From post

External memory BWT and LCP computation for sequence collections with applications.

, , , и . WABI, том 113 из LIPIcs, стр. 10:1-10:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A quantifier elimination for the theory of p-adic numbers.. Comput. Complex., 7 (3): 205-263 (1998)A mathematical framework for the semantics of symbolic languages representing periodic time., и . Ann. Math. Artif. Intell., 46 (3): 317-347 (2006)The Complexity of the Theory of p-adic Numbers. FOCS, стр. 412-421. IEEE Computer Society, (1993)Bringing multimedia contents into MP3 files., и . IEEE Communications Magazine, 43 (5): 90-97 (2005)Authentication and Access Delegation with User-Released Certificates., и . SAC, стр. 288-293. ACM, (2003)Lightweight BWT and LCP Merging via the Gap Algorithm., и . SPIRE, том 10508 из Lecture Notes in Computer Science, стр. 176-190. Springer, (2017)A modular approach to user-defined symbolic periodicities., и . Data Knowl. Eng., 66 (1): 163-198 (2008)Hilbert Function and Complexity Lower Bounds for Symmetric Boolean Functions., и . Inf. Comput., 153 (1): 1-25 (1999)A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems., , , , , , и . ITASEC, том 2315 из CEUR Workshop Proceedings, CEUR-WS.org, (2019)The lazy call-by-value Lamda-Calculus., , и . MFCS, том 520 из Lecture Notes in Computer Science, стр. 161-169. Springer, (1991)