We establish $O(n \log n)$ minimum-space algorithms that omit both the open and the closed list to determine the shortest path between every two nodes and study the gap in between full memorization in a hash table and the information-theoretic lower bound. The proposed structure of suffix-lists elaborates on a concise binary representation of states by applying bit-state hashing techniques. Significantly more states can be stored while searching and inserting $n$ items into suffix lists is still available in $O(n \log n)$ time. Bit-state hashing leads to the new paradigm of partial iterative-deepening heuristic search, in which full exploration is sacrificed for a better detection of duplicates in large search depth. We give first promising...
. An on--line learning algorithm for pruning state space search is described in this paper. The algo...
This paper presents a general technique for optimally transforming any dynamic data structure that o...
Symbolic search using BDDs usually saves huge amounts of memory, while in some domains its savings a...
We establish $O(n \log n)$ minimum-space algorithms that omit both the open and the closed list to d...
We consider the dictionary problem in external memory and improve the update time of the well-known ...
We consider the dictionary problem in external memory and improve the update time of the well-known ...
We present a strongly history independent (SHI) hash ta-ble that supports search inO(1) worst-case t...
A prefix search returns the strings out of a given collection S that start with a given prefix. Trad...
The talk is about a dictionary data structure D for matching multiple pat-tern. If the input alphabe...
A minimal perfect hash function maps a set S of n keys into the set { 0, 1,..., n − 1} bijectively. ...
A memory-based heuristic is a function, h(s), stored in the form of a lookup table (pattern database...
International audienceGiven string $S[1..N]$ and integer $k$, the {\em suffix selection} problem is ...
Abstract This paper is about compressed full-text indexes. That is, our goal is to represent full-te...
This paper presents a general technique for optimally transforming any dynamic data structure that o...
We show tight upper and lower bounds for time-space trade-offs for the c-approximate Near Neighbor S...
. An on--line learning algorithm for pruning state space search is described in this paper. The algo...
This paper presents a general technique for optimally transforming any dynamic data structure that o...
Symbolic search using BDDs usually saves huge amounts of memory, while in some domains its savings a...
We establish $O(n \log n)$ minimum-space algorithms that omit both the open and the closed list to d...
We consider the dictionary problem in external memory and improve the update time of the well-known ...
We consider the dictionary problem in external memory and improve the update time of the well-known ...
We present a strongly history independent (SHI) hash ta-ble that supports search inO(1) worst-case t...
A prefix search returns the strings out of a given collection S that start with a given prefix. Trad...
The talk is about a dictionary data structure D for matching multiple pat-tern. If the input alphabe...
A minimal perfect hash function maps a set S of n keys into the set { 0, 1,..., n − 1} bijectively. ...
A memory-based heuristic is a function, h(s), stored in the form of a lookup table (pattern database...
International audienceGiven string $S[1..N]$ and integer $k$, the {\em suffix selection} problem is ...
Abstract This paper is about compressed full-text indexes. That is, our goal is to represent full-te...
This paper presents a general technique for optimally transforming any dynamic data structure that o...
We show tight upper and lower bounds for time-space trade-offs for the c-approximate Near Neighbor S...
. An on--line learning algorithm for pruning state space search is described in this paper. The algo...
This paper presents a general technique for optimally transforming any dynamic data structure that o...
Symbolic search using BDDs usually saves huge amounts of memory, while in some domains its savings a...