Transformations on regular nondominated coteries and their applications

被引:2
作者
Makino, K [1 ]
Kameda, T
机构
[1] Osaka Univ, Grad Sch Engn Sci, Div Syst Sci, Toyonaka, Osaka 5608531, Japan
[2] Simon Fraser Univ, Fac Sci Appl, Sch Comp Sci, Burnaby, BC V5A 1S6, Canada
关键词
coterie; nondominatedness; regular coterie; availability; mutual exclusion; positive self-dual Boolean function; regular self-dual Boolean function; g-regular functional;
D O I
10.1137/S0895480100371110
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A coterie under an underlying set U is a family of subsets of U such that every pair of subsets has at least one element in common, but neither is a subset of the other. A coterie C under U is said to be nondominated (ND) if there is no other coterie D under U such that, for every Q is an element of C, there exists Q' is an element of D satisfying Q' subset of or equal to Q. We introduce the operation sigma which transforms a ND coterie to another ND coterie. A regular coterie is a natural generalization of a vote-assignable coterie. We show that any regular ND coterie C can be transformed to any other regular ND coterie D by judiciously applying the sigma operation to C at most \C\ + \D\ - 2 times. As another application of the sigma operation, we present an incrementally polynomial-time algorithm for generating all regular ND coteries. We then introduce the concept of a g-regular functional as a generalization of availability. We show how to construct an optimum coterie C with respect to a g-regular functional in O(n(3)\C\) time, where n = \U\. Finally, we discuss the structures of optimum coteries. with respect to a g-regular functional.
引用
收藏
页码:381 / 407
页数:27
相关论文
共 39 条
[1]   Optimal availability quorum systems: Theory and practice [J].
Amir, Y ;
Wool, A .
INFORMATION PROCESSING LETTERS, 1998, 65 (05) :223-228
[2]  
[Anonymous], ACM COMPUTING SURVEY, DOI [10.1145/5505.5508, DOI 10.1145/5505.5508]
[3]  
[Anonymous], 1971, J COMBIN THEORY B
[4]   Reverse search for enumeration [J].
Avis, D ;
Fukuda, K .
DISCRETE APPLIED MATHEMATICS, 1996, 65 (1-3) :21-46
[5]   A PIVOTING ALGORITHM FOR CONVEX HULLS AND VERTEX ENUMERATION OF ARRANGEMENTS AND POLYHEDRA [J].
AVIS, D ;
FUKUDA, K .
DISCRETE & COMPUTATIONAL GEOMETRY, 1992, 8 (03) :295-313
[6]  
BARBARA D, 1987, IEEE T COMPUT, V36, P1197, DOI 10.1109/TC.1987.1676860
[7]   THE VULNERABILITY OF VOTE ASSIGNMENTS [J].
BARBARA, D ;
GARCIAMOLINA, H .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1986, 4 (03) :187-213
[8]   AN O(MN) ALGORITHM FOR REGULAR SET-COVERING PROBLEMS [J].
BERTOLAZZI, P ;
SASSANO, A .
THEORETICAL COMPUTER SCIENCE, 1987, 54 (2-3) :237-247
[9]   COMPLEXITY OF IDENTIFICATION AND DUALIZATION OF POSITIVE BOOLEAN FUNCTIONS [J].
BIOCH, JC ;
IBARAKI, T .
INFORMATION AND COMPUTATION, 1995, 123 (01) :50-63
[10]   GENERATING AND APPROXIMATING NONDOMINATED COTERIES [J].
BIOCH, JC ;
IBARAKI, T .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 1995, 6 (09) :905-914