Reverse Engineering Prefix Tables

نویسندگان

  • Julien Clément
  • Maxime Crochemore
  • Giuseppina Rindone
چکیده

The Prefix table of a string reports for each position the maximal length of its prefixes starting here. The Prefix table and its dual Suffix table are basic tools used in the design of the most efficient string-matching and pattern extraction algorithms. These tables can be computed in linear time independently of the alphabet size. We give an algorithmic characterisation of a Prefix table (it can be adapted to a Suffix table). Namely, the algorithm tests if an integer table of size n is the Prefix table of some word and, if successful, it constructs the lexicographically smallest string having it as a Prefix table. We show that the alphabet of the string can be bounded to log 2 n letters. The overall algorithm runs in O(n) time.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Reverse Engineering Approach to Convert Form Fill Format Document into Uml Class Diagram

This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and pract...

متن کامل

Howard: A Dynamic Excavator for Reverse Engineering Data Structures

Even the most advanced reverse engineering techniques and products are weak in recovering data structures in stripped binaries—binaries without symbol tables. Unfortunately, forensics and reverse engineering without data structures is exceedingly hard. We present a new solution, known as Howard, to extract data structures from C binaries without any need for symbol tables. Our results are signi...

متن کامل

Scheduling of Updates in an IP Forwarding Engine with Partitioned Prefix Tables

Many IP forwarding engines have used TCAM(Ternary Content Addressable Memory) for IP address lookup. While TCAM has the advantage of parallel lookup in a single step, it has a difficulty in updating a prefix table. TCAM requires the prefix table to be ordered for the longest prefix matching, so each update may incur several memory movements to maintain the ordering. For the fast updating of the...

متن کامل

On the Number of Prefix and Border Tables

For some text algorithms, the real measure for the complexity analysis is not the string itself but its structure stored in its prefix table (or border table, as border and prefix tables can be proved to be equivalent). We give a new upper bound on the number of prefix tables for strings of length n (on any alphabet) which is of order (1 + φ) (with φ = 1+ √ 5 2 the golden mean) and present also...

متن کامل

Prefix Hash Tree An Indexing Data Structure over Distributed Hash Tables

Distributed Hash Tables are scalable, robust, and self-organizing peer-to-peer systems that support exact match lookups. This paper describes the design and implementation of a Prefix Hash Tree a distributed data structure that enables more sophisticated queries over a DHT. The Prefix Hash Tree uses the lookup interface of a DHT to construct a trie-based structure that is both efficient (update...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009