Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Pattern Masking for Dictionary Matching: Theory and Practice

    Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data...

    Panagiotis Charalampopoulos, Hui** Chen, Peter Christen in Algorithmica (2024)

  2. Article

    Open Access

    Efficient Computation of Sequence Mappability

    Sequence mappability is an important task in genome resequencing. In the (km)-mappability problem, for a given sequence T of length n, the goal is to compute a table whose ith entry is the number of indices ...

    Panagiotis Charalampopoulos, Costas S. Iliopoulos, Tomasz Kociumaka in Algorithmica (2022)

  3. No Access

    Chapter and Conference Paper

    Subsequence Covers of Words

    We introduce subsequence covers (s-covers, in short), a new type of covers of a word. A word C is an s-cover of a word S if the occurrences of C in S as subsequences cover all the positions in S.

    Panagiotis Charalampopoulos, Solon P. Pissis in String Processing and Information Retrieval (2022)

  4. No Access

    Chapter and Conference Paper

    On the Hardness of Computing the Edit Distance of Shallow Trees

    We consider the edit distance problem on rooted ordered trees parameterized by the trees’ depth. For two trees of size at most n and depth at most d, the state-of-the-art solutions of Zhang and Shasha [SICOMP 198...

    Panagiotis Charalampopoulos in String Processing and Information Retrieval (2022)

  5. No Access

    Article

    Internal Dictionary Matching

    We introduce data structures answering queries concerning the occurrences of patterns from a given dictionary \(\mathsf {D}\)

    Panagiotis Charalampopoulos, Tomasz Kociumaka, Manal Mohamed in Algorithmica (2021)

  6. No Access

    Chapter and Conference Paper

    Fault-Tolerant Distance Labeling for Planar Graphs

    In fault-tolerant distance labeling we wish to assign short labels to the vertices of a graph G such that from the labels of any three vertices uvf we can infer the u-to-v distance in the graph ...

    Aviv Bar-Natan, Panagiotis Charalampopoulos in Structural Information and Communication C… (2021)

  7. Article

    Open Access

    Dynamic and Internal Longest Common Substring

    Given two strings S and T, each of length at most n, the longest common substring (LCS) problem is to find a longest substring common to S and T. This is a classical problem in computer science with an $$\mathca...

    Amihood Amir, Panagiotis Charalampopoulos, Solon P. Pissis in Algorithmica (2020)

  8. No Access

    Chapter and Conference Paper

    Efficient Enumeration of Distinct Factors Using Package Representations

    We investigate properties and applications of a new compact representation of string factors: families of packages. In a string T, each package \((i,\ell ,k)\) represents the factors of T of length \(\ell \) ...

    Panagiotis Charalampopoulos in String Processing and Information Retrieval (2020)

  9. Article

    Open Access

    Efficient enumeration of non-equivalent squares in partial words with few holes

    A word of the form WW for some word \(W\in \varSigma ^*\) ...

    Panagiotis Charalampopoulos, Maxime Crochemore in Journal of Combinatorial Optimization (2019)

  10. No Access

    Chapter and Conference Paper

    Circular Pattern Matching with k Mismatches

    The k-mismatch problem consists in computing the Hamming distance between a pattern P of length m and every length-m substring of a text T of length n, if this distance is no more than k. In many real-world appli...

    Panagiotis Charalampopoulos, Tomasz Kociumaka in Fundamentals of Computation Theory (2019)

  11. No Access

    Chapter and Conference Paper

    Weighted Shortest Common Supersequence Problem Revisited

    A weighted string, also known as a position weight matrix, is a sequence of probability distributions over some alphabet. We revisit the Weighted Shortest Common Supersequence (WSCS) problem, introduced by Am...

    Panagiotis Charalampopoulos in String Processing and Information Retrieval (2019)

  12. No Access

    Chapter and Conference Paper

    On Extended Special Factors of a Word

    An extended special factor of a word x is a factor of x whose longest infix can be extended by at least two distinct letters to the left or to the right and still occur in x. It is called extended bispecial if it...

    Panagiotis Charalampopoulos in String Processing and Information Retrieval (2018)

  13. No Access

    Chapter and Conference Paper

    Longest Common Prefixes with k-Errors and Applications

    Although real-world text datasets, such as DNA sequences, are far from being uniformly random, string searching average-case algorithms perform significantly better than worst-case ones in most applications of...

    Lorraine A. K. Ayad, Carl Barton in String Processing and Information Retrieval (2018)

  14. No Access

    Chapter and Conference Paper

    Longest Common Prefixes with k-Mismatches and Applications

    We propose a new algorithm for computing the longest prefix of each suffix of a given string of length n over a constant-sized alphabet of size ...

    Hayam Alamro, Lorraine A. K. Ayad in SOFSEM 2018: Theory and Practice of Comput… (2018)

  15. No Access

    Chapter and Conference Paper

    Property Suffix Array with Applications

    The suffix array is one of the most prevalent data structures for string indexing; it stores the lexicographically sorted list of suffixes of a given string. Its practical advantage compared to the suffix tree...

    Panagiotis Charalampopoulos, Costas S. Iliopoulos in LATIN 2018: Theoretical Informatics (2018)

  16. No Access

    Chapter and Conference Paper

    Efficient Computation of Sequence Mappability

    Sequence mappability is an important task in genome re-sequencing. In the (km)-mappability problem, for a given sequence T of length n, our goal is to compute a table whose ith entry is the number of indices ...

    Mai Alzamel, Panagiotis Charalampopoulos in String Processing and Information Retrieval (2018)

  17. No Access

    Chapter and Conference Paper

    How to Answer a Small Batch of RMQs or LCA Queries in Practice

    In the Range Minimum Query (RMQ) problem, we are given an array A of n numbers and we are asked to answer queries of the following type: for indices i and j between 0 and

    Mai Alzamel, Panagiotis Charalampopoulos, Costas S. Iliopoulos in Combinatorial Algorithms (2018)

  18. Article

    Open Access

    On avoided words, absent words, and their application to biological sequence analysis

    The deviation of the observed frequency of a word w from its expected frequency in a given sequence x is used to determine whether or not the word is avoided. This concept is particularly useful in DNA linguisti...

    Yannis Almirantis, Panagiotis Charalampopoulos, Jia Gao in Algorithms for Molecular Biology (2017)

  19. No Access

    Chapter and Conference Paper

    Longest Common Factor After One Edit Operation

    It is well known that the longest common factor (LCF) of two strings over an integer alphabet can be computed in time linear in the total length of the two strings. Our aim here is to present an algorithm that...

    Amihood Amir, Panagiotis Charalampopoulos in String Processing and Information Retrieval (2017)

  20. No Access

    Chapter and Conference Paper

    Efficient Enumeration of Non-Equivalent Squares in Partial Words with Few Holes

    A word of the form WW for some word \(W\in \varSigma ^*\) is called a square, where

    Panagiotis Charalampopoulos, Maxime Crochemore in Computing and Combinatorics (2017)

previous disabled Page of 2