Skip to main content

Showing 1–14 of 14 results for author: Golan, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.16260  [pdf, other

    cs.CV cs.LG

    Enhancing Consistency-Based Image Generation via Adversarialy-Trained Classification and Energy-Based Discrimination

    Authors: Shelly Golan, Roy Ganz, Michael Elad

    Abstract: The recently introduced Consistency models pose an efficient alternative to diffusion algorithms, enabling rapid and good quality image synthesis. These methods overcome the slowness of diffusion models by directly map** noise to data, while maintaining a (relatively) simpler training. Consistency models enable a fast one- or few-step generation, but they typically fall somewhat short in sample… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

  2. arXiv:2405.11475  [pdf, other

    cs.DS

    String 2-Covers with No Length Restrictions

    Authors: Itai Boneh, Shay Golan, Arseny Shur

    Abstract: A $λ$-cover of a string $S$ is a set of strings $\{C_i\}_1^λ$ such that every index in $S$ is contained in an occurrence of at least one string $C_i$. The existence of a $1$-cover defines a well-known class of quasi-periodic strings. Quasi-periodicity can be decided in linear time, and all $1$-covers of a string can be reported in linear time plus the size of the output. Since in general it is NP-… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.

    Comments: 31 pages

    MSC Class: 68W32 ACM Class: F.2.2

  3. arXiv:2404.11673  [pdf, other

    cs.DS

    Hairpin Completion Distance Lower Bound

    Authors: Itai Boneh, Dvir Fried, Shay Golan, Matan Kraus

    Abstract: Hairpin completion, derived from the hairpin formation observed in DNA biochemistry, is an operation applied to strings, particularly useful in DNA computing. Conceptually, a right hairpin completion operation transforms a string $S$ into $S\cdot S'$ where $S'$ is the reverse complement of a prefix of $S$. Similarly, a left hairpin completion operation transforms a string $S$ into $S'\cdot S$ wher… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: To be published in CPM 2024

    MSC Class: 68W32 ACM Class: F.2.2

  4. arXiv:2310.02670  [pdf, other

    cs.DS

    Searching 2D-Strings for Matching Frames

    Authors: Itai Boneh, Dvir Fried, Shay Golan, Matan Kraus, Adrian Miclaus, Arseny Shur

    Abstract: We introduce the natural notion of a matching frame in a $2$-dimensional string. A matching frame in a $2$-dimensional $n\times m$ string $M$, is a rectangle such that the strings written on the horizontal sides of the rectangle are identical, and so are the strings written on the vertical sides of the rectangle. Formally, a matching frame in $M$ is a tuple $(u,d,\ell,r)$ such that… ▽ More

    Submitted 18 April, 2024; v1 submitted 4 October, 2023; originally announced October 2023.

  5. arXiv:2302.06252  [pdf, other

    cs.DS

    Near-Optimal Dynamic Time War** on Run-Length Encoded Strings

    Authors: Itai Boneh, Shay Golan, Shay Mozes, Oren Weimann

    Abstract: We give an $\tilde O(n^2)$ time algorithm for computing the exact Dynamic Time War** distance between two strings whose run-length encoding is of size at most $n$. This matches (up to log factors) the known (conditional) lower bound, and should be compared with the previous fastest $O(n^3)$ time exact algorithm and the $\tilde O(n^2)$ time approximation algorithm.

    Submitted 13 February, 2023; originally announced February 2023.

  6. arXiv:2201.11152  [pdf

    cs.CR

    Cyber Resilience: by Design or by Intervention?

    Authors: Alexander Kott, Maureen S. Golan, Benjamin D. Trump, Igor Linkov

    Abstract: The term "cyber resilience by design" is growing in popularity. Here, by cyber resilience we refer to the ability of the system to resist, minimize and mitigate a degradation caused by a successful cyber-attack on a system or network of computing and communicating devices. Some use the term "by design" when arguing that systems must be designed and implemented in a provable mission assurance fashi… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

  7. An Improved Algorithm for The $k$-Dyck Edit Distance Problem

    Authors: Dvir Fried, Shay Golan, Tomasz Kociumaka, Tsvi Kopelowitz, Ely Porat, Tatiana Starikovskaya

    Abstract: A Dyck sequence is a sequence of opening and closing parentheses (of various types) that is balanced. The Dyck edit distance of a given sequence of parentheses $S$ is the smallest number of edit operations (insertions, deletions, and substitutions) needed to transform $S$ into a Dyck sequence. We consider the threshold Dyck edit distance problem, where the input is a sequence of parentheses $S$ an… ▽ More

    Submitted 22 August, 2022; v1 submitted 3 November, 2021; originally announced November 2021.

    Comments: Journal version

  8. arXiv:2006.13673  [pdf, ps, other

    cs.DS

    Improved Circular $k$-Mismatch Sketches

    Authors: Shay Golan, Tomasz Kociumaka, Tsvi Kopelowitz, Ely Porat, Przemysław Uznański

    Abstract: The shift distance $\mathsf{sh}(S_1,S_2)$ between two strings $S_1$ and $S_2$ of the same length is defined as the minimum Hamming distance between $S_1$ and any rotation (cyclic shift) of $S_2$. We study the problem of sketching the shift distance, which is the following communication complexity problem: Strings $S_1$ and $S_2$ of length $n$ are given to two identical players (encoders), who inde… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

  9. arXiv:2004.12881  [pdf, ps, other

    cs.DS

    The Streaming k-Mismatch Problem: Tradeoffs between Space and Total Time

    Authors: Shay Golan, Tomasz Kociumaka, Tsvi Kopelowitz, Ely Porat

    Abstract: We revisit the $k$-mismatch problem in the streaming model on a pattern of length $m$ and a streaming text of length $n$, both over a size-$σ$ alphabet. The current state-of-the-art algorithm for the streaming $k$-mismatch problem, by Clifford et al. [SODA 2019], uses $\tilde O(k)$ space and $\tilde O\big(\sqrt k\big)$ worst-case time per character. The space complexity is known to be (uncondition… ▽ More

    Submitted 27 April, 2020; originally announced April 2020.

    Comments: Extended abstract to appear in CPM 2020

    ACM Class: F.2.2

  10. arXiv:2003.02016  [pdf, ps, other

    cs.DS

    Time-Space Tradeoffs for Finding a Long Common Substring

    Authors: Stav Ben-Nun, Shay Golan, Tomasz Kociumaka, Matan Kraus

    Abstract: We consider the problem of finding, given two documents of total length $n$, a longest string occurring as a substring of both documents. This problem, known as the Longest Common Substring (LCS) problem, has a classic $O(n)$-time solution dating back to the discovery of suffix trees (Weiner, 1973) and their efficient construction for integer alphabets (Farach-Colton, 1997). However, these solutio… ▽ More

    Submitted 28 April, 2020; v1 submitted 4 March, 2020; originally announced March 2020.

  11. arXiv:2001.00211  [pdf, ps, other

    cs.DS

    Approximating Text-to-Pattern Hamming Distances

    Authors: Timothy M. Chan, Shay Golan, Tomasz Kociumaka, Tsvi Kopelowitz, Ely Porat

    Abstract: We revisit a fundamental problem in string matching: given a pattern of length m and a text of length n, both over an alphabet of size $σ$, compute the Hamming distance between the pattern and the text at every location. Several $(1+ε)$-approximation algorithms have been proposed in the literature, with running time of the form $O(ε^{-O(1)}n\log n\log m)$, all using fast Fourier transform (FFT). W… ▽ More

    Submitted 1 January, 2020; originally announced January 2020.

  12. Locally Consistent Parsing for Text Indexing in Small Space

    Authors: Or Birenzwige, Shay Golan, Ely Porat

    Abstract: We consider two closely related problems of text indexing in a sub-linear working space. The first problem is the Sparse Suffix Tree (SST) construction of a set of suffixes $B$ using only $O(|B|)$ words of space. The second problem is the Longest Common Extension (LCE) problem, where for some parameter $1\leτ\le n$, the goal is to construct a data structure that uses $O(\frac {n}τ)$ words of space… ▽ More

    Submitted 1 January, 2020; v1 submitted 2 December, 2018; originally announced December 2018.

    Comments: Extended abstract to appear is SODA 2020

    MSC Class: F.2.2 ACM Class: F.2.2

  13. Streaming Pattern Matching with d Wildcards

    Authors: Shay Golan, Tsvi Kopelowitz, Ely Porat

    Abstract: In the pattern matching with $d$ wildcards problem one is given a text $T$ of length $n$ and a pattern $P$ of length $m$ that contains $d$ wildcard characters, each denoted by a special symbol $'?'$. A wildcard character matches any other character. The goal is to establish for each $m$-length substring of $T$ whether it matches $P$. In the streaming model variant of the pattern matching with $d$… ▽ More

    Submitted 5 April, 2017; originally announced April 2017.

    Comments: Extended abstract appeared in ESA 2016

  14. arXiv:1406.2431  [pdf, other

    cs.IR cs.LG

    Budget-Constrained Item Cold-Start Handling in Collaborative Filtering Recommenders via Optimal Design

    Authors: Oren Anava, Shahar Golan, Nadav Golbandi, Zohar Karnin, Ronny Lempel, Oleg Rokhlenko, Oren Somekh

    Abstract: It is well known that collaborative filtering (CF) based recommender systems provide better modeling of users and items associated with considerable rating history. The lack of historical ratings results in the user and the item cold-start problems. The latter is the main focus of this work. Most of the current literature addresses this problem by integrating content-based recommendation technique… ▽ More

    Submitted 20 September, 2016; v1 submitted 10 June, 2014; originally announced June 2014.

    Comments: 11 pages, 2 figures

    MSC Class: 62K05