Can We Recover the Cover?

被引:0
|
作者
Amihood Amir
Avivit Levy
Moshe Lewenstein
Ronit Lubin
Benny Porat
机构
[1] Bar-Ilan University,
[2] Johns Hopkins University,undefined
[3] Shenkar College,undefined
来源
Algorithmica | 2019年 / 81卷
关键词
Periodicity; Quasi-periodicity; Cover; Approximate cover; Data recovery;
D O I
暂无
中图分类号
学科分类号
摘要
Data analysis typically involves error recovery and detection of regularities as two different key tasks. In this paper we show that there are data types for which these two tasks can be powerfully combined. A common notion of regularity in strings is that of a cover. Data describing measures of a natural coverable phenomenon may be corrupted by errors caused by the measurement process, or by the inexact features of the phenomenon itself. Due to this reason, different variants of approximate covers have been introduced, some of which are NP\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {NP}$$\end{document}-hard to compute. In this paper we assume that the Hamming distance metric measures the amount of corruption experienced, and study the problem of recovering the correct cover from data corrupted by mismatch errors, formally defined as the cover recovery problem (CRP). We show that for the Hamming distance metric, coverability is a powerful property allowing detecting the original cover and correcting the data, under suitable conditions. We also study a relaxation of another problem, which is called the approximate cover problem (ACP). Since the ACP is proved to be NP\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {NP}$$\end{document}-hard (Amir et al. in: Approximate cover of strings. CPM, 2017), we study a relaxation, which we call the candidate-relaxation of the ACP, and show it has a polynomial time complexity. As a result, we get that the ACP also has a polynomial time complexity in many practical situations. An important application of our ACP relaxation study is also a polynomial time algorithm for the CRP.
引用
下载
收藏
页码:2857 / 2875
页数:18
相关论文
共 50 条
  • [31] How do we tell what we do? We can move from the traditional pedagogical report to records that recover the complexity of what happens in the classroom
    Torrealba, Maria Teresa
    Gulman, Paula Sofia
    Duri, Rocio
    FORO EDUCACIONAL, 2024, (42): : 111 - 143
  • [32] We doctors must be given the opportunity to recover
    Gunnarsdottir, Gunnhildur Arna
    LAEKNABLADID, 2021, 107 (02): : 98 - 99
  • [33] We Do Recover, A Mother Daughter Dialogue
    White, Jill
    INTERNATIONAL JOURNAL OF QUALITATIVE METHODS, 2014, 13 : 563 - 563
  • [34] WE COVER THE WORLD
    Coggeshall, Reginald
    JOURNALISM QUARTERLY, 1937, 14 (03): : 275 - 276
  • [35] Radiographic features and behaviors of neuroendocrine tumors: can we judge a book by its cover?
    Mouw, Tyler J.
    Scoggins, Charles R.
    HEPATOBILIARY SURGERY AND NUTRITION, 2021, 10 (04) : 573 - 574
  • [36] CAN ONE RECOVER FROM SPASMODIC DYSPHONIA
    CHEVRIEMULLER, C
    ARABIAGUIDET, C
    PFAUWADEL, MC
    BRITISH JOURNAL OF DISORDERS OF COMMUNICATION, 1987, 22 (02): : 117 - 128
  • [37] DMF CAN EFFICIENTLY RECOVER BUTADIENE AND ISOPRENE
    TAKAO, S
    OIL & GAS JOURNAL, 1979, 77 (40) : 81 - 82
  • [38] Polymer gels that can recognize and recover molecules
    Tanaka, T
    Wang, CN
    Pande, V
    Grosberg, AY
    English, A
    Masamune, S
    Gold, H
    Levy, R
    King, K
    FARADAY DISCUSSIONS, 1995, 101 : 201 - 206
  • [39] Can Applications Recover from fsync Failures?
    Rebello, Anthony
    Patel, Yuvraj
    Alagappan, Ramnatthan
    Arpaci-Dusseau, Andrea C.
    Arpaci-Dusseau, Remzi H.
    ACM TRANSACTIONS ON STORAGE, 2021, 17 (02)
  • [40] Can small users recover from the cloud?
    Clarke, Roger
    COMPUTER LAW & SECURITY REVIEW, 2017, 33 (06) : 754 - 767