2012
DOI: 10.1016/j.ipl.2012.06.017
|View full text |Cite
|
Sign up to set email alerts
|

An efficient algorithm to test square-freeness of strings compressed by straight-line programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…As we have shown, proving this one way or the other would lead to progress on the path counting problem in DAGs, an old and interesting problem in graph theory. Relatedly, similar approaches may prove fruitful in judging the hardness of other problems on grammar-compressed strings, many solutions to which currently seem to be loose upperbounds [4,1,27,24,25].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As we have shown, proving this one way or the other would lead to progress on the path counting problem in DAGs, an old and interesting problem in graph theory. Relatedly, similar approaches may prove fruitful in judging the hardness of other problems on grammar-compressed strings, many solutions to which currently seem to be loose upperbounds [4,1,27,24,25].…”
Section: Discussionmentioning
confidence: 99%
“…There has also been a significant amount of recent research effort on developing string processing algorithms that operate directly on grammar-compressed data -i.e., without prior decompression. To date this work includes algorithms for computing subword complexity [3,19], online subsequence matching and approximate matching [4,47], faster edit distance computation [17,22], and computation of various kinds of biologically relevant repetitions [1,27,24,25]. We will often use a DAG (directed acyclic graph) representation of the grammar with one source (corresponding to the unique non-terminal that generates the whole string) and σ sinks (corresponding to the terminals).…”
Section: Introductionmentioning
confidence: 99%
“…Our algorithm is based on the divide-and-conquer method used in [3] and also [9], which detects squares crossing the boundary of each variable X i . Roughly speaking, in order to detect such squares we take some substrings of val( X i ) as seeds each of which is in charge of distinct squares, and for each seed we detect squares by using LS and LCE a constant number of times.…”
Section: Finding Runsmentioning
confidence: 99%
“…Roughly speaking, in order to detect such squares we take some substrings of val( X i ) as seeds each of which is in charge of distinct squares, and for each seed we detect squares by using LS and LCE a constant number of times. There is a difference between [3] and [9] in how the seeds are taken, and our approach is similar to [3]. In the next subsection, we briefly describe our basic algorithm which runs in O (n 3 h log N) time.…”
Section: Finding Runsmentioning
confidence: 99%
See 1 more Smart Citation