2011
DOI: 10.1007/978-3-642-21458-5_37
|View full text |Cite
|
Sign up to set email alerts
|

Edit Distance with Duplications and Contractions Revisited

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…The examples given here come from the fields of RNA secondary structure prediction and CFG Parsing. Recently, we have shown that this technique also applies for the Edit Distance with Duplication and Contraction problem [45], suggesting that it is possible that more problems from other domains can be similarly accelerated. While previous works describe other practical acceleration techniques for some of the mentioned problems [14,25,28,32-38], Valiant's technique, along with the Four Russians technique [28,30,31], are the only two techniques which currently allow to reduce the theoretical asymptotic worst case running times of the standard algorithms, without compromising the correctness of the computations.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The examples given here come from the fields of RNA secondary structure prediction and CFG Parsing. Recently, we have shown that this technique also applies for the Edit Distance with Duplication and Contraction problem [45], suggesting that it is possible that more problems from other domains can be similarly accelerated. While previous works describe other practical acceleration techniques for some of the mentioned problems [14,25,28,32-38], Valiant's technique, along with the Four Russians technique [28,30,31], are the only two techniques which currently allow to reduce the theoretical asymptotic worst case running times of the standard algorithms, without compromising the correctness of the computations.…”
Section: Discussionmentioning
confidence: 99%
“…While in [30] this technique was used ad hoc for accelerating RNA folding, it is possible to decouple the description of the fast matrix multiplication technique from the RNA folding algorithm, and present the algorithm of [30] in the same framework presented here. The latter special matrix multiplication variant was further accelerated in [45] to O()n3qopnamelog2n running time, implying that RNA folding under discrete scoring schemes (e.g. [6]) can be computed in O)(n3qopnamelog2n time, instead of in O()n3qopnamelog3qopname lognqopnamelog2n time as implied by the fastest Min/Max-Plus Multiplication algorithm for general matrices [27].…”
Section: Discussionmentioning
confidence: 99%
“…The examples given here come from the fields of RNA secondary structure prediction and CFG Parsing. Recently, we have shown that this technique also applies for the Edit Distance with Duplication and Contraction problem [45], suggesting that it is possible that more problems from other domains can be similarly accelerated. While previous works describe other practical acceleration techniques for some of the mentioned problems [14,25,28,[32][33][34][35][36][37][38], Valiant's technique, along with the Four Russians technique [28,30,31], are the only two techniques which currently allow to reduce the theoretical asymptotic worst case running times of the standard algorithms, without compromising the correctness of the computations.…”
Section: Discussionmentioning
confidence: 99%
“…While in [30] this technique was used ad hoc for accelerating RNA folding, it is possible to decouple the description of the fast matrix multiplication technique from the RNA folding algorithm, and present the algorithm of [30] in the same framework presented here. The latter special matrix multiplication variant was further accelerated in [45] [27]. Many of the current acceleration techniques for RNA and CFG related algorithms are based on sparsification, and are applicable only to optimization problems.…”
Section: Discussionmentioning
confidence: 99%
“…There are some researches on real-time de-duplication recently [7]. Proposed the CBLOCK which learns hash functions automatically from attribute domains and a labeled dataset consisting of duplicates; [8] proposed an objectbased de-duplication framework and an efficient object index mechanism to speed up the searching facility to identify duplicate objects; [9] proposed a buffer cache de-duplication technique for query dispatch in the field of replicated databases which has a well-known problem that different buffer caches share some identical data; [10] propose three algorithms for the problem of string edit distance with duplication and contraction operations, which improve the time complexity of previous algorithms for this problem. To our best knowledge, few works focus on the scheduling strategy of de-duplication.…”
Section: Related Workmentioning
confidence: 99%