handle 发表于 2025-3-23 11:45:58

The Complexity of Constructing Evolutionary Trees Using Experimentsstructs an evolutionary tree of . species in time .(. log..) using at most .⌈./2⌉(log..+.(1)) experiments for . > 2, and at most .(log .+.(1)) experiments for . = 2, where . is the degree of the tree. This improves the previous best upper bound by a factor .(log .). For . = 2 the previously best alg

牌带来 发表于 2025-3-23 15:22:49

Hidden Pattern Statisticsunderstood as a sequence of consecutive symbols). A characteristic parameter is the number of occurrences of a given pattern . of length . as a subsequence in a random text of length . generated by a memoryless source. Spacings between letters of the pattern may either be constrained or not in order

Minatory 发表于 2025-3-23 19:28:38

http://reply.papertrans.cn/17/1663/166220/166220_13.png

semiskilled 发表于 2025-3-24 00:03:54

All-Pairs Shortest Paths Computation in the BSP ModelSP algorithm for the all-pairs shortest paths problem in a weighted directed dense graph. In contrast with the general algebraic path algorithm, which performs .(..) to .(..) global synchronisation steps, our new algorithm only requires .(log .) synchronisation steps.

工作 发表于 2025-3-24 02:39:05

http://reply.papertrans.cn/17/1663/166220/166220_15.png

即席 发表于 2025-3-24 06:52:47

Approximation Hardness of TSP with Bounded Metricsonstant factor as soon as the metric is bounded. In this paper we study the asymmetric and symmetric TSP problems with bounded metrics and prove approximation lower bounds of 101/100 and 203/202, respectively, for these problems. We prove also approximation lower bounds of 321/320 and 743/742 for th

N斯巴达人 发表于 2025-3-24 12:13:11

http://reply.papertrans.cn/17/1663/166220/166220_17.png

podiatrist 发表于 2025-3-24 16:06:26

http://reply.papertrans.cn/17/1663/166220/166220_18.png

transdermal 发表于 2025-3-24 22:30:55

A Characterization of Temporal Locality and Its Portability across Memory Hierarchiesre are computations whose optimal schedule does vary with the access function. In particular, we exhibit some computations for which any schedule is bound to be a polynomial factor slower than optimal on at least one of two sufficiently different machines. On the positive side, we show that relative

Vulnerable 发表于 2025-3-25 01:28:52

http://reply.papertrans.cn/17/1663/166220/166220_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Automata, Languages and Programming; 28th International C Fernando Orejas,Paul G. Spirakis,Jan Leeuwen Conference proceedings 2001 Springer