Skip to main content

Showing 1–7 of 7 results for author: Gibney, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.01793  [pdf, other

    cs.DS quant-ph

    Near-Optimal Quantum Algorithms for Bounded Edit Distance and Lempel-Ziv Factorization

    Authors: Daniel Gibney, Ce **, Tomasz Kociumaka, Sharma V. Thankachan

    Abstract: Classically, the edit distance of two length-$n$ strings can be computed in $O(n^2)$ time, whereas an $O(n^{2-ε})$-time procedure would falsify the Orthogonal Vectors Hypothesis. If the edit distance does not exceed $k$, the running time can be improved to $O(n+k^2)$, which is near-optimal (conditioned on OVH) as a function of $n$ and $k$. Our first main contribution is a quantum… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

    Comments: Accepted to SODA 2024. arXiv admin note: substantial text overlap with arXiv:2302.07235

  2. arXiv:2302.07235  [pdf, other

    cs.DS

    Compressibility-Aware Quantum Algorithms on Strings

    Authors: Daniel Gibney, Sharma V. Thankachan

    Abstract: Sublinear time quantum algorithms have been established for many fundamental problems on strings. This work demonstrates that new, faster quantum algorithms can be designed when the string is highly compressible. We focus on two popular and theoretically significant compression algorithms -- the Lempel-Ziv77 algorithm (LZ77) and the Run-length-encoded Burrows-Wheeler Transform (RL-BWT), and obtain… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

  3. arXiv:2201.12454  [pdf, other

    cs.DS

    The Complexity of Approximate Pattern Matching on De Bruijn Graphs

    Authors: Daniel Gibney, Sharma V. Thankachan, Srinivas Aluru

    Abstract: Aligning a sequence to a walk in a labeled graph is a problem of fundamental importance to Computational Biology. For finding a walk in an arbitrary graph with $|E|$ edges that exactly matches a pattern of length $m$, a lower bound based on the Strong Exponential Time Hypothesis (SETH) implies an algorithm significantly faster than $O(|E|m)$ time is unlikely [Equi et al., ICALP 2019]. However, for… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

  4. arXiv:2009.05669  [pdf, other

    cs.LG cs.CR stat.ML

    Quantifying Membership Inference Vulnerability via Generalization Gap and Other Model Metrics

    Authors: Jason W. Bentley, Daniel Gibney, Gary Hoppenworth, Sumit Kumar Jha

    Abstract: We demonstrate how a target model's generalization gap leads directly to an effective deterministic black box membership inference attack (MIA). This provides an upper bound on how secure a model can be to MIA based on a simple metric. Moreover, this attack is shown to be optimal in the expected sense given access to only certain likely obtainable metrics regarding the network's training and perfo… ▽ More

    Submitted 11 September, 2020; originally announced September 2020.

  5. arXiv:2008.11786  [pdf, ps, other

    cs.CC cs.DS

    Simple Reductions from Formula-SAT to Pattern Matching on Labeled Graphs and Subtree Isomorphism

    Authors: Daniel Gibney, Gary Hoppenworth, Sharma V. Thankachan

    Abstract: The CNF formula satisfiability problem (CNF-SAT) has been reduced to many fundamental problems in P to prove tight lower bounds under the Strong Exponential Time Hypothesis (SETH). Recently, the works of Abboud, Hansen, Vassilevska W. and Williams (STOC 16), and later, Abboud and Bringmann (ICALP 18) have proposed basing lower bounds on the hardness of general boolean formula satisfiability (Formu… ▽ More

    Submitted 26 August, 2020; originally announced August 2020.

  6. arXiv:1911.03035  [pdf, other

    cs.DS

    On the Complexity of BWT-runs Minimization via Alphabet Reordering

    Authors: Jason Bentley, Daniel Gibney, Sharma V. Thankachan

    Abstract: The Burrows-Wheeler Transform (BWT) has been an essential tool in text compression and indexing. First introduced in 1994, it went on to provide the backbone for the first encoding of the classic suffix tree data structure in space close to the entropy-based lower bound. Recently, there has been the development of compact suffix trees in space proportional to "$r$", the number of runs in the BWT,… ▽ More

    Submitted 18 February, 2020; v1 submitted 7 November, 2019; originally announced November 2019.

  7. arXiv:1902.01960  [pdf, other

    cs.CC

    On the Hardness and Inapproximability of Recognizing Wheeler Graphs

    Authors: Daniel Gibney, Sharma V. Thankachan

    Abstract: In recent years several compressed indexes based on variants of the Burrows-Wheeler transformation have been introduced. Some of these index structures far more complex than a single string, as was originally done with the FM-index [Ferragina and Manzini, J. ACM 2005]. As such, there has been an effort to better understand under which conditions such an indexing scheme is possible. This led to the… ▽ More

    Submitted 25 February, 2019; v1 submitted 5 February, 2019; originally announced February 2019.