A New Bound for the Path Cover Problem

来源 :2014全国理论计算机科学学术年会 | 被引量 : 0次 | 上传用户:gege1232000
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  We consider the path cover problem which is to find a set of vertex-disjoint paths for a simple undirectedgraph with maximum number of edges to cover all vertices of this graph.The path cover problem isNP-hard because the well known Hamilton path problem is NP complete and the Hamilton path problemis a special case of the path cover problem.In this paper we present a new upper bound for the size of asolution of the path cover problem We believe that the upper bound is useful for our future research.Asan application,we devise a 7-10approximation algorithm whose time complexity is O(|V‖E|1.5log(|V|))where |V| is the number of vertices and |E| is the number of edges of a graph.Recall that the bestapproximation ratio is 6-7 which is achieved by Berman et al[20].However,their algorithm has timecomplexity O(|V|9) which is much slower than ours.
其他文献
Considering poor quality and high noise in medical data,we propose an ensemble classifier based on support vector machine (SVM) and apply this classifier to health identification.Health identification
An L(2,1)-labeling of a graph G is an assignment of nonnegative integers to the vertices of G such that adjacent vertices get numbers at least two apart,and vertices at distance two get distinct numbe
We investigate the unbalanced cut problems.A cut (A;B) is called unbalanced if the size of its smaller side is at most k (called k-size) or exactly k (called Ek-size),where k is an input parameter.An
会议
To solve the security problems in single-cloud storage,multi-cloud storage system has been put forward in some literatures.However,when using multi-cloud,a user needs to be authenticated by different
It is crucial for synonym substitution-based steganographic algorithms to choose a suitable coding strategy for high embedding capacity.In this paper,three existing coding strategies are discussed in
Three-dimensional image registration of CT and MRI of human knees facilitates the construction of high-quality models providing the features of both modalities.This multi-modal image registration prob
K-anonymity privacy model is a typical model to protect privacy when disseminating data involving individual subjects.The drawback of k-anonymity is that generalization will result in considerable los
Feature selection method is very important for text categorization.In this paper,several classic feature selection methods are analyzed and their defficiencies are summarized firstly,and then a new fe
In the rigid-fluid coupling scenarios,rigid body sampling plays an important role on the authenticity of the simulation.The sampling method usually used is not uniform,and the effect is not ideal.This
Mobile devices in Opportunistic Networks are used and carried by people,whose social behaviors and characteristics can greatly improve the routing performance.However,most routing protocols resort mer