4,022 research outputs found
An Efficient Data Structure for Dynamic Two-Dimensional Reconfiguration
In the presence of dynamic insertions and deletions into a partially
reconfigurable FPGA, fragmentation is unavoidable. This poses the challenge of
developing efficient approaches to dynamic defragmentation and reallocation.
One key aspect is to develop efficient algorithms and data structures that
exploit the two-dimensional geometry of a chip, instead of just one. We propose
a new method for this task, based on the fractal structure of a quadtree, which
allows dynamic segmentation of the chip area, along with dynamically adjusting
the necessary communication infrastructure. We describe a number of algorithmic
aspects, and present different solutions. We also provide a number of basic
simulations that indicate that the theoretical worst-case bound may be
pessimistic.Comment: 11 pages, 12 figures; full version of extended abstract that appeared
in ARCS 201
Computing the Longest Unbordered Substring
International audienceA substring of a string is unbordered if its only border is the empty string. The study of unbordered substrings goes back to the paper of Ehrenfeucht and Silberger [7]. The main focus of [7] and of subsequent papers was to elucidate the relationship between the longest unbordered substring and the minimal period of strings. In this paper, we consider the algorithmic problem of computing the longest unbordered substring of a string. The problem was introduced recently in [12], where the authors showed that the average-case running time of the simple, border-array based algorithm can be bounded by O(n 2 /σ 4) for σ being the size of the alphabet. (The worst-case running time remained O(n 2).) Here we propose two algorithms, both presenting substantial theoretical improvements to the result of [12]. The first algorithm has O(n log n) average-case running time and O(n 2) worst-case running time, and the second algorithm has O(n 1.5) worst-case running time
A Faster Implementation of Online Run-Length Burrows-Wheeler Transform
Run-length encoding Burrows-Wheeler Transformed strings, resulting in
Run-Length BWT (RLBWT), is a powerful tool for processing highly repetitive
strings. We propose a new algorithm for online RLBWT working in run-compressed
space, which runs in time and bits of space, where
is the length of input string received so far and is the number of runs
in the BWT of the reversed . We improve the state-of-the-art algorithm for
online RLBWT in terms of empirical construction time. Adopting the dynamic list
for maintaining a total order, we can replace rank queries in a dynamic wavelet
tree on a run-length compressed string by the direct comparison of labels in a
dynamic list. The empirical result for various benchmarks show the efficiency
of our algorithm, especially for highly repetitive strings.Comment: In Proc. IWOCA201
Faster algorithms for 1-mappability of a sequence
In the k-mappability problem, we are given a string x of length n and
integers m and k, and we are asked to count, for each length-m factor y of x,
the number of other factors of length m of x that are at Hamming distance at
most k from y. We focus here on the version of the problem where k = 1. The
fastest known algorithm for k = 1 requires time O(mn log n/ log log n) and
space O(n). We present two algorithms that require worst-case time O(mn) and
O(n log^2 n), respectively, and space O(n), thus greatly improving the state of
the art. Moreover, we present an algorithm that requires average-case time and
space O(n) for integer alphabets if m = {\Omega}(log n/ log {\sigma}), where
{\sigma} is the alphabet size
A first-order BSPDE for swing option pricing
We study an optimal control problem related to swing option pricing in a general non-Markovian setting in continuous time. As a main result we uniquely characterize the value process in terms of a first-order nonlinear backward stochastic partial differential equation and a differential inclusion. Based on this result we also determine the set of optimal controls and derive a dual minimization problem
Fast Label Extraction in the CDAWG
The compact directed acyclic word graph (CDAWG) of a string of length
takes space proportional just to the number of right extensions of the
maximal repeats of , and it is thus an appealing index for highly repetitive
datasets, like collections of genomes from similar species, in which grows
significantly more slowly than . We reduce from to
the time needed to count the number of occurrences of a pattern of
length , using an existing data structure that takes an amount of space
proportional to the size of the CDAWG. This implies a reduction from
to in the time needed to
locate all the occurrences of the pattern. We also reduce from
to the time needed to read the characters of the
label of an edge of the suffix tree of , and we reduce from
to the time needed to compute the matching
statistics between a query of length and , using an existing
representation of the suffix tree based on the CDAWG. All such improvements
derive from extracting the label of a vertex or of an arc of the CDAWG using a
straight-line program induced by the reversed CDAWG.Comment: 16 pages, 1 figure. In proceedings of the 24th International
Symposium on String Processing and Information Retrieval (SPIRE 2017). arXiv
admin note: text overlap with arXiv:1705.0864
Four-point renormalized coupling constant and Callan-Symanzik beta-function in O(N) models
We investigate some issues concerning the zero-momentum four-point
renormalized coupling constant g in the symmetric phase of O(N) models, and the
corresponding Callan-Symanzik beta-function. In the framework of the 1/N
expansion we show that the Callan- Symanzik beta-function is non-analytic at
its zero, i.e. at the fixed-point value g^* of g. This fact calls for a check
of the actual accuracy of the determination of g^* from the resummation of the
d=3 perturbative g-expansion, which is usually performed assuming analyticity
of the beta-function. Two alternative approaches are exploited. We extend the
\epsilon-expansion of g^* to O(\epsilon^4). Quite accurate estimates of g^* are
then obtained by an analysis exploiting the analytic behavior of g^* as
function of d and the known values of g^* for lower-dimensional O(N) models,
i.e. for d=2,1,0. Accurate estimates of g^* are also obtained by a reanalysis
of the strong-coupling expansion of lattice N-vector models allowing for the
leading confluent singularity. The agreement among the g-, \epsilon-, and
strong-coupling expansion results is good for all N. However, at N=0,1,
\epsilon- and strong-coupling expansion favor values of g^* which are sligthly
lower than those obtained by the resummation of the g-expansion assuming
analyticity in the Callan-Symanzik beta-function.Comment: 35 pages (3 figs), added Ref. for GRT, some estimates are revised,
other minor change
A general lower bound for collaborative tree exploration
We consider collaborative graph exploration with a set of agents. All
agents start at a common vertex of an initially unknown graph and need to
collectively visit all other vertices. We assume agents are deterministic,
vertices are distinguishable, moves are simultaneous, and we allow agents to
communicate globally. For this setting, we give the first non-trivial lower
bounds that bridge the gap between small () and large () teams of agents. Remarkably, our bounds tightly connect to existing results
in both domains.
First, we significantly extend a lower bound of
by Dynia et al. on the competitive ratio of a collaborative tree exploration
strategy to the range for any . Second,
we provide a tight lower bound on the number of agents needed for any
competitive exploration algorithm. In particular, we show that any
collaborative tree exploration algorithm with agents has a
competitive ratio of , while Dereniowski et al. gave an algorithm
with agents and competitive ratio , for any
and with denoting the diameter of the graph. Lastly, we
show that, for any exploration algorithm using agents, there exist
trees of arbitrarily large height that require rounds, and we
provide a simple algorithm that matches this bound for all trees
Identification of the first surrogate agonists for the G protein-coupled receptor GPR132
We report the first pharmacological tool agonist for in vitro characterization of the orphan receptor GPR132, preliminary structure–activity relationships based on 32 analogs and a suggested binding mode from docking.M.A.S. was supported by a research scholarship from the
Drug Research Academy and Novo Nordisk A/S. D.E.G.
and H.B.-O. gratefully acknowledge financial support by
the Carlsberg Foundation. D.E.G. and D.S.P. gratefully
acknowledges financial support by the Lundbeck
Foundation. Nils Nyberg is acknowledged for help with
NMR spectroscopy. NMR equipment used in this work
was purchased via a grant from The Lundbeck
Foundation (R77-A6742).This is the accepted manuscript. The final version is available at http://pubs.rsc.org/en/Content/ArticleLanding/2015/RA/c5ra04804d#!divAbstract
Scaling in Relativistic Thomas-Fermi Approach for Nuclei
By using the scaling method we derive the virial theorem for the relativistic
mean field model of nuclei treated in the Thomas-Fermi approach. The
Thomas-Fermi solutions statisfy the stability condition against scaling. We
apply the formalism to study the excitation energy of the breathing mode in
finite nuclei with several relativistic parameter sets of common use.Comment: 13 page
- …