首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
Given a digraph D, the minimum integral dicycle cover problem (known also as the minimum feedback arc set problem) is to find a minimum set of arcs that intersects every dicycle; the maximum integral dicycle packing problem is to find a maximum set of pairwise arc disjoint dicycles. These two problems are NP-complete.Assume D has a 2-vertex cut. We show how to derive a minimum dicycle cover (a maximum dicycle packing) for D, by composing certain covers (packings) of the corresponding pieces. The composition of the covers is simple and was partially considered in the literature before. The main contribution of this paper is to the packing problem. Let be the value of a minimum integral dicycle cover, and * () the value of a maximum (integral) dicycle packing. We show that if = then a simple composition, similar to that of the covers, is valid for the packing problem. We use these compositions to extend an O(n3) (resp., O(n4)) algorithm for finding a minimum integral dicycle cover (resp., packing) from planar digraphs to K3,3-free digraphs (i.e., digraphs not containing any subdivision of K3,3).However, if , then such a simple composition for the packing problem is not valid. We show, that if the pieces satisfy, what we call, the stability property, then a simple composition does work. We prove that if = * holds for each piece, then the stability property holds as well. Further, we use the stability property to show that if = * holds for each piece, then = * holds for D as well.  相似文献   

2.
We consider Steiner minimum trees (SMT) in the plane, where only orientations with angle , 0 i – 1 and an integer, are allowed. The orientations define a metric, called the orientation metric, , in a natural way. In particular, 2 metric is the rectilinear metric and the Euclidean metric can beregarded as metric. In this paper, we provide a method to find an optimal SMT for 3 or 4 points by analyzing the topology of SMT's in great details. Utilizing these results and based on the idea of loop detection first proposed in Chao and Hsu, IEEE Trans. CAD, vol. 13, no. 3, pp. 303–309, 1994, we further develop an O(n2) time heuristic for the general SMT problem, including the Euclidean metric. Experiments performed on publicly available benchmark data for 12 different metrics, plus the Euclidean metric, demonstrate the efficiency of our algorithms and the quality of our results.  相似文献   

3.
This paper first reviews the literature on the role of codes of conduct for organisations in Hong Kong in their attempts to manage increasingly complex ethical problems and issues. It shows that, although valuable foundations exist upon which to build, research and understanding of the subject is at it's embryonic stage. Social Psychology literature is examined to investigate what lessons those concerned with the study of ethics may learn and the work of Hofstede, as seminal in the area of work-related values, is emphasised in this context.Following Hofstede's proposals for strategies for operationalizing1 constructs about human values, a content analysis2 was conducted on a pilot sample of codes provided by Hong Kong organisations. The results show three clearly identified clusters of organisations with common formats. The first group, described as Foreign Legal, emphasises legal compliance, has criteria for invoking penalties and consists of foreign-owned, large multinational organisations. Companies in the second cluster have codes which, except in the case of a couple of larger organisations, mainly follow the Independent Commission Against Corruption's (ICAC) standard format. The third cluster, described as the Bank Network, also appear to largely conform to a format: the Hong Kong Banking Association's guidelines.Further analysis conducted here of the Hong Kong codes indicates the important role of emic teleological values3, such as trust and reputation, amongst indigenous organisations, rather than the amorality suggested by an earlier study (Dolecheck and Bethke, 1990). These results support the proposition that Hong Kong ethical perspectives are culture bound4, as there appear to be different emphases than revealed in an American study (Stevens, 1994), which identified an emphasis in the US codes upon introverted organisational issues and a failure to espouse deontological values5.The conclusion is that designing a research programme on business values in Hong Kong requires reference to studies of values in cross-cultural psychology generally and to Hofstede's work in particular. It also supports the need for indigenous research and models in this field which avoid the ethnocentrism inherent in much Western theory and research.  相似文献   

4.
In this paper, it is argued that international diversityin the rules governing corporate accountability is afunction of the desire to preserve local jurisdictionsby maintaining national distinctiveness. Successiveattempts at regulatory harmonisation in Europe havemet considerable resistance, starting with Savignysappeal to the spirit of the people (Volksgeist)and ending with the notion of subsidiarity. In thispaper, territorial claims on regulation are exploredin the context of the rules governing asset revaluation,where there are still almost as many required methodsof accounting in the European Union as there aremember states. The paper rejects the conventionalexplanation that such differences are culture-bound,and instead suggests that the continued existence ofnational rules in accounting reflects the pursuit ofautonomy by individual states and the self-interestof national regulators.  相似文献   

5.
Each human being has an internal timekeeping mechanism. To date, over 100 so-called circadian rhythms have been detected. Perhaps the most significant is body temperature. There is an apparent connection between this rhythm and the efficiency with which we do things in the course of the working day. Within individuals, patterns have been discovered which give credence to the popular notions of a morning or an afternoon person, and so on. Our memory changes from morning to afternoon: short-term memory is stronger in the morning, and long-term memory stronger in the afternoon; in schools, morning students have higher grades than students who have other time-of-day preferences. Therefore, a strong case can be made in support of flexible time schedules. It is reported that productivity went up on the introduction of such a scheme. Employee stress has been seen to decline also. When flextime was offered, parents with small children took advantage of the benefit as well as unmarried employees. The only drawback is ensuring that, with so many individual variations in preferences, the needs of the company are fully met. If such a scheme can be devised, however, the research suggests that productivity and efficiency will increase.  相似文献   

6.
Given a set of points P in a metric space, let l(P) denote the ratio of lengths between the shortest k-edge-connected Steiner network and the shortest k-edge-connected spanning network on P, and let r = inf l(P) P for k 1. In this paper, we show that in any metric space, r 3/4 for k 2, and there exists a polynomial-time -approximation for the shortest k-edge-connected Steiner network, where = 2 for even k and = 2 + 4/(3k) for odd k. In the Euclidean plane, and .  相似文献   

7.
Given an undirected multigraph G = (V, E) and two positive integers and k, we consider the problem of augmenting G by the smallest number of new edges to obtain an -edge-connected and k-vertex-connected multigraph. In this paper, we show that the problem can be solved in Õ(mn2) time for any fixed and k = 3 if an input multigraph G is 2-vertex-connected, where n = |V| and m is the number of pairs of adjacent vertices in G.  相似文献   

8.
This paper examines the method of Jewish business ethics. MichaelWalzer, in his work, Interpretation and Social Criticism (1987), suggeststhree common and important approaches to moral philosophy. He labels thesethe path of discovery, the path of invention, and the path ofinterpretation. The first part of this paper argues that Jewish businessethics is best thought of in terms of interpretation. Without question, thereligious ethicist immediately recognizes Walzers metaphor of the moralworld as a home occupied by a single family over many generations... as his own. Ethical arguments from a Jewish perspective must of necessityhave a lived-in quality and always make reference to and are based on thememory-laden objects and artifacts. The second part of the paper exploressome of the implications of Jewish business ethics as interpretation.  相似文献   

9.
This paper tries to trace the background of the modern business paradigm. A business mind dominating the social mind has been the root cause of unethicality in an order, according to this paper. The solution could come from the liberation of the social mind through a process of mind engineering at the individual level. The paper suggests an active mechanism to inculcate values through a systematic process of mind engineering.  相似文献   

10.
The classical greedy heuristic for approximating maximum independent set is simple and efficient. It achieves a performance ratio of ( + 2)/3, where is the maximum node degree of the input graph. All known algorithms for the problem with better performance ratios are much more complicated and inefficient. In this paper, we propose a natural extension of the greedy heuristic. It is as simple and as efficient as the classical greedy heuristic. By a careful analysis on the structure of the intermediate graphs manipulated by our heuristic, we prove that the performance ratio is improved to ( + 3)/3.25.  相似文献   

11.
This study uses a sample comprised of U.S. students and Iraqi students to determine if differences occur over ethical perceptions based on cultural/demographic issues. Irrespective of demographics, the results of this study indicate significant cultural differences between Iraqi students and American students with regard to selected ethical issues concerning graduate education. Specifically the differences occurred in the students' perceptions of winning is everything, selling one's soul, logic before emotion, and pander to professors. Iraqi students consistently viewed these beliefs as more necessary for success in their graduate education than did their American counterparts.  相似文献   

12.
For a multigraph G = (V, E), let s V be a designated vertex which has an even degree, and let G (V – s) denote min{c G(X) | Ø X V – s}, where c G(X) denotes the size of cut X. Splitting two adjacent edges (s, u) and (s, v) means deleting these edges and adding a new edge (u, v). For an integer k, splitting two edges e 1 and e 2 incident to s is called (k, s)-feasible if G(V – s) k holds in the resulting graph G. In this paper, we prove that, for a planar graph G and an even k or k = 3 with k G (V – s), there exists a complete (k, s)-feasible splitting at s such that the resulting graph G is still planar, and present an O(n 3 log n) time algorithm for finding such a splitting, where n = |V|. However, for every odd k 5, there is a planar graph G with a vertex s which has no complete (k, s)-feasible and planarity-preserving splitting. As an application of this result, we show that for an outerplanar graph G and an even integer k the problem of optimally augmenting G to a k-edge-connected planar graph can be solved in O(n 3 log n) time.  相似文献   

13.
A fully polynomial time approximation scheme (FPTAS) is presented for the classical 0-1 knapsack problem. The new approach considerably improves the necessary space requirements. The two best previously known approaches need O(n + 1/3) and O(n · 1/) space, respectively. Our new approximation scheme requires only O(n + 1/2) space while also reducing the running time.  相似文献   

14.
The paper examines the factors that influence socially responsible decision making by individuals. The study found four social responsibility styles: Playing it Safe, Weather The Storm, Problem to Solve, and Hope it Goes Away. These styles describe individuals on the basis of decision style, propensity for risk, and coping style. The styles explain why people with different values might come to the same decision in the same circumstances.  相似文献   

15.
Algorithm for the Cost Edge-Coloring of Trees   总被引:1,自引:0,他引:1  
Let C be a set of colors, and let be a cost function which assigns a real number (c) to each color C in C. An edge-coloring of a graph G is to color all the edges of G so that any two adjacent edges are colored with different colors. In this paper we give an efficient algorithm to find an optimal edge-coloring of a given tree T, that is, an edge-coloring f of T such that the sum of costs (f(e)) of colors f(e) assigned to all edges e is minimum among all edge-colorings of T. The algorithm takes time O(n2) if n is the number of vertices and is the maximum degree of T.  相似文献   

16.
Given a graph G = (V,E), we define the locally optimal independent sets asfollows. Let S be an independent set and T be a subset of V such that S T = and (S) T, where (S) is defined as the neighbor set of S. A minimum dominating set of S in T is defined as TD(S) T such that every vertex of S is adjacent to a vertex inTD(S) and TD(S) has minimum cardinality. An independent setI is called r-locally optimal if it is maximal and there exists noindependent set S V\I with |ID (S)| r such that|S| >|I (S)|.In this paper, we demonstrate that for k-claw free graphs ther-locally optimal independent sets is found in polynomial timeand the worst case is bounded by , where I and I* are a locally optimal and an optimal independent set,respectively. This improves the best published bound by Hochbaum (1983) bynearly a factor of two. The bound is proved by LP duality and complementaryslackness. We provide an efficientO(|V|r+3) algorithm to find an independent set which is notnecessarily r-locally optimal but is guarantteed with the above bound. Wealso present an algorithm to find a r-locally optimal independent set inO(|V|r(k-1)+3) time.  相似文献   

17.
This paper argues that modularity of knowledge andtechnologies has important implications for the locusof inventive activities. This is because modularityallows for a separation of the innovation process intwo main activities: The production of basic(standardised) modules, and their combination toproduce variants of technologies or product designsthat are better suited to the special needs ofindividual users or markets. This gives rise to adivision of labour whereby the production of moduleswill be performed by specialised upstream suppliers(who enjoy economies of scale), while the combinationof modules will be performed by firms furtherdownstream or by the users themselves. We then suggestthat this pattern can explain a variety of phenomenasuch as why users co-produce their innovations, andhow small regions can support innovative activitydespite the apparent efficiency advantage of largerregions.  相似文献   

18.
This article employs an institutional perspective in formulating predictions about the ethical futures of privatization partnerships. Although this paper focuses on ethical concerns in the U.S. public sector, it incorporates a multinational dimension in (a) comparing the meaning of privatization among societies and (b) probing privatization financing in the global economy. Five assumptions that flow from institutional reasoning are made explicit as supports for subsequent predictions. The institutional logic shifts privatization conversation away from conventional debate about competition and efficiency toward centralizing forces in both sectors in response to globalization. In that regard, this study identifies the systemic erosion of (local) community integrity as the key privatization problem of the future.  相似文献   

19.
Context in the Risk Assessment of Digital Systems   总被引:1,自引:0,他引:1  
As the use of digital computers for instrumentation and control of safety-critical systems has increased, there has been a growing debate over the issue of whether probabilistic risk assessment techniques can be applied to these systems. This debate has centered on the issue of whether software failures can be modeled probabilistically. This paper describes a context-based approach to software risk assessment that explicitly recognizes the fact that the behavior of software is not probabilistic. The source of the perceived uncertainty in its behavior results from both the input to the software as well as the application and environment in which the software is operating. Failures occur as the result of encountering some context for which the software was not properly designed, as opposed to the software simply failing randomly. The paper elaborates on the concept of error-forcing context as it applies to software. It also illustrates a methodology which utilizes event trees, fault trees, and the Dynamic Flowgraph Methodology (DFM) to identify error-forcing contexts for software in the form of fault tree prime implicants.  相似文献   

20.
Let D = (V, A) be a directed graph, for each vertex v V, let +(v) and (v) denote the sets of arcs leaving and entering v, and be intersecting families on +(v) and (v), respectively, and and be submodular functions on intersecting pairs. A flow f : A R is feasible if
Given a cost function c on A, the minimum cost polymatroidal flow problem is to find a feasible flow f with minimum cost {c(e)f(e)ve A}, it is a significant generalization of many combinatorial optimization problems.Given a feasible flow f*, cost and restriction functions on A, the inverse polymatroidal flow problem is to modify c, optimally and with bounds, such that f* becomes a minimum cost polymatroidal flow under the modified cost.It is shown in this paper that the inverse problem can be formulated as a combinatorial linear program and can be further transformed into a minimum cost circulation problem. Hence it can be solved efficiently by strongly polynomial combinatorial algorithms. We also give a necessary and sufficient condition for the feasibility of the inverse problem.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号