Search results for "General Computer Science"

showing 10 items of 895 documents

Burrows-Wheeler transform and palindromic richness

2009

AbstractThe investigation of the extremal case of the Burrows–Wheeler transform leads to study the words w over an ordered alphabet A={a1,a2,…,ak}, with a1<a2<⋯<ak, such that bwt(w) is of the form aknkak−1nk−1⋯a2n2a1n1, for some non-negative integers n1,n2,…,nk. A characterization of these words in the case |A|=2 has been given in [Sabrina Mantaci, Antonio Restivo, Marinella Sciortino, Burrows-Wheeler transform and Sturmian words, Information Processing Letters 86 (2003) 241–246], where it is proved that they correspond to the powers of conjugates of standard words. The case |A|=3 has been settled in [Jamie Simpson, Simon J. Puglisi, Words with simple Burrows-Wheeler transforms, Electronic …

Combinatorics on wordsGeneral Computer ScienceBurrows–Wheeler transformSettore INF/01 - InformaticaRich wordsPalindromeBurrows-Wheeler transformTheoretical Computer ScienceCombinatoricsRich wordBurrows-Wheeler transform; Palindromes; Rich words; Combinatorics on wordsPalindromePalindromesSpecies richnessAlphabetArithmeticBurrows–Wheeler transformComputer Science(all)MathematicsCombinatorics on word
researchProduct

A reconstruction algorithm for L-convex polyominoes

2006

AbstractWe give an algorithm that uniquely reconstruct an L-convex polyomino from the size of some special paths, called bordered L-paths.

CombinatoricsConvexityMathematics::CombinatoricsGeneral Computer SciencePolyominoPolyominoesRegular polygonReconstruction algorithmReconstructionComputer Science(all)Theoretical Computer ScienceMathematicsTheoretical Computer Science
researchProduct

Irredundant tandem motifs

2014

Eliminating the possible redundancy from a set of candidate motifs occurring in an input string is fundamental in many applications. The existing techniques proposed to extract irredundant motifs are not suitable when the motifs to search for are structured, i.e., they are made of two (or several) subwords that co-occur in a text string s of length n. The main effort of this work is studying and characterizing a compact class of tandem motifs, that is, pairs of substrings {m1, m2} occurring in tandem within a maximum distance of d symbols in s, where d is an integer constant given in input. To this aim, we first introduce the concept of maximality, related to four specific conditions that h…

CombinatoricsDiscrete mathematicsMotifs Tandem Patterns Irredundant motifs String algorithm Suffix treeGeneral Computer ScienceTandemlawSuffix treeText stringSubstringTheoretical Computer ScienceLinear numberMathematicslaw.inventionTheoretical Computer Science
researchProduct

Words and forbidden factors

2002

AbstractGiven a finite or infinite word v, we consider the set M(v) of minimal forbidden factors of v. We show that the set M(v) is of fundamental importance in determining the structure of the word v. In the case of a finite word w we consider two parameters that are related to the size of M(w): the first counts the minimal forbidden factors of w and the second gives the length of the longest minimal forbidden factor of w. We derive sharp upper and lower bounds for both parameters. We prove also that the second parameter is related to the minimal period of the word w. We are further interested to the algorithmic point of view. Indeed, we design linear time algorithm for the following two p…

CombinatoricsGeneral Computer ScienceGeneral problemFree monoidFormal languageSturmian wordWord problem (mathematics)AutomorphismTime complexityUpper and lower boundsMathematicsTheoretical Computer ScienceComputer Science(all)Theoretical Computer Science
researchProduct

On finding common neighborhoods in massive graphs

2003

AbstractWe consider the problem of finding pairs of vertices that share large common neighborhoods in massive graphs. We prove lower bounds on the resources needed to solve this problem on resource-bounded models of computation. In streaming models, in which algorithms can access the input only a constant number of times and only sequentially, we show that, even with randomization, any algorithm that determines if there exists any pair of vertices with a large common neighborhood must essentially store and process the input graph off line. In sampling models, in which algorithms can only query an oracle for the common neighborhoods of specified vertex pairs, we show that any algorithm must …

CombinatoricsGeneral Computer ScienceModel of computationExistential quantificationGraphOracleOff lineComputer Science(all)Theoretical Computer ScienceVertex (geometry)MathematicsTheoretical Computer Science
researchProduct

On Fine and Wilf's theorem for bidimensional words

2003

AbstractGeneralizations of Fine and Wilf's Periodicity Theorem are obtained for the case of bidimensional words using geometric arguments. The domains considered constitute a large class of convex subsets of R2 which include most parallelograms. A complete discussion is provided for the parallelogram case.

CombinatoricsLarge classDiscrete mathematicsGeneral Computer ScienceGeneralizationRegular polygonParallelogramWord (group theory)MathematicsTheoretical Computer ScienceComputer Science(all)Theoretical Computer Science
researchProduct

A generalization of Sardinas and Patterson's algorithm to z-codes

1993

Abstract This paper concerns the framework of z-codes theory. The main contribution consists in an extension of the algorithm of Sardinas and Patterson for deciding whether a finite set of words X is a z-code. To improve the efficiency of this test we have found a tight upper bound on the length of the shortest words that might have a double z-factorization over X. Some remarks on the complexity of the algorithm are also given. Moreover, a slight modification of this algorithm allows us to compute the z-deciphering delay of X.

CombinatoricsSardinas–Patterson algorithmGeneral Computer ScienceGeneralizationCode (cryptography)Extension (predicate logic)Finite setUpper and lower boundsAlgorithmComputer Science(all)Theoretical Computer ScienceMathematicsAutomatonTheoretical Computer Science
researchProduct

Closedness properties in ex-identification

2001

In this paper we investigate in which cases unions of identifiable classes are also necessarily identifiable. We consider identification in the limit with bounds on mindchanges and anomalies. Though not closed under the set union, these identification types still have features resembling closedness. For each of them we and n such that (1) if every union of n − 1 classes out of U1, ... , Un is identifiable, so is the union of all n classes; (2) there are classes U1, ... ,Un−1 such that every union of n−2 classes out of them is identifiable, while the union of n − 1 classes is not. We show that by finding these n we can distinguish which requirements put on the identifiability of unions of cl…

CombinatoricsSet (abstract data type)Identification (information)General Computer ScienceIdentifiabilityLimit (mathematics)Computer Science(all)Theoretical Computer ScienceMathematicsTheoretical Computer Science
researchProduct

BARGAINING WITH COMMITMENT UNDER AN UNCERTAIN DEADLINE

2006

We consider an infinite horizon bargaining game in which a deadline can arise with positive probability and where players possess an endogenous commitment device. We show that for any truncation of the game, the equilibrium agreement can only take place if the deadline arises within this finite horizon. Since the deadline is an uncertain event, the equilibrium exhibits agreements which are delayed with positive probability.

Commitment deviceComputer Science::Computer Science and Game TheoryGeneral Computer ScienceTruncationFinite horizonC78 [Bargaining endogenous commitment delays uncertain deadline JEL Classification]jel:M2MicroeconomicsEconomicsjel:C0Infinite horizonStatistics Probability and UncertaintyBusiness and International Managementjel:D5jel:B4Mathematical economicsComputer Science::Operating Systemsjel:C6jel:D7Positive probabilityComputer Science::Databasesjel:C7Event (probability theory)International Game Theory Review
researchProduct

On the inductive inference of recursive real-valued functions

1999

AbstractWe combine traditional studies of inductive inference and classical continuous mathematics to produce a study of learning real-valued functions. We consider two possible ways to model the learning by example of functions with domain and range the real numbers. The first approach considers functions as represented by computable analytic functions. The second considers arbitrary computable functions of recursive real numbers. In each case we find natural examples of learnable classes of functions and unlearnable classes of functions.

Complex-valued functionGeneral Computer ScienceReal analysisLearning theoryComputable numberInductive inference0102 computer and information sciences02 engineering and technology01 natural sciencesμ-recursive functionComputable analysisTheoretical Computer ScienceAlgebraμ operatorComputable functionReal-valued computationReal-valued function010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAlgorithmComputer Science(all)MathematicsTheoretical Computer Science
researchProduct