Skip to main content

Showing 1–3 of 3 results for author: Posypkin, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1506.06284  [pdf, ps, other

    cs.DS cs.CC

    Upper bound on the number of steps for solving the subset sum problem by the Branch-and-Bound method

    Authors: Roman Kolpakov, Mikhail Posypkin

    Abstract: We study the computational complexity of one of the particular cases of the knapsack problem: the subset sum problem. For solving this problem we consider one of the basic variants of the Branch-and-Bound method in which any sub-problem is decomposed along the free variable with the maximal weight. By the complexity of solving a problem by the Branch-and-Bound method we mean the number of steps re… ▽ More

    Submitted 20 June, 2015; originally announced June 2015.

  2. arXiv:1309.4055  [pdf, ps, other

    cs.FL

    Searching of gapped repeats and subrepetitions in a word

    Authors: Roman Kolpakov, Mikhail Podolskiy, Mikhail Posypkin, Nickolay Khrapov

    Abstract: A gapped repeat is a factor of the form $uvu$ where $u$ and $v$ are nonempty words. The period of the gapped repeat is defined as $|u|+|v|$. The gapped repeat is maximal if it cannot be extended to the left or to the right by at least one letter with preserving its period. The gapped repeat is called $α$-gapped if its period is not greater than $α|v|$. A $δ$-subrepetition is a factor which exponen… ▽ More

    Submitted 29 September, 2013; v1 submitted 16 September, 2013; originally announced September 2013.

  3. arXiv:1102.3563  [pdf, ps, other

    cs.DC

    Parallel algorithms for SAT in application to inversion problems of some discrete functions

    Authors: Alexander Semenov, Oleg Zaikin, Dmitry Bespalov, Mikhail Posypkin

    Abstract: In this article we consider the inversion problem for polynomially computable discrete functions. These functions describe behavior of many discrete systems and are used in model checking, hardware verification, cryptanalysis, computer biology and other domains. Quite often it is necessary to invert these functions, i.e. to find an unknown preimage if an image and algorithm of function computation… ▽ More

    Submitted 17 February, 2011; originally announced February 2011.

    Comments: 16 pages, 8 figures