2017
DOI: 10.1007/978-3-319-73117-9_45
|View full text |Cite
|
Sign up to set email alerts
|

Longest Common Prefixes with k-Mismatches and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

4
1

Authors

Journals

citations
Cited by 7 publications
(13 citation statements)
references
References 27 publications
0
13
0
Order By: Relevance
“…2. By applying this result, we significantly improve upon the state-of-the-art algorithm for non-constant k and using O(n) space [3]. Specifically, our algorithm runs in O(n log k n log log n) time on average using O(n) space.…”
Section: Introductionmentioning
confidence: 88%
See 2 more Smart Citations
“…2. By applying this result, we significantly improve upon the state-of-the-art algorithm for non-constant k and using O(n) space [3]. Specifically, our algorithm runs in O(n log k n log log n) time on average using O(n) space.…”
Section: Introductionmentioning
confidence: 88%
“…We then say that this substring has k-mappability equal to occ. Specifically, we consider a data structure version of this problem [3]. Given x and k, construct a data structure, which, for a query value µ given on-line, returns the minimal value of m that forces at least µ length-m substrings of x to have k-mappability equal to 0.…”
Section: Genome Mappability Data Structurementioning
confidence: 99%
See 1 more Smart Citation
“…If d = m, we have successfully spelled S m 1 arriving at an explicit node v or an implicit node along an edge (u, v). In this case, we increment A [1] by C(v) if and only if d H (S m 1 , T m 1 ) = k. If D(v) = m, we follow its suffix link arriving by construction to a node of depth m − 1; if not, we follow the suffix link of its parent u and traverse the edges down until we reach depth m − 1. (Note that we know which edges we need to traverse by looking at S.) From this point onward, we process substring S m i , for all 2 ≤ i ≤ n − m + 1, analogously.…”
Section: O(n Log K+1 N)-time and O(n)-space Algorithmmentioning
confidence: 99%
“…For k = O(1) and constant-sized alphabets, there is an algorithm requiring O(min{nm k , n log k+1 n}) time and O(n) space [7]. In [8] the authors introduced an efficient construction of a genome mappability array B k in which B k [μ] is the smallest length m such that at least μ of the length-m factors of x do not occur elsewhere in x with at most k mismatches. The construction algorithm was later improved in [9].…”
Section: Introductionmentioning
confidence: 99%