Search results for "D algorithm"

showing 10 items of 327 documents

Word assembly through minimal forbidden words

2006

AbstractWe give a linear-time algorithm to reconstruct a finite word w over a finite alphabet A of constant size starting from a finite set of factors of w verifying a suitable hypothesis. We use combinatorics techniques based on the minimal forbidden words, which have been introduced in previous papers. This improves a previous algorithm which worked under the assumption of stronger hypothesis.

General Computer ScienceFragment assemblyFactor automaton[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS][INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciences02 engineering and technology01 natural sciencesMinimal forbidden wordTheoretical Computer ScienceCombinatorics0202 electrical engineering electronic engineering information engineeringFinite setComputingMilieux_MISCELLANEOUSCombinatorics on wordMathematicsShortest superstringCombinatorics on wordsRepetition index16. Peace & justice010201 computation theory & mathematics020201 artificial intelligence & image processingAlphabetConstant (mathematics)Word (computer architecture)Computer Science::Formal Languages and Automata TheoryComputer Science(all)
researchProduct

From Nerode's congruence to Suffix Automata with mismatches

2009

AbstractIn this paper we focus on the minimal deterministic finite automaton Sk that recognizes the set of suffixes of a word w up to k errors. As first result we give a characterization of the Nerode’s right-invariant congruence that is associated with Sk. This result generalizes the classical characterization described in [A. Blumer, J. Blumer, D. Haussler, A. Ehrenfeucht, M. Chen, J. Seiferas, The smallest automaton recognizing the subwords of a text, Theoretical Computer Science, 40, 1985, 31–55]. As second result we present an algorithm that makes use of Sk to accept in an efficient way the language of all suffixes of w up to k errors in every window of size r of a text, where r is the…

General Computer ScienceOpen problem[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciences02 engineering and technologyString searching algorithm01 natural sciencesTheoretical Computer ScienceCombinatoricsDeterministic automatonSuffix automata0202 electrical engineering electronic engineering information engineeringCombinatorics on words Indexing Suffix Automata Languages with mismatches Approximate string matchingMathematicsDiscrete mathematicsCombinatorics on wordsApproximate string matchingSettore INF/01 - InformaticaLanguages with mismatchesComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)PrefixCombinatorics on wordsDeterministic finite automaton010201 computation theory & mathematicsSuffix automatonIndexing020201 artificial intelligence & image processingSuffixComputer Science::Formal Languages and Automata TheoryComputer Science(all)
researchProduct

Minimal forbidden patterns of multi-dimensional shifts

2005

We study whether the entropy (or growth rate) of minimal forbidden patterns of symbolic dynamical shifts of dimension 2 or more, is a conjugacy invariant. We prove that the entropy of minimal forbidden patterns is a conjugacy invariant for uniformly semi-strongly irreducible shifts. We prove a weaker invariant in the general case.

General Mathematics[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS][INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS]020206 networking & telecommunications0102 computer and information sciences02 engineering and technology01 natural sciencesCombinatoricsConjugacy class010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringMulti dimensionalComputingMilieux_MISCELLANEOUSMathematics
researchProduct

Exact simulation of first exit times for one-dimensional diffusion processes

2019

International audience; The simulation of exit times for diffusion processes is a challenging task since it concerns many applications in different fields like mathematical finance, neuroscience, reliability horizontal ellipsis The usual procedure is to use discretization schemes which unfortunately introduce some error in the target distribution. Our aim is to present a new algorithm which simulates exactly the exit time for one-dimensional diffusions. This acceptance-rejection algorithm requires to simulate exactly the exit time of the Brownian motion on one side and the Brownian position at a given time, constrained not to have exit before, on the other side. Crucial tools in this study …

Girsanov theoremand phrases: Exit timeDiscretizationsecondary: 65N75Exit time Brownian motion diffusion processes Girsanov’s transformation rejection sampling exact simulation randomized algorithm conditioned Brownian motion.MSC 65C05 65N75 60G40Exit time01 natural sciencesGirsanov’s transformationrandomized algorithm010104 statistics & probabilityrejection samplingGirsanov's transformationexact simulationFOS: MathematicsApplied mathematicsMathematics - Numerical Analysis0101 mathematicsConvergent seriesBrownian motion60G40MathematicsNumerical AnalysisApplied MathematicsMathematical financeRejection samplingProbability (math.PR)diffusion processesNumerical Analysis (math.NA)conditioned Brownian motionRandomized algorithm010101 applied mathematics[MATH.MATH-PR]Mathematics [math]/Probability [math.PR]Computational MathematicsModeling and Simulationconditioned Brownian motion 2010 AMS subject classifications: primary 65C05Brownian motionRandom variableMathematics - ProbabilityAnalysis[MATH.MATH-NA]Mathematics [math]/Numerical Analysis [math.NA]
researchProduct

Frequency Prediction of Functions

2012

Prediction of functions is one of processes considered in inductive inference. There is a "black box" with a given total function f in it. The result of the inductive inference machine F( ) is expected to be f(n+1). Deterministic and probabilistic prediction of functions has been widely studied. Frequency computation is a mechanism used to combine features of deterministic and probabilistic algorithms. Frequency computation has been used for several types of inductive inference, especially, for learning via queries. We study frequency prediction of functions and show that that there exists an interesting hierarchy of predictable classes of functions.

Hierarchy (mathematics)ComputationExistential quantificationBlack boxProbabilistic logicProbabilistic analysis of algorithmsInductive reasoningAlgorithmMathematicsRandomized algorithm
researchProduct

A walk on sunset boulevard

2016

A walk on sunset boulevard can teach us about transcendental functions associated to Feynman diagrams. On this guided tour we will see multiple polylogarithms, differential equations and elliptic curves. A highlight of the tour will be the generalisation of the polylogarithms to the elliptic setting and the all-order solution for the sunset integral in the equal mass case.

High Energy Physics - TheoryTranscendental functionDifferential equationMathematicsofComputing_NUMERICALANALYSISFOS: Physical sciencesFeynman graphMathematical Physics (math-ph)SunsetLoop integralAlgebraHigh Energy Physics - Phenomenologysymbols.namesakeElliptic curveHigh Energy Physics - Phenomenology (hep-ph)High Energy Physics - Theory (hep-th)ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONsymbolsFeynman diagramBoulevardComputer Science::Data Structures and AlgorithmsMathematical PhysicsMathematicsMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Standard Vs Uniform Binary Search and Their Variants in Learned Static Indexing: The Case of the Searching on Sorted Data Benchmarking Software Platf…

2023

Learned Indexes are a novel approach to search in a sorted table. A model is used to predict an interval in which to search into and a Binary Search routine is used to finalize the search. They are quite effective. For the final stage, usually, the lower_bound routine of the Standard C++ library is used, although this is more of a natural choice rather than a requirement. However, recent studies, that do not use Machine Learning predictions, indicate that other implementations of Binary Search or variants, namely k-ary Search, are better suited to take advantage of the features offered by modern computer architectures. With the use of the Searching on Sorted Sets SOSD Learned Indexing bench…

I.2FOS: Computer and information sciencesComputer Science - Machine Learninglearned index structuresH.2Databases (cs.DB)search on sorted data platformComputer Science - Information RetrievalMachine Learning (cs.LG)E.1; I.2; H.2Computer Science - Databasesbinary search variantsComputer Science - Data Structures and AlgorithmsData Structures and Algorithms (cs.DS)E.1algorithms with predictionSoftwareInformation Retrieval (cs.IR)
researchProduct

Capacity and Energy-Consumption Optimization for the Cluster-Tree Topology in IEEE 802.15.4

2011

International audience; 802.15.4 proposes to use a cluster-tree hierar- chy to organize the transmissions in Wireless Sensor Networks. In this letter, we propose a framework to analyze formally the capacity and the energy consumption of this structure. We derive a Mixed Integer Linear Programming (MILP) formulation to obtain a topology compliant with the standard. This formulation provides the optimal solution for the network capacity: this con- stitutes an upper bound for any distributed algorithms permitting to construct a cluster-tree. This framework can also be used to evaluate the capacity and to compare quantitatively different cluster-tree algorithms.

IEEE 802.15.4Mathematical optimizationLinear programming[INFO.INFO-RO] Computer Science [cs]/Operations Research [cs.RO]Computer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Topology (electrical circuits)02 engineering and technologyTopologyNetwork topologyChannel capacity[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringInteger programmingIEEE 802.15[ INFO.INFO-RO ] Computer Science [cs]/Operations Research [cs.RO]MILP[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]capacity020206 networking & telecommunicationsEnergy consumption[INFO.INFO-RO]Computer Science [cs]/Operations Research [cs.RO]020202 computer hardware & architectureComputer Science ApplicationsDistributed algorithmModeling and Simulationcluster-treeWireless sensor network
researchProduct

"Table 2" of "Measurement of the Cross Section for Electromagnetic Dissociation with Neutron Emission in Pb-Pb Collisions at {\surd}sNN = 2.76 TeV"

2013

Mutual EMD -> at least one neutron is emitted by both Pb nuclei.

Inclusive2760.0Astrophysics::High Energy Astrophysical PhenomenaNuclear TheoryPB PB --> N N XIntegrated Cross SectionCross SectionComputer Science::Data Structures and AlgorithmsNuclear ExperimentSIGComputer Science::Numerical Analysis
researchProduct

"Table 19" of "Measurement of the differential cross-sections of inclusive, prompt and non-prompt J/psi production in proton-proton collisions at sqr…

2013

Unweighted J/psi candidate yields in bins of $J/psi transverse momentum and rapidity. Uncertainties are statistical only.

InclusiveP P --> J/PSI XProton-Proton ScatteringPrompt7000.0High Energy Physics::ExperimentAstrophysics::Cosmology and Extragalactic AstrophysicsPhysics::Data Analysis; Statistics and ProbabilityNNuclear ExperimentComputer Science::Data Structures and AlgorithmsMuon production
researchProduct