Constrained Many-to-One String Editing with Memory

نویسندگان

  • Jovan Dj. Golic
  • Slobodan V. Petrovic
چکیده

A new constrained edit distance between an ordered set of input strings and a single output string is proposed. All the strings are assumed to have finite lengths and to be over a finite alphabet. Editing transformation respectively includes deletion of symbols from the input strings, combination of the so-reduced input strings by a function with memory, and substitution and insertion of symbols in the combination string. Constraints are related to the total number of edit operations and to the maximum number of consecutive deletions and insertions. A recursive algorithm for efficient computation of the constrained edit distance is derived and its computational complexity is determined. Potential applications in cryptanalysis of shift register based stream ciphers and in decoding for parallel communication channels with synchronization errors are also discussed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Characterization of Constrained Aged Niti Strips for Using In Artificial Muscle Actuators (Technical Note)

Marvelous bending/straightening effects of two-way shape memory alloy (TWSMA) help their employment in design and manufacturing of new medical appliances. Constrained ageing with bending load scheme can induce two-way shape memory effect (TWSME). Scanning electron microscope (SEM) analysis, electrical resistivity measurement (ERM) and differential scanning calorimetry (DSC) are employed to dete...

متن کامل

A data-handling mechanics of on-line text editing system with efficient secondary storage access

The data-handling algorithm in many current editors 2 uses a text which is a continuous string of characters. In this technique the characters are moved directly from their input source to the text string by expanding it in tue core buffer. The disadvantage of such existing systems is due to the core buffer constraint. The buffer can be extended to the auxiliary storage but will result in less ...

متن کامل

Noisy Subsequence Recognition Using Constrained String Editing Involving Arbitrary Operations*

We consider a problem which can greatly enhance the areas of cursive script recognition and the recognition of printed character sequences. This problem involves recognizing words/strings by processing their noisy subsequences. Let X* be any unknown word from a finite dictionary H. Let U be any arbitrary subsequence of X*. We study the problem of estimating X* by processing Y, a noisy version o...

متن کامل

Constrained consumable resource allocation in alternative stochastic networks via multi-objective decision making

Many real projects complete through the realization of one and only one path of various possible network paths. Here, these networks are called alternative stochastic networks (ASNs). It is supposed that the nodes of considered network are probabilistic with exclusive-or receiver and exclusive-or emitter. First, an analytical approach is proposed to simplify the structure of t...

متن کامل

A Robust Knapsack Based Constrained Portfolio Optimization

Many portfolio optimization problems deal with allocation of assets which carry a relatively high market price. Therefore, it is necessary to determine the integer value of assets when we deal with portfolio optimization. In addition, one of the main concerns with most portfolio optimization is associated with the type of constraints considered in different models. In many cases, the resulted p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. Sci.

دوره 86  شماره 

صفحات  -

تاریخ انتشار 1995