نتایج جستجو برای: valued lempel
تعداد نتایج: 40819 فیلتر نتایج به سال:
Kolpakov and Kucherov proposed a variant of the Lempel-Ziv factorization, called the reversed Lempel-Ziv (RLZ) factorization (Theoretical Computer Science, 410(51):5365–5373, 2009). In this paper, we present an on-line algorithm that computes the RLZ factorization of a given string w of length n in O(n log n) time using O(n log σ) bits of space, where σ ≤ n is the alphabet size. Also, we introd...
The longest common extension (LCE) problem is to preprocess a given string w of length n so that the length of the longest common prefix between suffixes of w that start at any two given positions is answered quickly. In this paper, we present a data structure of O(zτ + n τ ) words of space which answers LCE queries in O(1) time and can be built in O(n log σ) time, where 1 ≤ τ ≤ √ n is a parame...
This paper is devoted to consider the notions of complementary problem (CP) and set-valued complementary problem (SVCP). The set-valued complementary problem is compared with the classical single-valued complementary problem. Also, the solution set of the set-valued complementary problem is characterized. Our results illustrated by some examples. This paper is devoted to co...
Let p be a prime, and let f(x) be an integer-valued polynomial. By a combinatorial approach, we obtain a nontrivial lower bound of the p-adic order of the sum ∑ k≡r (mod pβ) (n k ) (−1)f (⌊ k − r pα ⌋) , where α > β > 0, n > pα−1 and r ∈ Z. This polynomial extension of Fleck’s congruence has various backgrounds and several consequences such as ∑ k≡r (mod pα) (n k ) a ≡ 0 ( mod p ⌊ n−pα−1 φ(pα) ...
Let p be a prime, and let f (x) be an integer-valued polynomial. By a combinatorial approach, we obtain a nontrivial lower bound of the p-adic order of the sum k≡r (mod p β) n k (−1) k f k − r p α , where α β 0, n p α−1 and r ∈ Z. This polynomial extension of Fleck's congruence has various backgrounds and several consequences such as k≡r (mod p α) n k a k ≡ 0 mod p n−p α−1 ϕ(p α) provided that ...
We give a classification of dual functions, they are m -al functions. We call a function m-al with respect to an operator if the operator lives any function unchanged after m times of using the operator. And 2 ≤ m ≤ k. Functions with different m have very different properties. We give theoretical results for clones of self-dual (m = 2) and selfk -al (m = k) functions in k -valued logic at k ≤ 3...
Computing certain answers is the preferred way of answering queries in scenarios involving incomplete data. This, however, is computationally expensive, so practical systems use efficient techniques based on a particular three-valued logic, although this often leads to
The aim of this paper is to introduce the Lempel–Ziv permutation complexity vs permutation entropy plane as a tool to analyze time series of different nature. This two quantities make use of the Bandt and Pompe representation to quantify continuous-state time series. The strength of this plane is to combine two different perspectives to analyze a signal, one being statistic (the permutation ent...
We use the traveling front approach to derive exact asymptotic results for the statistics of the number of particles in a class of directed diffusion-limited aggregation models on a Cayley tree. We point out that some aspects of these models are closely connected to two different problems in computer science, namely, the digital search tree problem in data structures and the Lempel-Ziv algorith...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید