2012
DOI: 10.1007/978-3-642-34109-0_13
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Bubble Enumeration in Directed Graphs

Abstract: Polymorphisms in DNA-or RNA-seq data lead to recognisable patterns in a de Bruijn graph representation of the reads obtained by sequencing. Such patterns have been called mouths, or bubbles in the literature. They correspond to two vertex-disjoint directed paths between a source s and a target t. Due to the high number of such bubbles that may be present in real data, their enumeration is a major issue concerning the efficiency of dedicated algorithms. We propose in this paper the first linear delay algorithm … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
18
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 15 publications
(19 citation statements)
references
References 12 publications
1
18
0
Order By: Relevance
“…Moreover, by transforming each vertex v into an arc (v in , v out ), putting arcs (w out , v in ) and (v out , z in ) for each in-neighbor w and each out-neighbor z of v, vertex disjoint paths reduce to edge disjoint trails: as each of the k edge disjoint trails composing a solution do not use the same arc twice, we get the following. It is worth observing, that Theorem 3 generalizes the result in [1] for any k, getting the same bounds for k = 2, as O(F 2 (G)) is O(m).…”
Section: Vertex-disjoint Paths and Other Variationssupporting
confidence: 65%
See 3 more Smart Citations
“…Moreover, by transforming each vertex v into an arc (v in , v out ), putting arcs (w out , v in ) and (v out , z in ) for each in-neighbor w and each out-neighbor z of v, vertex disjoint paths reduce to edge disjoint trails: as each of the k edge disjoint trails composing a solution do not use the same arc twice, we get the following. It is worth observing, that Theorem 3 generalizes the result in [1] for any k, getting the same bounds for k = 2, as O(F 2 (G)) is O(m).…”
Section: Vertex-disjoint Paths and Other Variationssupporting
confidence: 65%
“…Target not Given Target Given Target not Given k = 1 [7] and this paper (directed): O(m) [14]: O(nm) (directed) and O(m) (undirected) [2] (undirected): optimal this paper: O(m) k = 2 this paper: O(m) [1] and this paper: O(m) [11]: hard [15]: O(nm) this paper: O(m) k ≥ 3 this paper: O(m) [11]: hard [15]: hard Table 1. Cost per solution when listing the k vertex-disjoint (unbounded or bounded) paths originating from any given vertex s, whether the target t is given or not.…”
Section: Unbounded Length Bounded Length Target Givenmentioning
confidence: 95%
See 2 more Smart Citations
“…In the context of sequence analysis, a bubble can represent a potential sequencing error or a genetic variation within a set of homologous molecules. An efficient algorithm for bubble detection was proposed by [2].…”
Section: Introductionmentioning
confidence: 99%