2012
DOI: 10.1007/978-3-642-32241-9_33
|View full text |Cite
|
Sign up to set email alerts
|

Multi-pattern Matching with Bidirectional Indexes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…Each implementation uses one specific type of data structure to represent FOS and BAS (but the same for both). We compared the following methodologies: AFA (which we implemented following Strothmann's description [24], since we did not find an available implementation); BIDWT (a wrap implementation using the sdsl library [11], which includes the bidirectional backward and forward search presented in [22]); ACAT; ACATS (using as sample parameter z = 1); ACATN (based on the work of Gog et al [10]); RACATN (our reduced version of ACATN); and SCAT.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Each implementation uses one specific type of data structure to represent FOS and BAS (but the same for both). We compared the following methodologies: AFA (which we implemented following Strothmann's description [24], since we did not find an available implementation); BIDWT (a wrap implementation using the sdsl library [11], which includes the bidirectional backward and forward search presented in [22]); ACAT; ACATS (using as sample parameter z = 1); ACATN (based on the work of Gog et al [10]); RACATN (our reduced version of ACATN); and SCAT.…”
Section: Resultsmentioning
confidence: 99%
“…Albrecht and Heun [3] studied how to optimally obtain the ALink in this case using binary search. A faster approach was presented by Gog et al [10]. As the procedure is symmetrical for a node BAS or of FOS, we explain it for the latter.…”
Section: A Classification Of Bi-directional Indexesmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, network intrusion detection systems monitor packets flowing on the network to protect computer systems from malicious access [3,4]. String search is also useful for locating specific amino acid sequences in biological databases [5,6,7].…”
Section: Introductionmentioning
confidence: 99%