In the pattern matching with d wildcards problem one is given a text T of length n and a pattern P of length m that contains d wildcard characters, each denoted by a special symbol '?'. A wildcard character ma...
详细信息
In the pattern matching with d wildcards problem one is given a text T of length n and a pattern P of length m that contains d wildcard characters, each denoted by a special symbol '?'. A wildcard character matches any other character. The goal is to establish for each m-length substring of T whether it matches P. In the streaming model variant of the pattern matching with d wildcards problem the text T arrives one character at a time and the goal is to report, before the next character arrives, if the last m characters match P while using only o(m) words of space. In this paper we introduce two new algorithms for the d wildcard pattern matching problem in the streaming model. The first is a randomized Monte Carlo algorithm that is parameterized by a constant 0 <= delta <= 1. This algorithm uses (O) over tilde (d(1-delta)) amortized time per character and (O) over tilde (d(1+delta)) words of space. The second algorithm, which is used as a black box in the first algorithm, is a randomized Monte Carlo algorithm which uses O(d + log m) worst-case time per character and O(d + log m) words of space.
We characterize those strings whose suffix arrays are based on arithmetic progressions, in particular, arithmetically progressed permutations where all pairs of successive entries of the permutation have the same diff...
详细信息
We characterize those strings whose suffix arrays are based on arithmetic progressions, in particular, arithmetically progressed permutations where all pairs of successive entries of the permutation have the same difference modulo the respective string length. We show that an arithmetically progressed permutation P coincides with the suffix array of a unary, binary, or ternary string. We further analyze the conditions of a given P under which we can find a uniquely defined string over either a binary or ternary alphabet having P as its suffix array. For the binary case, we show its connection to lower Christoffel words, balanced words, and Fibonacci words. In addition to solving the arithmetically progressed suffix array problem, we give the shape of the Burrows- Wheeler transform of those strings solving this problem. These results give rise to numerous future research directions. (c) 2024 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY license (http://***/licenses/by/4.0/).
In this article we describe the triangulated structure of the bounded derived category of a gentle algebra by describing the triangles induced by the morphisms between indecomposable objects in a basis of their Horn-s...
详细信息
In this article we describe the triangulated structure of the bounded derived category of a gentle algebra by describing the triangles induced by the morphisms between indecomposable objects in a basis of their Horn-space. (C) 2019 The Authors. Published by Elsevier Inc.
In this article we provide a simple combinatorial description of morphisms between indecomposable complexes in the bounded derived category of a gentle algebra. (C) 2016 The Authors. Published by Elsevier Inc. This is...
详细信息
In this article we provide a simple combinatorial description of morphisms between indecomposable complexes in the bounded derived category of a gentle algebra. (C) 2016 The Authors. Published by Elsevier Inc. This is an open access article under the CC BY license.
We give a complete description of a basis of the extension spaces between indecomposable string and quasi-simple band modules in the module category of a gentle algebra.
We give a complete description of a basis of the extension spaces between indecomposable string and quasi-simple band modules in the module category of a gentle algebra.
We provide a combinatorial algorithm for constructing the stable Auslander-Reiten component containing a given indecomposable module of a symmetric special biserial algebra using only information from its underlying B...
详细信息
We provide a combinatorial algorithm for constructing the stable Auslander-Reiten component containing a given indecomposable module of a symmetric special biserial algebra using only information from its underlying Brauer graph. We also show that the structure of the Auslander-Reiten quiver is closely related to the distinct Green walks of the Brauer graph and detail the relationship between the precise shape of the stable Auslander-Reiten components for domestic Brauer graph algebras and their underlying graph. Furthermore, we show that the specific component containing a given simple or indecomposable projective module for any Brauer graph algebra is determined by the edge in the Brauer graph associated to the module. Crown Copyright (C) 2018 Published by Elsevier Inc. All rights reserved.
In this paper we introduce abstract string modules and give an explicit bijection between the submodule lattice of an abstract string module and the perfect matching lattice of the corresponding abstract snake graph. ...
详细信息
In this paper we introduce abstract string modules and give an explicit bijection between the submodule lattice of an abstract string module and the perfect matching lattice of the corresponding abstract snake graph. In particular, we make explicit the direct correspondence between a submodule of a string module and the perfect matching of the corresponding snake graph. For every string module we define a Coxeter element in a symmetric group. We then establish a bijection between the submodule lattice of the string module and the lattice given by the interval in the weak Bruhat order determined by the Coxeter element. Using the correspondence between string modules and snake graphs, we give a new concise formulation of snake graph calculus. (c) 2020 Published by Elsevier Inc.
Mankind has never been connected as it is now and as it will be tomorrow. Nowadays thanks to the rise of social networks such as Tweeter and Facebook, we can follow in real time the thought of millions of people. In f...
详细信息
ISBN:
(纸本)9781450342667
Mankind has never been connected as it is now and as it will be tomorrow. Nowadays thanks to the rise of social networks such as Tweeter and Facebook, we can follow in real time the thought of millions of people. In fact we can almost feel the thoughts of a whole humanity and maybe project ourselves in a position where we could predict the major trends in the collective behavior of this humanity. However such an ambitious aim would require considerable resources in processing and networking which may be far from affordable. Indeed trends and topics are carried in a multiple of small texts written in various language and vocabularies like an hologram carries information in a dispersed way. Their capture and classification pose serious problems of data mining and analytics. Processes based on pure semantic analysis would require too much processing power and memory. We will present alternative methods based on string complexity also inspired on geolocalization in wireless networks which saves processing power by several order of magnitude. The ultimate goal is to detect when people are thinking about the very same topics before they become aware. Beyond the problem of topic detection and classification one must also estimate the potential of an isolated topic to become a lasting trend. In other word one must probe the topic foundations, for example by challenging how trustworthy are its sources. Designing an efficient source finder algorithm is indissociable with building realistic models about topic propagation. If we suppose that topics propagate inside communities via the followers-followees links, the propagation is highly amplified by the unbalances in the graph topology. It is established that dominating and semi dominating nodes such as the CNN Tweeter site are the main accelerator of topic propagation. The difficulty is to find the actual source of a topic beyond those screening nodes and the search is prone to false positive and true negative effects. In fact
In this note we correct two oversights in Çanakçi et al. (2019) [6] which only occur when a band complex is involved. As a consequence we see that the mapping cone of a morphism between two band complexes ca...
详细信息
In this note we correct two oversights in Çanakçi et al. (2019) [6] which only occur when a band complex is involved. As a consequence we see that the mapping cone of a morphism between two band complexes can decompose into arbitrarily many indecomposable direct summands.
暂无评论