Results 31 to 40 of about 566,299 (120)
Pattern Matching in Set Partitions is NP-Complete [PDF]
In this note we show that pattern matching in permutations is polynomial time reducible to pattern matching in set partitions. In particular, pattern matching in set partitions is NP-Complete.
arxiv
Sea ice drift detection has the key role of global climate analysis and waterway planning. The ability to detect sea ice drift in real-time also contributes to the safe navigation of ships and the prevention of offshore oil platform accidents.
Ming Zhang+5 more
doaj +1 more source
Toward the asymptotic count of bi-modular hidden patterns under probabilistic dynamical sources: a case study [PDF]
Consider a countable alphabet $\mathcal{A}$. A multi-modular hidden pattern is an $r$-tuple $(w_1,\ldots , w_r)$, where each $w_i$ is a word over $\mathcal{A}$ called a module.
Loïck Lhote, Manuel E. Lladser
doaj +1 more source
ANALYSIS ON DIFFERENT METHODS FOR SIGN LANGUAGE IDENTIFICATION
Sign Language (SL) is the most organized and structured type of hand/arm gesture in the communicative hand/arm gesture taxonomies. The ability of machines to comprehend human actions and meanings has numerous uses. SL identification is one area of focus.
M Prema, P M Gomathi
doaj +1 more source
MatchPy: A Pattern Matching Library [PDF]
Pattern matching is a powerful tool for symbolic computations, based on the well-defined theory of term rewriting systems. Application domains include algebraic expressions, abstract syntax trees, and XML and JSON data. Unfortunately, no lightweight implementation of pattern matching as general and flexible as Mathematica exists for Python Mathics ...
arxiv +1 more source
With the increasingly urgent demand for map conflation and timely data updating, data matching has become a crucial issue in big data and the GIS community.
Yunfei Zhang+6 more
doaj +1 more source
TrojanDetector: A Multi-Layer Hybrid Approach for Trojan Detection in Android Applications
Trojan Detection—the process of understanding the behaviour of a suspicious file has been the talk of the town these days. Existing approaches, e.g., signature-based, have not been able to classify them accurately as Trojans.
Subhan Ullah+4 more
doaj +1 more source
Dynamic Pattern Matching on Encrypted Data With Forward and Backward Security
Pattern matching is widely used in applications such as genomic data query analysis, network intrusion detection, and deep packet inspection (DPI). Performing pattern matching on plaintext data is straightforward, but the need to protect the security of ...
Xiaolu Chu+3 more
doaj +1 more source
Optimal Space and Time for Streaming Pattern Matching [PDF]
In this work, we study longest common substring, pattern matching, and wildcard pattern matching in the asymmetric streaming model. In this streaming model, we have random access to one string and streaming access to the other one. We present streaming algorithms with provable guarantees for these three fundamental problems.
arxiv
Pattern Matching in Trees and Strings [PDF]
We study the design of efficient algorithms for combinatorial pattern matching. More concretely, we study algorithms for tree matching, string matching, and string matching in compressed texts.
arxiv