On the Monotone Upper Bound Problem
نویسندگان
چکیده
The Monotone Upper Bound Problem asks for the maximal number M(d, n) of vertices on a strictly-increasing edge-path on a simple d-polytope with n facets. More specifically, it asks whether the upper bound M(d, n) ≤ Mubt(d, n) provided by McMullen’s (1970) Upper Bound Theorem is tight, where Mubt(d, n) is the number of vertices of a dual-to-cyclic d-polytope with n facets. It was recently shown that the upper bound M(d, n) ≤ Mubt(d, n) holds with equality for small dimensions (d ≤ 4: Pfeifle, 2003) and for small corank (n ≤ d+ 2: Gärtner et al., 2001). Here we prove that it is not tight in general: In dimension d = 6 a polytope with n = 9 facets can have Mubt(6, 9) = 30 vertices, but not more than 26 ≤ M(6, 9) ≤ 29 vertices can lie on a strictly-increasing edge-path. The proof involves classification results about neighborly polytopes, Kalai’s (1988) concept of abstract objective functions, the Holt-Klee conditions (1998), explicit enumeration, Welzl’s (2001) extended Gale diagrams, randomized generation of instances, as well as non-realizability proofs via a version of the Farkas lemma. ∗Supported by the European Graduate Program Combinatorics, Geometry, and Computation (GRK 588/2) in Berlin and by the GIF project Combinatorics of Polytopes in Euclidean Spaces (I-624-35.6/1999) ∗∗Partially supported by Deutsche Forschungs-Gemeinschaft (DFG), FZT86, ZI 475/3 and ZI 475/4
منابع مشابه
Improved Monotone Circuit Depth Upper Bound for Directed Graph Reachability
We prove that the directed graph reachability problem (transitive closure) can be solved by monotone fan-in 2 boolean circuits of depth (1/2+o(1))(log n)^2, where n is the number of nodes. This improves the previous known upper bound (1+o(1))(log n)^2. The proof is non-constructive, but we give a constructive proof of the upper bound (7/8+o(1))(log n)^2.
متن کاملA full Nesterov-Todd step infeasible interior-point algorithm for symmetric cone linear complementarity problem
A full Nesterov-Todd (NT) step infeasible interior-point algorithm is proposed for solving monotone linear complementarity problems over symmetric cones by using Euclidean Jordan algebra. Two types of full NT-steps are used, feasibility steps and centering steps. The algorithm starts from strictly feasible iterates of a perturbed problem, and, using the central path and feasi...
متن کاملA Berry-Esseen Type Bound for a Smoothed Version of Grenander Estimator
In various statistical model, such as density estimation and estimation of regression curves or hazard rates, monotonicity constraints can arise naturally. A frequently encountered problem in nonparametric statistics is to estimate a monotone density function f on a compact interval. A known estimator for density function of f under the restriction that f is decreasing, is Grenander estimator, ...
متن کاملLower bound for monotone Boolean convolution
Any monotone Boolean circuit computing the n-dimensional Boolean convolution requires at least n2 and-gates. This matches the obvious upper bound. The previous best bound for this problem was Ω(n4/3), obtained by Norbert Blum in 1981. More generally, exact bounds are given for all semi-disjoint bilinear forms.
متن کاملThe Problem of Scheduling Several Products on A Single Facility with the Simulated Annealing Technique
This paper considers the Economic Lot Scheduling Problem, that is, the problem of scheduling several products on a single facility so as to minimize holding and setup costs. Combination of frequency and timing as well as production quantity make this problem Np-hard. A heuristic is developed to obtain a good solution to ELSP. The proposed heuristic makes use of the Simulated Annealing Technique...
متن کاملDirected vs. Undirected Monotone Contact Networks for Threshold Functions
we consider the problem of Computing threshold functions wing directed and undirected monotone contact networks. Our main results are the following. First, we show that there exist directed monotone contact networks that compute T,“, 2 5 k 5 n 1, of size O(k(n k + 2)log(n k + 2)). This bound is almost optimal for small thresholds, since there exists an R(knlog(n/(k 1))) lower bound. OUT network...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Experimental Mathematics
دوره 13 شماره
صفحات -
تاریخ انتشار 2004