Is it Possible to Have a Feasible Enclosure-Computing Method Which Is Independent of the Equivalent Form?
نویسندگان
چکیده
The problem of computing the range y of a given function f(x1, . . . , xn) over given intervals xi – often called the main problem of interval computations – is, in general, NP-hard. This means that unless P = NP, it is not possible to have a feasible (= polynomial time) algorithm that always computes the desired range. Instead, interval computations algorithms compute an enclosure Y ⊇ y for the desired range. For all known feasible enclosure-computing methods – starting with straightforward interval computations – there exist two expressions f(x1, . . . , xn) and g(x1, . . . , xn) for computing the same function that lead to different enclosures. We prove that, unless P = NP, this is inevitable: it is not possible to have a feasible enclosure-computing method which is independent of the equivalent form.
منابع مشابه
Shielding Effectiveness of a Lossy Metallic Enclosure
In this paper, shielding effectiveness (SE) of a perforated enclosure with imperfectly conducting walls is evaluated. To this end, first, an accurate numerical technique based on method of Moments (MoM) ispresented. In this method, lossy metallic walls of the enclosure are replaced by equivalent electric surfacecurrent sources. Then, the impedance boundary condition on the imperfectly conductin...
متن کاملA bi-level linear programming problem for computing the nadir point in MOLP
Computing the exact ideal and nadir criterion values is a very important subject in multi-objective linear programming (MOLP) problems. In fact, these values define the ideal and nadir points as lower and upper bounds on the nondominated points. Whereas determining the ideal point is an easy work, because it is equivalent to optimize a convex function (linear function) over a con...
متن کاملRay-tracing and Interferometry in Schwarzschild Geometry
Here, we investigate the possible optical anisotropy of vacuum due to gravitational field. In doing this, we provide sufficient evidence from direct coordinate integration of the null-geodesic equations obtained from the Lagrangian method, as well as ray-tracing equations obtained from the Plebanski’s equivalent medium theory. All calculations are done for the Schwarzschild geometry, which resu...
متن کاملNovel Impossible Differential Cryptanalysis of Zorro Block Cipher
Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...
متن کاملAsymptotic algorithm for computing the sample variance of interval data
The problem of the sample variance computation for epistemic inter-val-valued data is, in general, NP-hard. Therefore, known efficient algorithms for computing variance require strong restrictions on admissible intervals like the no-subset property or heavy limitations on the number of possible intersections between intervals. A new asymptotic algorithm for computing the upper bound of the samp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Reliable Computing
دوره 18 شماره
صفحات -
تاریخ انتشار 2013