1943
DOI: 10.1038/151674a0
|View full text |Cite
|
Sign up to set email alerts
|

Murray Hill Laboratory of Bell Telephone Laboratories

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Figure 3 shows an example of the operations used in MED with the costs from Table 2 for aligning the response “thin” with the stimulus “fun”. Figure 4 shows the differences between the outputs for aligning the response “We live on the earth” with the stimulus “These are your books” (from participant V1-HA in the test data, see below and Table 3 ) from three different alignments: the diff function first used in UNIX ( 37 ) and available in scLite, the original Levenshtein algorithm with simple costs, and the finalized modified algorithm. diff gave no weight to consonants or vowels.…”
Section: Methodsmentioning
confidence: 99%
“…Figure 3 shows an example of the operations used in MED with the costs from Table 2 for aligning the response “thin” with the stimulus “fun”. Figure 4 shows the differences between the outputs for aligning the response “We live on the earth” with the stimulus “These are your books” (from participant V1-HA in the test data, see below and Table 3 ) from three different alignments: the diff function first used in UNIX ( 37 ) and available in scLite, the original Levenshtein algorithm with simple costs, and the finalized modified algorithm. diff gave no weight to consonants or vowels.…”
Section: Methodsmentioning
confidence: 99%
“…The most essential step of data synchronization is to detect updates. One solution is diff-like protocols [30] which are based on comparing two versions of the same file line by line and can detect the exact updates. Only these updates will be uploaded to the cloud in a patch file which describes the difference between the old and the new version.…”
Section: Data Synchronization Mechanism Of Cloud Storage Servicesmentioning
confidence: 99%
“…These algorithms solve the string‐to‐string correction problem [16] with block move optimally, in that they always find the shortest sequence of operation, even though they ran in quadratic time and/or linear space. Unix diff [17, 18] is the classical programme for generating delta, but it is limited to text file rather than binary file, as well as the algorithm proposed by Miller and Myers [15] have been given. The algorithms bdiff [19] and suff [20] extend the application widely by converting the binary code into text, but the deltas they created are larger than the originals.…”
Section: Introductionmentioning
confidence: 99%