNA secondary structure prediction problem and the construction of a parse tree for a stochastic context-free language, O(n3) time algorithms were known. For both problems, this paper shows slightly improved O(n3(log log n)1/2/(log n)1/2) time exact algorithms, which are obtained by combining Valiant's algorithm for context-free recognition with fast funny matrix multiplication. Moreover, this paper shows an O(n2.776 + (1/)O(1)) time approximation algorithm for the former problem and an O(n2.976 log n + (1/)O(1)) time approximation algorithm for the latter problem, each of which has a guaranteed approximation ratio 1 – for any positive constant , where the absolute value of the logarithm of the probability is considered as an objective value in the latter problem. The former algorithm is obtained from a non-trivial modification of the well-known O(n3) time dynamic programming algorithm, and the latter algorithm is obtained by combining Valiant's algorithm with approximate funny matrix multiplication. Several related results are shown too. 相似文献
2.
In this paper, we consider the problem of enumerating all maximal motifs in an input string for the class of repeated motifs
with wild cards. A maximal motif is such a representative motif that is not properly contained in any larger motifs with the
same location lists. Although the enumeration problem for maximal motifs with wild cards has been studied in Parida et al.
(2001), Pisanti et al. (2003) and Pelfrêne et al. (2003), its output-polynomial time computability has been still open. The
main result of this paper is a polynomial space polynomial delay algorithm for the maximal motif enumeration problem for the
repeated motifs with wild cards. This algorithm enumerates all maximal motifs in an input string of length n in O(n
3) time per motif with O(n) space, in particular O(n
3) delay. The key of the algorithm is depth-first search on a tree-shaped search route over all maximal motifs based on a technique
called prefix-preserving closure extension. We also show an exponential lower bound and a succinctness result on the number
of maximal motifs, which indicate the limit of a straightforward approach. The results of the computational experiments show
that our algorithm can be applicable to huge string data such as genome data in practice, and does not take large additional
computational cost compared to usual frequent motif mining algorithms.
This work is done during the Hiroki Arimura’s visit in LIRIS, University Claude-Bernard Lyon 1, France. 相似文献
3.
Sergey Bereg Marcin Kubica Tomasz Waleń Binhai Zhu 《Journal of Combinatorial Optimization》2007,13(2):179-188
In this paper, we present a new model for RNA multiple sequence structural alignment based on the longest common subsequence. We consider both the off-line and on-line cases. For the off-line case, i.e., when the longest common subsequence is given
as a linear graph with n vertices, we first present a polynomial O(n
2) time algorithm to compute its maximum nested loop. We then consider a slightly different problem—the Maximum Loop Chain
problem and present an algorithm which runs in O(n
5) time. For the on-line case, i.e., given m RNA sequences of lengths n, compute the longest common subsequence of them such that this subsequence either induces a maximum nested loop or the maximum
number of matches, we present efficient algorithms using dynamic programming when m is small.
This research is partially supported by EPSCOR Visiting Scholar's Program and MSU Short-term
Professional Development Program. 相似文献
4.
The Web proxy location problem in general networks is an NP-hard problem. In this paper, we study the problem in networks showing a general tree of rings topology. We improve the results of the tree case in literature and get an exact algorithm with time complexity O(nhk), where n is the number of nodes in the tree, h is the height of the tree (the server is in the root of the tree), and k is the number of web proxies to be placed in the net. For the case of networks with a general tree of rings topology we present an exact algorithm with O(kn
2) time complexity.This research has been supported by NSF of China (No. 10371028) and the Educational Department grant of Zhejiang Province (No. 20030622). 相似文献
5.
In recent years, more and more algorithms related to imprecise data have been proposed. Specifically, some algorithms on computing the maximum area convex hull are designed recently when the imprecise data are modeled as non-overlapping axis-aligned squares or as equal size squares. The time complexity of the best known algorithm based on non-overlapping axis-aligned squares is O(n 7). If the squares have equal size and can overlap, the time complexity of the best known algorithm is O(n 5). In this paper, we improve the former from O(n 7) to O(n 5) and improve the latter from O(n 5) to O(n 2). These results are obtained by exploiting the non-trivial geometric properties of the problems. 相似文献
6.
We present algorithms and lower bounds for the Longest Increasing Subsequence (LIS) and Longest Common Subsequence (LCS) problems
in the data-streaming model. To decide if the LIS of a given stream of elements drawn from an alphabet αbet has length at least k, we discuss a one-pass algorithm using O(k log αbetsize) space, with update time either O(log k) or O(log log αbetsize); for αbetsize = O(1), we can achieve O(log k) space and constant-time updates. We also prove a lower bound of Ω(k) on the space requirement for this problem for general alphabets αbet, even when the input stream is a permutation of αbet. For finding the actual LIS, we give a ⌈log (1 + 1/ɛ)-pass algorithm using O(k1+ɛlog αbetsize) space, for any ɛ > 0. For LCS, there is a trivial Θ(1)-approximate O(log n)-space streaming algorithm when αbetsize = O(1). For general alphabets αbet, the problem is much harder. We prove several lower bounds on the LCS problem, of which the strongest is the following: it
is necessary to use Ω(n/ρ2) space to approximate the LCS of two n-element streams to within a factor of ρ, even if the streams are permutations of each other.
A preliminary version of this paper appears in the Proceedings of the 11th International Computing and Combinatorics Conference
(COCOON'05), August 2005, pp. 263–272. 相似文献
7.
Determining an Optimal Penetration Among Weighted Regions in Two and Three Dimensions 总被引:2,自引:1,他引:1
Danny Z. Chen Ovidiu Daescu Xiaobo Hu Xiaodong Wu Jinhui Xu 《Journal of Combinatorial Optimization》2001,5(1):59-79
We present efficient algorithms for solving the problem of computing an optimal penetration (a ray or a semi-ray) among weighted regions in 2-D and 3-D spaces. This problem finds applications in several areas, such as radiation therapy, geological exploration, and environmental engineering. Our algorithms are based on a combination of geometric techniques and optimization methods. Our geometric analysis shows that the d-D (d = 2, 3) optimal penetration problem can be reduced to solving O(n
2(d–1)) instances of certain special types of non-linear optimization problems, where n is the total number of vertices of the regions. We also give implementation results of our 2-D algorithms. 相似文献
8.
We study the problem of separating sublinear time computations via approximating the diameter for a sequence S=p
1
p
2
⋅⋅⋅
p
n
of points in a metric space, in which any two consecutive points have the same distance. The computation is considered respectively
under deterministic, zero error randomized, and bounded error randomized models. We obtain a class of separations using various
versions of the approximate diameter problem based on restrictions on input data. We derive tight sublinear time separations
for each of the three computation models via proving that computation with O(n
r
) time is strictly more powerful than that with O(n
r−ε
) time, where r and ε are arbitrary parameters in (0,1) and (0,r) respectively. We show that, for any parameter r∈(0,1), the bounded error randomized sublinear time computation in time O(n
r
) cannot be simulated by any zero error randomized sublinear time algorithm in o(n) time or queries; and the same is true for zero error randomized computation versus deterministic computation. 相似文献
9.
This paper considers the static single machine scheduling problem with the objective of minimizing the maximum tardiness of any job subject to the constraint that the total number of lardy jobs is minimum. Based on simple dominance conditions an o(n2) heuristic algorithm is proposed to find an approximate solution to this problem. The effectiveness of the proposed heuristic algorithm is empirically evaluated by solving a large number of problems and comparing them to the optimal solutions obtained through the branch and bound algorithm. 相似文献
10.
This paper solves the problem of increasing the edge-connectivity of a bipartite digraph by adding the smallest number of new edges that preserve bipartiteness. A natural application arises when we wish to reinforce a 2-dimensional square grid framework with cables. We actually solve the more general problem of covering a crossing family of sets with the smallest number of directed edges, where each new edge must join the blocks of a given bipartition of the elements. The smallest number of new edges is given by a min-max formula that has six infinite families of exceptional cases. We discuss a problem on network flows whose solution has a similar formula with three infinite families of exceptional cases. We also discuss a problem on arborescences whose solution has five infinite families of exceptions. We give an algorithm that increases the edge-connectivity of a bipartite digraph in the same time as the best-known algorithm for the problem without the bipartite constraint: O(km log n) for unweighted digraphs and O(nm log (n
2/m)) for weighted digraphs, where n, m and k are the number of vertices and edges of the given graph and the target connectivity, respectively. 相似文献
11.
Sequence alignment is a central problem in bioinformatics. The classical dynamic programming algorithm aligns two sequences
by optimizing over possible insertions, deletions and substitutions. However, other evolutionary events can be observed, such
as inversions, tandem duplications or moves (transpositions). It has been established that the extension of the problem to
move operations is NP-complete. Previous work has shown that an extension restricted to non-overlapping inversions can be
solved in O(n
3) with a restricted scoring scheme. In this paper, we show that the alignment problem extended to non-overlapping moves can
be solved in O(n
5) for general scoring schemes, O(n
4log n) for concave scoring schemes and O(n
4) for restricted scoring schemes. Furthermore, we show that the alignment problem extended to non-overlapping moves, inversions
and tandem duplications can be solved with the same time complexities. Finally, an example of an alignment with non-overlapping
moves is provided.
A preliminary version of this paper appeared in the Proceedings of COCOON 2007, LNCS, vol. 4598, pp. 151–164. 相似文献
12.
The problem of optimal surface flattening in 3-D finds many applications in engineering and manufacturing. However, previous
algorithms for this problem are all heuristics without any quality guarantee and the computational complexity of the problem
was not well understood. In this paper, we prove that the optimal surface flattening problem is NP-hard. Further, we show
that the problem of flattening a topologically spherical surface admits a PTAS and can be solved by a (1+ε)-approximation algorithm in O(nlog n) time for any constant ε>0, where n is the input size of the problem. 相似文献
13.
Joon Y. Park 《Econometrica : journal of the Econometric Society》2003,71(6):1845-1895
We consider the bootstrap unit root tests based on finite order autoregressive integrated models driven by iid innovations, with or without deterministic time trends. A general methodology is developed to approximate asymptotic distributions for the models driven by integrated time series, and used to obtain asymptotic expansions for the Dickey–Fuller unit root tests. The second‐order terms in their expansions are of stochastic orders Op(n−1/4) and Op(n−1/2), and involve functionals of Brownian motions and normal random variates. The asymptotic expansions for the bootstrap tests are also derived and compared with those of the Dickey–Fuller tests. We show in particular that the bootstrap offers asymptotic refinements for the Dickey–Fuller tests, i.e., it corrects their second‐order errors. More precisely, it is shown that the critical values obtained by the bootstrap resampling are correct up to the second‐order terms, and the errors in rejection probabilities are of order o(n−1/2) if the tests are based upon the bootstrap critical values. Through simulations, we investigate how effective is the bootstrap correction in small samples. 相似文献
14.
In this paper an O(n2) mathematical formulation for in silico sequence selection in de novo protein design proposed by Klepeis et al. (2003, 2004), in which the number of additional variables and linear constraints scales with the square of the number of binary variables, is compared to three O(n) formulations. It is found that the O(n2) formulation is superior to the O(n) formulations on most sequence search spaces. The superiority of the O(n2) formulation is due to the reformulation linearization techniques (RLTs), since the O(n2) formulation without RLTs is found to be computationally less efficient than the O(n) formulations. In addition, new algorithmic enhancing components of RLTs with inequality constraints, triangle inequalities, and Dead-End Elimination (DEE) type preprocessing are added to the O(n2) formulation. The current best O(n2) formulation, which is the original formulation from Klepeis et al. (2003, 2004) plus DEE type preprocessing, is proposed for in silico sequence search. For a test problem with a search space of 3.4×1045 sequences, this new improved model is able to reduce the required CPU time by 67%. 相似文献
15.
The 2-INTERVAL PATTERN problem is to find the largest constrained pattern in a set of 2-intervals. The constrained pattern
is a subset of the given 2-intervals such that any pair of them are R-comparable, where model . The problem stems from the study of general representation of RNA secondary structures. In this paper, we give three improved
algorithms for different models. Firstly, an O(n{log} n +L) algorithm is proposed for the case , where is the total length of all 2-intervals (density d is the maximum number of 2-intervals over any point). This improves previous O(n
2log n) algorithm. Secondly, we use dynamic programming techniques to obtain an O(nlog n + dn) algorithm for the case R = { <, ⊏ }, which improves previous O(n
2) result. Finally, we present another algorithm for the case with disjoint support(interval ground set), which improves previous O(n
2□n) upper bound.
A preliminary version of this article appears in Proceedings of the 16th Annual International Symposium on Algorithms and
Computation, Springer LNCS, Vol. 3827, pp. 412–421, Hainan, China, December 19–21, 2005. 相似文献
16.
Arindam Karmakar Sandip Das Subhas C. Nandy Binay K. Bhattacharya 《Journal of Combinatorial Optimization》2013,25(2):176-190
Given a set P of n points and a straight line L, we study three important variations of minimum enclosing circle problem as follows:
- Computing k identical circles of minimum radius with centers on L, whose union covers all the points in P.
- Computing the minimum radius circle centered on L that can enclose at least k points of P.
- If each point in P is associated with one of the k given colors, then compute a minimum radius circle with center on L such that at least one point of each color lies inside it.
17.
The following planar minimum disk cover problem is considered in this paper: given a set
D\mathcal{D}
of n disks and a set ℘ of m points in the Euclidean plane, where each disk covers a subset of points in ℘, to compute a subset of disks with minimum
cardinality covering ℘. This problem is known to be NP-hard and an algorithm which approximates the optimal disk cover within
a factor of (1+ε) in
O(mnO(\frac1e2log2\frac1e))\mathcal{O}(mn^{\mathcal{O}(\frac{1}{\epsilon^{2}}\log^{2}\frac{1}{\epsilon})})
time is proposed in this paper. This work presents the first polynomial time approximation scheme for the minimum disk cover
problem where the best known algorithm can approximate the optimal solution with a large constant factor. Further, several
variants of the minimum disk cover problem such as the incongruent disk cover problem and the weighted disk cover problem
are considered and approximation schemes are designed. 相似文献
18.
This paper deals with facility location problems on graphs with positive and negative vertex weights. We consider two different
objective functions: In the first one (MWD) vertices with positive weight are assigned to the closest facility, whereas vertices
with negative weight are assigned to the farthest facility. In the second one (WMD) all the vertices are assigned to the nearest
facility. For the MWD model it is shown that there exists a finite set of points in the graph which contains the locations
of facilities in an optimal solution. Furthermore, algorithms for both models for the 2-median problem on a cycle are developed.
The algorithm for the MWD model runs in linear time, whereas the algorithm for the WMD model has a time complexity of
O(n2)\mathcal{O}(n^{2})
. 相似文献
19.
Energy efficient multicast problem is one of important issues in ad hoc networks. In this paper, we address the energy efficient
multicast problem for discrete power levels in ad hoc wireless networks. The problem of our concern is: given n nodes deployed over 2-D plane and each node v has l(v) transmission power levels and a multicast request (s,D) (clearly, when D is V∖{s}, the multicast request is a broadcast request), how to find a multicast tree rooted at s and spanning all destinations in D such that the total energy cost of the multicast tree is minimized. We first prove that this problem is NP-hard and it is
unlikely to have an approximation algorithm with performance ratio ρlnn(ρ<1). Then, we propose a general algorithm for the multicast/broadcast tree problem. And based on the general algorithm, we
propose an approximation algorithm and a heuristics for multicast tree problem. Especially, we also propose an efficient heuristic
for broadcast tree problem. Simulations ensure our algorithms are efficient. 相似文献
20.
Minghui Jiang 《Journal of Combinatorial Optimization》2007,13(3):217-221
The 2-interval pattern problem over its various models and restrictions was proposed by Vialette (2004) for the application
of RNA secondary structure prediction. We present an O(n
3logn)-time 2-approximation algorithm for the problem of finding a largest { < ,-structured subset of 2-intervals given an input 2-interval set of size n. This greatly improves the previous best approximation ratio of 6 by Crochemore et al. (2005). 相似文献