Probabilistic complexity analysis for linear problems in bounded domains
نویسنده
چکیده
Many numerical problems and methods for their approximate solution can be brought into the following abstract form: We are given a bounded linear operator S E L(X, Y) between Banach spaces X and Y, the “solution operator.” That is, for x E X, Sx is the true solution of the problem. We assume that we have only partial information on the “datum” x E X, which is given by a mapping N: X + R”, the “information operator.” Finally, we have a mapping cp: N(X) + Y that represents the action of the “algorithm” by which we obtain an approximation cp(N(x)) to Sx using the information N(x). N and cp are required to belong to certain classes of not necessarily linear, not necessarily continuous mappings. This approach is developed in the monograph “Information-Based Complexity,” by Traub, Wasilkowski, and Woiniakowski, (1988), later referred to as IBC (see also Traub and Woiniakowski, 1980; Traub, Wasilkowski, and Woiniakowski, 1983). The aim of the theory is to study concrete N and cp as well as optimality over 50 or both N and p. The quality of N and (c is judged by the behavior of the error IlSx cp(N(x))lJ. In the worst case setting, one takes the supremum of the error over a
منابع مشابه
Solution of Thermo-Fluid problems in Bounded Domains via the Numerical Panel Method
The classical panel method has been extensively used in external aerodynamics to calculate ideal flow fields around moving vehicles or stationary structures in unbounded domains. However, the panel method, as a somewhat simpler implementation of the boundary element method, has rarely been employed to solve problems in closed complex domains. This paper aims at filling this gap and discusses th...
متن کاملCharacterizations, bounds, and probabilistic analysis of two complexity measures for linear programming problems
This note provides a probabilistic analysis of χ̄A, a condition number used in the linear programming algorithm of Vavasis and Ye [14] whose running time depends only on the constraint matrix A ∈ IRm×n. We show that if A is a standard Gaussian matrix, then E(ln χ̄A) = O(min{m lnn, n}). Thus, the expected running time of linear programming is bounded by a polynomial in m and n for any right-hand s...
متن کاملExtension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...
متن کاملProbabilistic Inference and Monadic Second Order Logic
This paper combines two classic results from two different fields: the result by Lauritzen and Spiegelhalter [21] that the probabilistic inference problem on probabilistic networks can be solved in linear time on networks with a moralization of bounded treewidth, and the result by Courcelle [10] that problems that can be formulated in counting monadic second order logic can be solved in linear ...
متن کاملModeling of a Probabilistic Re-Entrant Line Bounded by Limited Operation Utilization Time
This paper presents an analytical model based on mean value analysis (MVA) technique for a probabilistic re-entrant line. The objective is to develop a solution method to determine the total cycle time of a Reflow Screening (RS) operation in a semiconductor assembly plant. The uniqueness of this operation is that it has to be borrowed from another department in order to perform the production s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Complexity
دوره 6 شماره
صفحات -
تاریخ انتشار 1990