2012
DOI: 10.1145/2390176.2390189
|View full text |Cite
|
Sign up to set email alerts
|

Cycle detection and correction

Abstract: Assume that a natural cyclic phenomenon has been measured, but the data is corrupted by errors. The type of corruption is application-dependent and may be caused by measurements errors, or natural features of the phenomenon. We assume that an appropriate metric exists, which measures the amount of corruption experienced. This article studies the problem of recovering the correct cycle from data corrupted by various error models, formally defined as the period recovery problem . Specific… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…We say that S is a d-corrupted periodic string if there exists a periodic string S ′ of period p, such that |S| = |S ′ | and δ(S ′ , S) ≤ d, where δ is the Hamming distance. We refer to p as an approximate period of S. Notice that, depending on d, there might exist multiple possible strings S ′ that originate S. We are interested in reconstructing S, as opposed to S ′ , since we can use one of the existing algorithms to enumerate all possible strings S ′ (see [5,7,62]), without incurring additional queries.…”
Section: Examples Includementioning
confidence: 99%
See 1 more Smart Citation
“…We say that S is a d-corrupted periodic string if there exists a periodic string S ′ of period p, such that |S| = |S ′ | and δ(S ′ , S) ≤ d, where δ is the Hamming distance. We refer to p as an approximate period of S. Notice that, depending on d, there might exist multiple possible strings S ′ that originate S. We are interested in reconstructing S, as opposed to S ′ , since we can use one of the existing algorithms to enumerate all possible strings S ′ (see [5,7,62]), without incurring additional queries.…”
Section: Examples Includementioning
confidence: 99%
“…Regarding corrupted periodic strings, different applications suffer from different types of corruption. In particular, the following error metrics have been considered in the literature: Pseudo-local metrics such as swap distance [6] or Interchange (Cayley) distance [7]; and the Levenshtein edit distance [68]. It would be interesting to see whether our reconstruction algorithms can be adapted to these more general error distances.…”
Section: Conclusion and Open Questionsmentioning
confidence: 99%
“…The following fact characterizes T in terms of ED. 1 Also the APR problem under the Hamming distance was considered [2] for which an O(n log n)-time algorithm was presented [1] for the threshold n (2+ )·p with > 0. Proof.…”
Section: Wrap-around Dynamic Programmingmentioning
confidence: 99%
“…1 Also the APR problem under the Hamming distance was considered [2] for which an O(n log n)-time algorithm was presented [1] for the threshold Fact 4. We have min{ED(S, U ∞ ) :…”
Section: Wrap-around Dynamic Programmingmentioning
confidence: 99%
See 1 more Smart Citation