Sequential pattern mining--approaches and algorithms
CH Mooney, JF Roddick - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Sequences of events, items, or tokens occurring in an ordered metric space appear often in
data and the requirement to detect and analyze frequent subsequences is a common …
data and the requirement to detect and analyze frequent subsequences is a common …
[图书][B] Algorithms on strings
M Crochemore, C Hancart, T Lecroq - 2007 - books.google.com
The book is intended for lectures on string processes and pattern matching in Master's
courses of computer science and software engineering curricula. The details of algorithms …
courses of computer science and software engineering curricula. The details of algorithms …
The string edit distance matching problem with moves
G Cormode, S Muthukrishnan - ACM Transactions on Algorithms (TALG), 2007 - dl.acm.org
The edit distance between two strings S and R is defined to be the minimum number of
character inserts, deletes, and changes needed to convert R to S. Given a text string t of …
character inserts, deletes, and changes needed to convert R to S. Given a text string t of …
Dictionary matching and indexing with errors and don't cares
This paper considers various flavors of the following online problem: preprocess a text or
collection of strings, so that given a query string p, all matches of p with the text can be …
collection of strings, so that given a query string p, all matches of p with the text can be …
More applications of the polynomial method to algorithm design
In low-depth circuit complexity, the polynomial method is a way to prove lower bounds by
translating weak circuits into low-degree polynomials, then analyzing properties of these …
translating weak circuits into low-degree polynomials, then analyzing properties of these …
The design of a similarity based deduplication system
L Aronovich, R Asher, E Bachmat, H Bitner… - … of SYSTOR 2009: The …, 2009 - dl.acm.org
We describe some of the design choices that were made during the development of a fast,
scalable, inline, deduplication device. The system's design goals and how they were …
scalable, inline, deduplication device. The system's design goals and how they were …
Random access to grammar-compressed strings and trees
Grammar-based compression, where one replaces a long string by a small context-free
grammar that generates the string, is a simple and powerful paradigm that captures …
grammar that generates the string, is a simple and powerful paradigm that captures …
Faster approximate pattern matching: A unified approach
P Charalampopoulos, T Kociumaka… - 2020 IEEE 61st …, 2020 - ieeexplore.ieee.org
In the approximate pattern matching problem, given a text T, a pattern P, and a threshold k,
the task is to find (the starting positions of) all substrings of T that are at distance at most k …
the task is to find (the starting positions of) all substrings of T that are at distance at most k …
Faster algorithms for text-to-pattern Hamming distances
We study the classic Text-to-Pattern Hamming Distances problem: given a pattern P of
length m and a text T of length n, both over a polynomial-size alphabet, compute the …
length m and a text T of length n, both over a polynomial-size alphabet, compute the …
Computationally secure pattern matching in the presence of malicious adversaries
C Hazay, T Toft - Advances in Cryptology-ASIACRYPT 2010: 16th …, 2010 - Springer
We propose a dedicated protocol for the highly motivated problem of secure two-party
pattern matching: Alice holds a text t∈{0, 1}*. of length n, while Bob has a pattern p∈{0, 1} …
pattern matching: Alice holds a text t∈{0, 1}*. of length n, while Bob has a pattern p∈{0, 1} …