Reverse Engineering Prefix Tables
نویسندگان
چکیده
The Prefix table of a string reports for each position the maximal length of its prefixes starting here. The Prefix table and its dual Suffix table are basic tools used in the design of the most efficient string-matching and pattern extraction algorithms. These tables can be computed in linear time independently of the alphabet size. We give an algorithmic characterisation of a Prefix table (it can be adapted to a Suffix table). Namely, the algorithm tests if an integer table of size n is the Prefix table of some word and, if successful, it constructs the lexicographically smallest string having it as a Prefix table. We show that the alphabet of the string can be bounded to log 2 n letters. The overall algorithm runs in O(n) time.
منابع مشابه
A New Reverse Engineering Approach to Convert Form Fill Format Document into Uml Class Diagram
This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and pract...
متن کاملHoward: A Dynamic Excavator for Reverse Engineering Data Structures
Even the most advanced reverse engineering techniques and products are weak in recovering data structures in stripped binaries—binaries without symbol tables. Unfortunately, forensics and reverse engineering without data structures is exceedingly hard. We present a new solution, known as Howard, to extract data structures from C binaries without any need for symbol tables. Our results are signi...
متن کاملScheduling of Updates in an IP Forwarding Engine with Partitioned Prefix Tables
Many IP forwarding engines have used TCAM(Ternary Content Addressable Memory) for IP address lookup. While TCAM has the advantage of parallel lookup in a single step, it has a difficulty in updating a prefix table. TCAM requires the prefix table to be ordered for the longest prefix matching, so each update may incur several memory movements to maintain the ordering. For the fast updating of the...
متن کاملOn the Number of Prefix and Border Tables
For some text algorithms, the real measure for the complexity analysis is not the string itself but its structure stored in its prefix table (or border table, as border and prefix tables can be proved to be equivalent). We give a new upper bound on the number of prefix tables for strings of length n (on any alphabet) which is of order (1 + φ) (with φ = 1+ √ 5 2 the golden mean) and present also...
متن کاملPrefix Hash Tree An Indexing Data Structure over Distributed Hash Tables
Distributed Hash Tables are scalable, robust, and self-organizing peer-to-peer systems that support exact match lookups. This paper describes the design and implementation of a Prefix Hash Tree a distributed data structure that enables more sophisticated queries over a DHT. The Prefix Hash Tree uses the lookup interface of a DHT to construct a trie-based structure that is both efficient (update...
متن کامل