Journal of Information and Computing Science, JIC, Vol1 2006 No1
نویسندگان
چکیده
( , ) k s SAT − is the propositional satisfiable problem restricted to instances where each clause has exactly k distinct literals and every variable occurs at most s times. It is known that there exits an exponential function f such that for ( ) s f k ≤ , all ( , ) k s SAT − instances are satisfiable, but ( , ( ) 1) k f k SAT + − is already NPcomplete ( 3 k ≥ ). Therefore, we call the function (.) f critical function. Exact values of (.) f are only known for 3 k = and 4 k = , and its open whether (.) f is computable. The best known lower and upper bounds on ( ) f k are (2 / ) k k Ω and (2 / ) k k Ο , where 3 log 1 0.26 α = − ≈ , respectively. In this paper, analogous to the randomized algorithm for finding two coloring of k − uniform hypergraph, we first present a similar randomize algorithm for outputting an assignment for a given formula. Based on it and by probabilistic method, we prove that, for every integer 2 k ≥ , each formula F in ( ,*) k CNF − with at most 0.58 2 ln k k k × clauses is satisfiable. In addition, by the Lovász Local lemma, we get a new lower bound of ( ) f k , ( 2 / ) ln k k k k Ω , which improves the result (2 / ) k k Ω .
منابع مشابه
Journal of Information and Computing Science, JIC, Vol1 2006 No1, ISSN 1746-7659
Abstract. Time Petri Nets (TPNs) are a popular Petri net model for specification and verification of real-time systems. A widely applied method for analyzing Petri nets is component-level reduction analysis. The existing technique for component-level reduction analysis transforms a TPN component to a constant size of simple one while maintains the net external observable timing properties, but ...
متن کاملJournal of Information and Computing Science, JIC, Vol1 2006 No2
Security downgrading policies control information flow and permit information release from a high security level to low security level. Many security downgrading policies are treated as declassification. This paper extend security policies to operations than declassification , the security downgrading policies support downgrading in practical software, each downgrading step is annotated with so...
متن کامل, Vol1. No.1, JIC, Journal of Informaiton and Computing Science
A new method for the solution of the generalized complementarily problem is introduced. The method is based on a no smooth equation reformulation of the generalized complementarily problem and on a no smooth Levenberg-Marquardt method for its solution. The method is shown to be globally convergent. Numerical results are also given.
متن کامل, Vol1. No.1, JIC, Journal of Informaiton and Computing Science
In this paper, based on Lyapunov stability theory, a scheme to realize finite-time hybrid synchronization of time-delay hyperchaotic Lorenz system is proposed. By theoretical analysis, the controllers are constructed. Finally, numerical simulations are given to verify the theoretical results.
متن کامل2006, Vol1. No.3, JIC, Journal of Informaiton and Computing Science
Abstract. In this paper an adaptive sliding mode controller is presented for a class of master-slave chaotic synchronization systems with uncertainties. The concept of extended systems is used such that continuous control input is obtained using a sliding mode design scheme. By comparing with the results in the existed literatures, the results show that the master-slave chaotic systems with unc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006