handle 发表于 2025-3-23 11:45:58
The Complexity of Constructing Evolutionary Trees Using Experimentsstructs an evolutionary tree of . species in time .(. log..) using at most .⌈./2⌉(log..+.(1)) experiments for . > 2, and at most .(log .+.(1)) experiments for . = 2, where . is the degree of the tree. This improves the previous best upper bound by a factor .(log .). For . = 2 the previously best alg牌带来 发表于 2025-3-23 15:22:49
Hidden Pattern Statisticsunderstood as a sequence of consecutive symbols). A characteristic parameter is the number of occurrences of a given pattern . of length . as a subsequence in a random text of length . generated by a memoryless source. Spacings between letters of the pattern may either be constrained or not in orderMinatory 发表于 2025-3-23 19:28:38
http://reply.papertrans.cn/17/1663/166220/166220_13.pngsemiskilled 发表于 2025-3-24 00:03:54
All-Pairs Shortest Paths Computation in the BSP ModelSP algorithm for the all-pairs shortest paths problem in a weighted directed dense graph. In contrast with the general algebraic path algorithm, which performs .(..) to .(..) global synchronisation steps, our new algorithm only requires .(log .) synchronisation steps.工作 发表于 2025-3-24 02:39:05
http://reply.papertrans.cn/17/1663/166220/166220_15.png即席 发表于 2025-3-24 06:52:47
Approximation Hardness of TSP with Bounded Metricsonstant factor as soon as the metric is bounded. In this paper we study the asymmetric and symmetric TSP problems with bounded metrics and prove approximation lower bounds of 101/100 and 203/202, respectively, for these problems. We prove also approximation lower bounds of 321/320 and 743/742 for thN斯巴达人 发表于 2025-3-24 12:13:11
http://reply.papertrans.cn/17/1663/166220/166220_17.pngpodiatrist 发表于 2025-3-24 16:06:26
http://reply.papertrans.cn/17/1663/166220/166220_18.pngtransdermal 发表于 2025-3-24 22:30:55
A Characterization of Temporal Locality and Its Portability across Memory Hierarchiesre are computations whose optimal schedule does vary with the access function. In particular, we exhibit some computations for which any schedule is bound to be a polynomial factor slower than optimal on at least one of two sufficiently different machines. On the positive side, we show that relativeVulnerable 发表于 2025-3-25 01:28:52
http://reply.papertrans.cn/17/1663/166220/166220_20.png