Journal of Information and Computing Science, JIC, Vol1 2006 No1

نویسندگان

  • Ping Gong
  • Daoyun Xu
چکیده

( , ) k s SAT − is the propositional satisfiable problem restricted to instances where each clause has exactly k distinct literals and every variable occurs at most s times. It is known that there exits an exponential function f such that for ( ) s f k ≤ , all ( , ) k s SAT − instances are satisfiable, but ( , ( ) 1) k f k SAT + − is already NPcomplete ( 3 k ≥ ). Therefore, we call the function (.) f critical function. Exact values of (.) f are only known for 3 k = and 4 k = , and it’s open whether (.) f is computable. The best known lower and upper bounds on ( ) f k are (2 / ) k k Ω and (2 / ) k k Ο , where 3 log 1 0.26 α = − ≈ , respectively. In this paper, analogous to the randomized algorithm for finding two coloring of k − uniform hypergraph, we first present a similar randomize algorithm for outputting an assignment for a given formula. Based on it and by probabilistic method, we prove that, for every integer 2 k ≥ , each formula F in ( ,*) k CNF − with at most 0.58 2 ln k k k × clauses is satisfiable. In addition, by the Lovász Local lemma, we get a new lower bound of ( ) f k , ( 2 / ) ln k k k k Ω , which improves the result (2 / ) k k Ω .

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Journal of Information and Computing Science, JIC, Vol1 2006 No1, ISSN 1746-7659

Abstract. Time Petri Nets (TPNs) are a popular Petri net model for specification and verification of real-time systems. A widely applied method for analyzing Petri nets is component-level reduction analysis. The existing technique for component-level reduction analysis transforms a TPN component to a constant size of simple one while maintains the net external observable timing properties, but ...

متن کامل

Journal of Information and Computing Science, JIC, Vol1 2006 No2

Security downgrading policies control information flow and permit information release from a high security level to low security level. Many security downgrading policies are treated as declassification. This paper extend security policies to operations than declassification , the security downgrading policies support downgrading in practical software, each downgrading step is annotated with so...

متن کامل

, Vol1. No.1, JIC, Journal of Informaiton and Computing Science

A new method for the solution of the generalized complementarily problem is introduced. The method is based on a no smooth equation reformulation of the generalized complementarily problem and on a no smooth Levenberg-Marquardt method for its solution. The method is shown to be globally convergent. Numerical results are also given.

متن کامل

, Vol1. No.1, JIC, Journal of Informaiton and Computing Science

In this paper, based on Lyapunov stability theory, a scheme to realize finite-time hybrid synchronization of time-delay hyperchaotic Lorenz system is proposed. By theoretical analysis, the controllers are constructed. Finally, numerical simulations are given to verify the theoretical results.

متن کامل

2006, Vol1. No.3, JIC, Journal of Informaiton and Computing Science

Abstract. In this paper an adaptive sliding mode controller is presented for a class of master-slave chaotic synchronization systems with uncertainties. The concept of extended systems is used such that continuous control input is obtained using a sliding mode design scheme. By comparing with the results in the existed literatures, the results show that the master-slave chaotic systems with unc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006