2002
DOI: 10.1007/s00453-001-0088-5
|View full text |Cite
|
Sign up to set email alerts
|

A Functional Approach to External Graph Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
122
0
1

Year Published

2005
2005
2012
2012

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 102 publications
(125 citation statements)
references
References 24 publications
2
122
0
1
Order By: Relevance
“…For instance, the sequence a = (1,4,4,3,5,7,8,8,6,4,1) has the typical sequence τ (a) = (1, 8, 1). To obtain τ (a), first remove the second 4 and the second 8 (duplicate removal); then delete entries 4, 3, 5, 7 between the first 1 and the 8 and entries 6, 4 between the 8 and the last 1 (typical operations).…”
Section: Typical Sequences and Typical Listsmentioning
confidence: 99%
See 4 more Smart Citations
“…For instance, the sequence a = (1,4,4,3,5,7,8,8,6,4,1) has the typical sequence τ (a) = (1, 8, 1). To obtain τ (a), first remove the second 4 and the second 8 (duplicate removal); then delete entries 4, 3, 5, 7 between the first 1 and the 8 and entries 6, 4 between the 8 and the last 1 (typical operations).…”
Section: Typical Sequences and Typical Listsmentioning
confidence: 99%
“…The best known deterministic algorithm for computing a maximal matching I/O-efficiently [1] takes O(sort(|E|) log 2 (|V |/B)) I/Os. No deterministic algorithm for finding a maximal independent set I/O-efficiently is known.…”
Section: Previous Workmentioning
confidence: 99%
See 3 more Smart Citations