Search results for " Informatica"

showing 10 items of 978 documents

SIFT Matching by Context Exposed

2023

This paper investigates how to step up local image descriptor matching by exploiting matching context information. Two main contexts are identified, originated respectively from the descriptor space and from the keypoint space. The former is generally used to design the actual matching strategy while the latter to filter matches according to the local spatial consistency. On this basis, a new matching strategy and a novel local spatial filter, named respectively blob matching and Delaunay Triangulation Matching (DTM) are devised. Blob matching provides a general matching framework by merging together several strategies, including rank-based pre-filtering as well as many-to-many and symmetri…

FOS: Computer and information sciencesArtificial neural networkSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniBenchmark testingRANSAClocal image descriptorSettore INF/01 - InformaticaApplied MathematicsComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern RecognitionTransformDetectorDelaunay triangulationMerginglocal spatial filterimage contextComputational Theory and MathematicsArtificial IntelligenceKeypoint matchingSIFTPipelineTrainingComputer Vision and Pattern RecognitionSoftware
researchProduct

Sorting suffixes of a text via its Lyndon Factorization

2013

The process of sorting the suffixes of a text plays a fundamental role in Text Algorithms. They are used for instance in the constructions of the Burrows-Wheeler transform and the suffix array, widely used in several fields of Computer Science. For this reason, several recent researches have been devoted to finding new strategies to obtain effective methods for such a sorting. In this paper we introduce a new methodology in which an important role is played by the Lyndon factorization, so that the local suffixes inside factors detected by this factorization keep their mutual order when extended to the suffixes of the whole word. This property suggests a versatile technique that easily can b…

FOS: Computer and information sciencesBWTLyndon FactorizationSettore INF/01 - InformaticaSorting Suffixes; Lyndon Factorization; Lyndon WordsSuffix arrayComputer Science - Data Structures and AlgorithmsData_FILESData Structures and Algorithms (cs.DS)Lyndon wordSorting suffixeSorting SuffixesLyndon Words
researchProduct

Novel Results on the Number of Runs of the Burrows-Wheeler-Transform

2021

The Burrows-Wheeler-Transform (BWT), a reversible string transformation, is one of the fundamental components of many current data structures in string processing. It is central in data compression, as well as in efficient query algorithms for sequence data, such as webpages, genomic and other biological sequences, or indeed any textual data. The BWT lends itself well to compression because its number of equal-letter-runs (usually referred to as $r$) is often considerably lower than that of the original string; in particular, it is well suited for strings with many repeated factors. In fact, much attention has been paid to the $r$ parameter as measure of repetitiveness, especially to evalua…

FOS: Computer and information sciencesBurrows–Wheeler transformSettore INF/01 - InformaticaCombinatorics on wordsFormal Languages and Automata Theory (cs.FL)Computer scienceString (computer science)Search engine indexingCompressed data structuresComputer Science - Formal Languages and Automata TheoryString indexingData structureMeasure (mathematics)Burrows-Wheeler-TransformRepetitivenessCombinatorics on wordsBurrows-Wheeler-Transform Compressed data structures String indexing Repetitiveness Combinatorics on wordsTransformation (function)Computer Science - Data Structures and AlgorithmsData Structures and Algorithms (cs.DS)AlgorithmData compression
researchProduct

Adaptive learning of compressible strings

2020

Suppose an oracle knows a string $S$ that is unknown to us and that we want to determine. The oracle can answer queries of the form "Is $s$ a substring of $S$?". In 1995, Skiena and Sundaram showed that, in the worst case, any algorithm needs to ask the oracle $\sigma n/4 -O(n)$ queries in order to be able to reconstruct the hidden string, where $\sigma$ is the size of the alphabet of $S$ and $n$ its length, and gave an algorithm that spends $(\sigma-1)n+O(\sigma \sqrt{n})$ queries to reconstruct $S$. The main contribution of our paper is to improve the above upper-bound in the context where the string is compressible. We first present a universal algorithm that, given a (computable) compre…

FOS: Computer and information sciencesCentroid decompositionGeneral Computer ScienceString compressionAdaptive learningKolmogorov complexityContext (language use)Data_CODINGANDINFORMATIONTHEORYString reconstructionTheoretical Computer ScienceCombinatoricsString reconstruction; String learning; Adaptive learning; Kolmogorov complexity; String compression; Lempel-Ziv; Centroid decomposition; Suffix treeSuffix treeIntegerComputer Science - Data Structures and AlgorithmsOrder (group theory)Data Structures and Algorithms (cs.DS)Adaptive learning; Centroid decomposition; Kolmogorov complexity; Lempel-Ziv; String compression; String learning; String reconstruction; Suffix treeTime complexityComputer Science::DatabasesMathematicsLempel-ZivSettore INF/01 - InformaticaLinear spaceString (computer science)SubstringBounded functionString learningTheoretical Computer Science
researchProduct

Probabilistic entailment in the setting of coherence: The role of quasi conjunction and inclusion relation

2013

In this paper, by adopting a coherence-based probabilistic approach to default reasoning, we focus the study on the logical operation of quasi conjunction and the Goodman-Nguyen inclusion relation for conditional events. We recall that quasi conjunction is a basic notion for defining consistency of conditional knowledge bases. By deepening some results given in a previous paper we show that, given any finite family of conditional events F and any nonempty subset S of F, the family F p-entails the quasi conjunction C(S); then, given any conditional event E|H, we analyze the equivalence between p-entailment of E|H from F and p-entailment of E|H from C(S), where S is some nonempty subset of F.…

FOS: Computer and information sciencesClass (set theory)Goodman–Nguyen’s inclusion relationQAND ruleSettore MAT/06 - Probabilita' E Statistica MatematicaComputer Science - Artificial IntelligenceMathematics - Statistics TheoryStatistics Theory (math.ST)Logical consequencegoodman-nguyen's inclusion relationTheoretical Computer ScienceArtificial IntelligenceQuasi conjunctionFOS: MathematicsEquivalence (measure theory)MathematicsEvent (probability theory)Discrete mathematicsSettore INF/01 - InformaticaApplied MathematicsProbability (math.PR)quasi conjunction; goodman-nguyen inclusion relation; qand rule; coherence; probabilistic default reasoning; p-entailment; goodman-nguyen's inclusion relationProbabilistic logicCoherence (statistics)Conjunction (grammar)Greatest elementArtificial Intelligence (cs.AI)Probabilistic default reasoninggoodman-nguyen inclusion relationp-EntailmentCoherenceSoftwareMathematics - Probability
researchProduct

Critical comments on EEG sensor space dynamical connectivity analysis

2019

Many different analysis techniques have been developed and applied to EEG recordings that allow one to investigate how different brain areas interact. One particular class of methods, based on the linear parametric representation of multiple interacting time series, is widely used to study causal connectivity in the brain. However, the results obtained by these methods should be interpreted with great care. The goal of this paper is to show, both theoretically and using simulations, that results obtained by applying causal connectivity measures on the sensor (scalp) time series do not allow interpretation in terms of interacting brain sources. This is because (1) the channel locations canno…

FOS: Computer and information sciencesComputer scienceSocial SciencesTransfer functionStatistics - Applications050105 experimental psychology03 medical and health sciences0302 clinical medicinegranger causalityMVARHumansApplications (stat.AP)Computer Simulation0501 psychology and cognitive sciencesRadiology Nuclear Medicine and imagingBrain connectivityEEGTime domainSpurious relationshipRepresentation (mathematics)Mixing (physics)Parametric statisticsBrain MappingRadiological and Ultrasound TechnologySeries (mathematics)05 social sciencesbrain connectivitysource modellingElectroencephalographyNeurologyFOS: Biological sciencesFrequency domainQuantitative Biology - Neurons and CognitionSettore ING-INF/06 - Bioingegneria Elettronica E InformaticaGranger causalityDirected transfer functionNeurons and Cognition (q-bio.NC)Neurology (clinical)AnatomyAlgorithm030217 neurology & neurosurgery
researchProduct

Properties of a Class of Toeplitz Words

2021

We study the properties of the uncountable set of Stewart words. These are Toeplitz words specified by infinite sequences of Toeplitz patterns of the form $\alpha\beta\gamma$, where $\alpha,\beta,\gamma$ is any permutation of the symbols 0,1,?. We determine the critical exponent of the Stewart words, prove that they avoid the pattern $xxyyxx$, find all factors that are palindromes, and determine their subword complexity. An interesting aspect of our work is that we use automata-theoretic methods and a decision procedure for automata to carry out the proofs.

FOS: Computer and information sciencesDecision procedureSubword complexityDiscrete Mathematics (cs.DM)Combinatorics on wordsSettore INF/01 - InformaticaGeneral Computer ScienceFormal Languages and Automata Theory (cs.FL)Computer Science - Formal Languages and Automata TheoryToeplitz wordTheoretical Computer ScienceComputer Science::Discrete MathematicsPattern avoidanceFOS: MathematicsAutomatic sequenceMathematics - CombinatoricsCombinatorics (math.CO)Computer Science::Formal Languages and Automata TheoryComputer Science - Discrete Mathematics
researchProduct

The sequence of open and closed prefixes of a Sturmian word

2017

A finite word is closed if it contains a factor that occurs both as a prefix and as a suffix but does not have internal occurrences, otherwise it is open. We are interested in the {\it oc-sequence} of a word, which is the binary sequence whose $n$-th element is $0$ if the prefix of length $n$ of the word is open, or $1$ if it is closed. We exhibit results showing that this sequence is deeply related to the combinatorial and periodic structure of a word. In the case of Sturmian words, we show that these are uniquely determined (up to renaming letters) by their oc-sequence. Moreover, we prove that the class of finite Sturmian words is a maximal element with this property in the class of binar…

FOS: Computer and information sciencesDiscrete Mathematics (cs.DM)Formal Languages and Automata Theory (cs.FL)Sturmian word closed wordComputer Science - Formal Languages and Automata Theory0102 computer and information sciences68R1501 natural sciencesPseudorandom binary sequenceCombinatorics[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]FOS: MathematicsMathematics - Combinatorics0101 mathematicsMathematicsSequenceClosed wordSettore INF/01 - InformaticaApplied Mathematics010102 general mathematicsSturmian wordSturmian wordPrefix010201 computation theory & mathematicsCombinatorics (math.CO)SuffixElement (category theory)Word (computer architecture)Maximal elementComputer Science - Discrete Mathematics
researchProduct

Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia

2020

Compared to other types of social networks, criminal networks present hard challenges, due to their strong resilience to disruption, which poses severe hurdles to law-enforcement agencies. Herein, we borrow methods and tools from Social Network Analysis to (i) unveil the structure of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently disrupt them. Mafia networks have peculiar features, due to the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts are also faced with the difficulty in collecting reliable datasets that accurately describe the…

FOS: Computer and information sciencesEconomicsComputer science0211 other engineering and technologiesSocial SciencesCriminology02 engineering and technologycomputer.software_genreSocial NetworkingSociologyStatistics - Machine LearningCentralityCriminals; Humans; Sicily; Social NetworkingSicilySocial network analysisHuman CapitalMultidisciplinarySettore INF/01 - InformaticaQ05 social sciencesRComputer Science - Social and Information NetworksPoliceProfessionsSocial NetworksMedicineCrimeNetwork AnalysisResearch ArticleNetwork analysisComputer and Information SciencesScienceMachine Learning (stat.ML)Computer securityNetwork ResilienceHuman capitalBetweenness centralityHumansResilience (network)0505 lawBlock (data storage)Social and Information Networks (cs.SI)021110 strategic defence & security studiesSocial networkbusiness.industryNode (networking)CriminalsCommunicationsPeople and Places050501 criminologyPopulation GroupingsCentralitybusinesscomputer
researchProduct

Generating a Gray code for prefix normal words in amortized polylogarithmic time per word

2020

A prefix normal word is a binary word with the property that no substring has more $1$s than the prefix of the same length. By proving that the set of prefix normal words is a bubble language, we can exhaustively list all prefix normal words of length $n$ as a combinatorial Gray code, where successive strings differ by at most two swaps or bit flips. This Gray code can be generated in $\Oh(\log^2 n)$ amortized time per word, while the best generation algorithm hitherto has $\Oh(n)$ running time per word. We also present a membership tester for prefix normal words, as well as a novel characterization of bubble languages.

FOS: Computer and information sciencesGeneral Computer ScienceFormal Languages and Automata Theory (cs.FL)Property (programming)combinatorial Gray codeComputer Science - Formal Languages and Automata TheoryData_CODINGANDINFORMATIONTHEORY0102 computer and information sciences02 engineering and technologyCharacterization (mathematics)01 natural sciencesTheoretical Computer ScienceCombinatoricsSet (abstract data type)Gray codeComputer Science - Data Structures and Algorithms0202 electrical engineering electronic engineering information engineeringData Structures and Algorithms (cs.DS)MathematicsAmortized analysisSettore INF/01 - Informaticaprefix normal wordsSubstringcombinatorial generationPrefixjumbled pattern matching010201 computation theory & mathematics020201 artificial intelligence & image processingbinary languagesprefix normal words binary languages combinatorial Gray code combinatorial generation jumbled pattern matchingWord (computer architecture)Theoretical Computer Science
researchProduct