• Non ci sono risultati.

Lab on Algorithms for Big Data 13

N/A
N/A
Protected

Academic year: 2021

Condividi "Lab on Algorithms for Big Data 13"

Copied!
1
0
0

Testo completo

(1)

Lab on Algorithms for Big Data

13 February 2015

1. [rank 8] Given the sequence of integers S = (1,4,5,7,10,15,20,21) construct the Elias-Fano coding for this sequence and show how it is retrieved the 4-th element from it (by assuming to have, as a black-box, Rank/Select primitives for binary sequences).

2. [rank 6+4] Given the string S = abaabba, construct the BWT of S, and then show how to locate the position in S of the 4-th character in the BWT (counting from 0) by assuming a sampling factor of 1/4.

3. [rank 12] Just execute one of the following different of the topic of the project you’ve chosen, or you’ll choose.

a. Describe how it works the LOUDS encoding of trees, and show it over the structure of the trie built on the strings S = {abac, abra, bacco, bei, acat}.

b. Describe how you can use the LSH-technique to detect the similar groups among a set of n vectors of L bits each, commenting on its space and time efficiency.

Riferimenti

Documenti correlati

l’usagère n’adhère pas aux rôles institutionnels préétablis, l’accompagnement arrive à une impasse : à qui appartiennent les murs et les barrières qui se construisent ?

Aim: To evaluate fundamental cell functions, such as adhesion, IL-6 production and proliferation of human gingival keratinocytes cultured on a newly engineered collagen

Già, perché se quella di re Rotari, come detto, fu la prima codificazione scritta del diritto longobardo, non vanno dimenticati i contatti, profondi e risalenti almeno al V

Blood samples were obtained by venipuncture, collected in heparinised tubes, cooled (4°C) and processed within 2 h after collection. Lymphocyte cultures, fixation and

 Show how to compute the first child of

The main obstacle in building LZ77 within O(r log n) bits of space with a run-length encoded FM-index is the suffix array (SA) sampling: by sampling the SA every 0 < k ≤ n

Lastly, the velocity of the Big Data flooding, for example, research network, may lead to cyberattacks as sinister payloads (such as malware) may be hidden in that flow and

Let us given the strings S = {abac, abra, bacco, bei, acat}, show the structure of a Ternary Search tree built by inserting them in alphabetic order.. Describe how you can use