Advanced topics in algorithms

نویسندگان

  • Michael A. Bender
  • Jeremy T. Fineman
  • Seth Gilbert
  • Juha Kärkkäinen
  • Peter Sanders
  • Toru Kasai
  • Gunho Lee
  • Hiroki Arimura
  • Setsuo Arikawa
چکیده

Lowest common ancestor algorithms are in [12, 19, 2]. Algorithms to construct suffix trees in linear time are in [22, 18, 21, 5]. Suffix arrays were introduced in [17]. The linear time construction algorithm for suffix arrays is from [14]. The simple construction of the LCP array from the suffix array is from [15]. The k-mismatch problem is discussed in [7, 16, 1]. The FM index is from [6]. Some of the stuff appears in the book by Gusfield [10].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

” A Concise and Practical Introduction to Programming Algorithms in Java ” by Frank Nielsen

The book at hand by Frank Nielsen is a textbook mainly targeted to undergraduate students as a very first course in programming. As the title of book says, the programming language used is Java(TM). Following the demands of the targeted audience, the book introduces the topics programming and algorithms without requiring prior knowledge. More advanced topics and concepts such as for example obj...

متن کامل

Advanced Algorithms Lecture Notes

Preface This is a set of lecture notes for the 3rd year course " Advanced Algorithms " which I gave in Tsinghua University for Yao-class students in the Spring and Fall terms in 2011. This set of notes is partially based on the notes scribed by students taking the course the first time it was given. Many thanks to Xiahong Hao and Nathan Hobbs for their hard work in critically revising, editing,...

متن کامل

Security of Sponge structures

Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...

متن کامل

Proof methods and greedy algorithms

This lecture in some ways covers two separate topics: (1) how to prove algorithms correct, in general, using induction; and (2) how to prove greedy algorithms correct. Of course, a thorough understanding of induction is a foundation for the more advanced proof techniques, so the two are related. Note also that even though these techniques are presented more or less as “after the fact” methods o...

متن کامل

A Thorough Comparative Analysis of PI and Sliding Mode Controllers in Permanent Magnet Synchronous Motor Drive Based on Optimization Algorithms

In this paper, the speed tracking for permanent magnet synchronous motor (PMSM) in field oriented control (FOC) method is investigated using linear proportional-integral (PI) controller, sliding mode controller (SMC) and its advanced counterparts. The advanced SMCs considered in this paper are fuzzy SMC (FSMC) and sliding mode controller with time-varying switching gain (SMC+TG) which can effec...

متن کامل

Engagement in Foundational Computer Science Courses Through Supplementary Content for Algorithms

Engaging​ ​students​ ​in​ ​teaching​ ​foundational​ ​Computer​ ​Science​ ​concepts​ ​is​ ​vital​ ​for​ ​the student’s​ ​continual​ ​success​ ​in​ ​more​ ​advanced​ ​topics​ ​in​ ​the​ ​field.​ ​An​ ​idea​ ​of​ ​a​ ​series​ ​of Jupyter​ ​notebooks​ ​was​ ​conceived​ ​as​ ​a​ ​way​ ​of​ ​using​ ​Bloom’s​ ​Taxonomy​ ​to​ ​reinforce concepts​ ​taught​ ​in​ ​an​ ​introductory​ ​algorithms​ ​class.​ ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013